MakeUseOf

Shannon Flynn-

Shannon Flynn

Page 4

About Shannon Flynn

Shannon is located in Philly, PA. She has been writing in the tech field for over 5 years after graduating with a degree in IT. Shannon is the Managing Editor of ReHack Magazine and covers topics like cybersecurity, gaming, and business technology.

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.
upclose of man's hands working on a laptop with another next to it 1
Insider vs. Outsider Threats: Which Is Worse?

Cyberattacks keep getting more sophisticated, and businesses must stay wary of both insider and outsider threats. Let's explore further.

three footprints in the sand 1
How Your Digital Footprint Is Used, and How to Reclaim Your Privacy

Whenever you use the internet, you leave a digital footprint, and that's very useful for companies. Less so for you. Here's what you need to know.

red-headed woman at desk working on two computers and one laptop 1
3 Ways to Encourage People to Pursue a Career in Cybersecurity

Lots of people are interested in cybersecurity, but as a career choice, it can be a bit intimidating. Here's how you can encourage like-minded folk.

Mac laptop partially closed with screen still lit in dark room 1
Why Apple's App Tracking Transparency May Not Be All That Helpful

Your device might alert you when an app wants to track you, but does Apple's Transparency framework actually protect your privacy?

man in a dark room with purple backlighting at a desk typing on his computer 1
How Does Live Hacking Work?

Not all hackers are malicious. Live hacking events are a great way to expose vulnerabilities and encourage the cybersecurity community.

white toy robot looking back at camera 1
What Are Bad Bot Attacks?

Not all bots are the same! So what are bad bots, why do they account for so much traffic, and how do they affect your online activities?

black iPhone with a folder of social media apps 1
How Often Are Social Media Accounts Hacked?

How frequently do social media profiles like Facebook, Twitter, and Instagram get hacked? And how can you stop yourself being a target?

Masked man in all black sitting at computer in a dark, blue screen-lit room 1
How Hackers Are Using Our Own Technology Against Us

Technology has changed many lives, but hackers are looking to use it against you and ruin yours.

greyscale-photo-of-person-on-laptop 1
Which Websites Are Blocked in China? How to Check

Want to know whether your site is blocked by the Great Firewall of China? Here's how to check whether mainland China can access a website.

red, lit up ATM alone in dark street 1
How Do Skimmers and Shimmers Differ? What Credit Card Users Need to Know

Credit card skimming is nothing new, but newer devices called shimmers can steal more data than conventional skimmers. Here's what you need to know.

person sitting on floor while using laptop 1
How to Use Windows 11's Entertainment Widget

Windows 11 comes with a new widget for watching movies and TV shows, but how do you use it? And is it worth your time?

up-close photo of turquoise blue eye 1
Are Smart Contact Lenses Safe and Secure?

Companies have begun to develop smart contact lenses. Here's why, plus some security questions developers need to ask themselves.

Man near Christmas tree with laptop laying on couch with a credit card in his hand 1
How to Avoid Falling for Skimming Scams This Holiday

Tis the season for giving—and taking! Be wary of skimming scams over the festive period. Here's how to avoid falling victim.

up-close image of neon blue electronic chip 1
What Is Threat Hunting and How Do You Practice It?

Threat hunting is a great way of detecting vulnerabilities in your system. But what actually is it and how does threat hunting differ from pen tests?

woman on computer typing on laptop 1
Will Deleting Facial Recognition Data Affect Facebook Users' Security?

Facebook recently announced that it's removing facial recognition data: does this mean the company's becoming more trustworthy with your info?

four people sitting in a group on a ledge talking 1
How to Create and Discover Likewise Groups to Share Recommendations

Read an excellent book or seen an amazing movie? You probably want to tell people about it! That's why you should use Likewise and create a community.

padlock on a laptop signifying authentication 1
Authentication vs. Authorization: What is the Difference?

Confused between authentication and authorization? Discover the difference between the two to better understand cybersecurity.

two-women-looking-up-at-many-security-cameras 1
6 Types of Security Systems for Your Home or Apartment

Buying or upgrading your home security system? Here are the six main types of security system you need to know about.

many-people-on-metro-with-yellow-poles 1
How Secure Is Your Data While You're Using Public Transportation?

Whether you're taking a subway train, bus, or airplane, you need to know about your security and privacy. So what risks does public transport pose?

mac-laptop-with-green-coded-screen-and-money-flying 1
How Does the NYDFS Cybersecurity Regulation Affect You?

The NYDFS cybersecurity regulation is now in effect, so what does this mean for you? How might this make online privacy even more secure?

2 3 4 5 6
Page 4 / 6