About Shannon Flynn
Shannon is located in Philly, PA. She has been writing in the tech field for over 5 years after graduating with a degree in IT. Shannon is the Managing Editor of ReHack Magazine and covers topics like cybersecurity, gaming, and business technology.
Insider vs. Outsider Threats: Which Is Worse?
Cyberattacks keep getting more sophisticated, and businesses must stay wary of both insider and outsider threats. Let's explore further.
How Your Digital Footprint Is Used, and How to Reclaim Your Privacy
Whenever you use the internet, you leave a digital footprint, and that's very useful for companies. Less so for you. Here's what you need to know.
3 Ways to Encourage People to Pursue a Career in Cybersecurity
Lots of people are interested in cybersecurity, but as a career choice, it can be a bit intimidating. Here's how you can encourage like-minded folk.
Why Apple's App Tracking Transparency May Not Be All That Helpful
Your device might alert you when an app wants to track you, but does Apple's Transparency framework actually protect your privacy?
How Does Live Hacking Work?
Not all hackers are malicious. Live hacking events are a great way to expose vulnerabilities and encourage the cybersecurity community.
What Are Bad Bot Attacks?
Not all bots are the same! So what are bad bots, why do they account for so much traffic, and how do they affect your online activities?
How Often Are Social Media Accounts Hacked?
How frequently do social media profiles like Facebook, Twitter, and Instagram get hacked? And how can you stop yourself being a target?
How Hackers Are Using Our Own Technology Against Us
Technology has changed many lives, but hackers are looking to use it against you and ruin yours.
Which Websites Are Blocked in China? How to Check
Want to know whether your site is blocked by the Great Firewall of China? Here's how to check whether mainland China can access a website.
How Do Skimmers and Shimmers Differ? What Credit Card Users Need to Know
Credit card skimming is nothing new, but newer devices called shimmers can steal more data than conventional skimmers. Here's what you need to know.
How to Use Windows 11's Entertainment Widget
Windows 11 comes with a new widget for watching movies and TV shows, but how do you use it? And is it worth your time?
Are Smart Contact Lenses Safe and Secure?
Companies have begun to develop smart contact lenses. Here's why, plus some security questions developers need to ask themselves.
How to Avoid Falling for Skimming Scams This Holiday
Tis the season for giving—and taking! Be wary of skimming scams over the festive period. Here's how to avoid falling victim.
What Is Threat Hunting and How Do You Practice It?
Threat hunting is a great way of detecting vulnerabilities in your system. But what actually is it and how does threat hunting differ from pen tests?
Will Deleting Facial Recognition Data Affect Facebook Users' Security?
Facebook recently announced that it's removing facial recognition data: does this mean the company's becoming more trustworthy with your info?
How to Create and Discover Likewise Groups to Share Recommendations
Read an excellent book or seen an amazing movie? You probably want to tell people about it! That's why you should use Likewise and create a community.
Authentication vs. Authorization: What is the Difference?
Confused between authentication and authorization? Discover the difference between the two to better understand cybersecurity.
6 Types of Security Systems for Your Home or Apartment
Buying or upgrading your home security system? Here are the six main types of security system you need to know about.
How Secure Is Your Data While You're Using Public Transportation?
Whether you're taking a subway train, bus, or airplane, you need to know about your security and privacy. So what risks does public transport pose?
How Does the NYDFS Cybersecurity Regulation Affect You?
The NYDFS cybersecurity regulation is now in effect, so what does this mean for you? How might this make online privacy even more secure?