MakeUseOf

Shannon Flynn-

Shannon Flynn

Page 3

About Shannon Flynn

Shannon is located in Philly, PA. She has been writing in the tech field for over 5 years after graduating with a degree in IT. Shannon is the Managing Editor of ReHack Magazine and covers topics like cybersecurity, gaming, and business technology.

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
woman on phone sitting in chair with laptop 1
3 Ways to Stop Your Phone From Being Tracked

Your smartphone can be used to track you in many ways, but you can keep this to a minimum if you're diligent. Here, we'll teach you how.

silver MacBook resting on white desk near desktop computer and showing colorful coding 1
Are No-Code and Low-Code Development Platforms Secure?

No- or low-code environments are great for businesses with little tech expertise, but are they really safe for you to use?

Gmail loading up on a silver mac laptop 1
Everything You Need to Know About Gmail’s Login Security Warning Alerts

Google's login security alerts in Gmail can be pretty annoying, but is it a good idea to try and disable them? Let's dive in and find out.

two people looking at laptop, one with a watch pointing and the other with a grey sweater typing 1
How Can You Prevent Formjacking?

Formjacking is a dangerous cyberattack that can result in financial loss and identity theft. So what is formjacking and how can you stay safe?

person having crypto stolen from laptop 1
Why You Should Be Wary of Crypto on Social Media

Scammers are luring victims using crypto on social media. Here's why you should be careful before making investments and how you can stay protected.

woman with fuchsia painted nails at desk in front of laptop holding an iPhone 1
What Are the Pros and Cons of Passwordless Authentication?

You might already be using passwordless authentication on some services. But what are the risks and benefits of a password-free society?

man-in-skeleton-mask-with-finger-to-mouth 1
What Is Synthetic Identity Fraud?

Cybercriminals don't need to know everything about you to commit fraud. Here's how to prevent and report synthetic fraud.

man in black shirt sitting at desk typing on black laptop with coding on it in a black room 1
What Is the NATO Cyber Defence Pledge and What Does It Mean for You?

You might've heard about the cybersecurity guidelines issued by NATO, but what actually is the Cyber Defence Pledge?

black phone laying faceup on wooden table with three masked emojis on the screen 1
Scammers Are Using Fake COVID Sites to Obtain Your Data

Looking for free testing kits? Or searching for info about coronavirus? Watch out for fake websites that steal your personal information instead.

black iPhone laying face up with apps on home screen against a dark background 1
Sideloading: Why Installing Unofficial Apps May Put You at Risk

Can't find the app you're looking for on official app stores? You might be tempted to sideload content. Here's why you shouldn't.

west virginia policeman in uniform looking back at arrest being made 1
How Does Law Enforcement Use Data to Solve Crime?

Data can form an important part of solving crimes, but how exactly is it used?

man in grey shirt typing on computer at desk 1
How Ethical Hacking Can Stop Hackers

Ethical hacking is a method companies can use to beat hackers at their own game. Let's explore ethical hacking and how you can get involved in it.

macbook pro showing programing on desk while next to books 1
What Are the 5 Steps of Ethical Hacking?

Ethical hacking is not a contradiction; some people use their evil-genius skills to help improve security, and here’s how they do it.

hands in black fingerless gloves typing on a laptop in a dark room 1
How Predictive Analytics Can Combat Cybercrime

We may not be quite ready to tackle pre-crime in the physical world, but when it comes to cyber criminals, AI is making waves.

Upclose shot of woman with silver rind on her fingers holding iPhone 1
What Is Cyberflashing? Is It Illegal?

Cyberflashing is a form of online abuse that is becoming increasingly common. From its legality to how you can avoid it, here's all you need to know.

upclose image of a black iPhone laying down with lit screen 1
All of Your Messaging App Metadata the FBI Claims It Can Obtain

If you think any information you share over messaging apps is 100% private, you might want to reconsider that.

three women sitting on couch pointing at laptop on coffee table 1
How Will Web 3.0 Change Internet Privacy?

Web 3.0, the next generation of the internet is just around the corner. Here, we'll explain how it could change your online privacy forever.

lighthouse standing along and lit up at dusk 1
Beaconing 101: What Is Beaconing in Security?

Beaconing is one of the first signs of a cyberattack. Here's everything you need to know.

an upclose shot of a man in a blue button-down writing on paper at a desk 1
Should You File a Claim in a Data Breach Settlement?

Data breaches are serious, but is it worth filing a claim?

GPS location on map showing Washington on laptop 1
What Is Geofencing and How Does It Affect Your Security and Privacy?

Ever wondered how advertisers send location-specific pop-ups? Or how smart cars can detect theft? Here's what you need to know about geofencing.

1 2 3 4 5
Page 3 / 6