About Shannon Flynn
Shannon is located in Philly, PA. She has been writing in the tech field for over 5 years after graduating with a degree in IT. Shannon is the Managing Editor of ReHack Magazine and covers topics like cybersecurity, gaming, and business technology.
How Secure Is a Refurbished Phone?
A refurbished phone can be secure if you know what to look for. Here's what you need to know about used phone security.
5 Red Flags to Identify a Phishing Website
Phishing isn't just for email or social media—you can also land directly on a phishing website. Here are some of the top indicators.
How Secure Is Airplane Wi-Fi?
Airplane Wi-Fi keeps you connected while you're tens of thousands of feet in the air. It's convenient, but is it secure?
Have You Changed the Default Passwords on Your IoT Devices?
Not changing the default passwords on IoT devices leaves you vulnerable to hacking. Have you updated your passwords?
What Are Ransomware Negotiators and How Can They Save You Serious Cash?
You might not have heard of a ransomware negotiator before. Here's what they can do and why the role is essential.
Is Your Smart Thermostat a Cybersecurity Risk?
Smart thermostats are convenient for homeowners, but do they also provide easy access for hackers?
Why You Shouldn't Trust Giveaway Contests on Social Media
If it seems too good to be true, it probably is—and that applies doubly to social media. Here are the signs of a giveaway scam.
Killware vs. Ransomware: What's the Difference?
Killware and ransomware are both types of cyberattacks, but do you know how to differentiate them?
Can You Spot Phishing Emails? Test Your Awareness With These Quizzes
Phishing emails are becoming harder to spot, but these quizzes test your phishing knowledge and help you stay safe.
What Are the Pros and Cons of Passwordless Authentication?
You might already be using passwordless authentication on some services. But what are the risks and benefits of a password-free society?
Would You Infect Others to Rid Yourself of Ransomware?
A ransomware variant offers you a choice: pay the ransom, or infect two other people with the ransomware. What would you choose?
Think Twice Before Unsubscribing From Spam Emails: It Could Be a Scam
It's natural to hit unsubscribe when you receive unwanted emails—but with spam, doing so could be risky.
If You Have These 6 Personality Traits, You're More Vulnerable to Phishing Scams
No one is immune from phishing, but some personality traits can make you more susceptible. Do you have any of these most vulnerable traits?
What Is a Blank Image Phishing Scam?
An email with a .html attachment could be a blank image phishing scam. Here's how to recognize one.
AI Hallucinations Could Be a Cybersecurity Risk
AI chatbots may hallucinate, giving confidently incorrect answers—which hackers can take advantage of. Here's how hackers weaponize hallucinations.
Is Your Electric Vehicle Charger a Security Risk?
Some EV chargers have been found to have security flaws. So is this really something you need to worry about?
How Ransomware Gangs Enlist Insiders (and How to Stop Them)
Ransomware gangs may reach out to company insiders to make the breach easier. Here's how they do it.
7 Smartphone Apps That Help You Travel Safely
Whether you’re on a plane, in a car, or walking through the streets of a foreign country, these are the best apps to download to keep yourself secure.
Does DIY Home Security Really Keep You Safe?
DIY home security is more than just a simple camera system. Here's how it can make your home safer.
Is Your VPN Working? Here's How to Check
A VPN works quietly and largely invisibly in the background, but there are ways to confirm that it is on.