About Shannon Flynn
Shannon is located in Philly, PA. She has been writing in the tech field for over 5 years after graduating with a degree in IT. Shannon is the Managing Editor of ReHack Magazine and covers topics like cybersecurity, gaming, and business technology.
Latest Articles
Cybercriminals Are Targeting App Beta-Testing, and This Is What to Look Out For
Beta testing can be a rewarding experience—until you get scammed by a fake app.
How to Detect a Keylogger on Your Smartphone
Keyloggers can reveal your every move, but there are ways to spot them before the damage is done.
How Much Your Social Media Profile Data Is Worth on the Dark Web
Social media profiles are some of the most commonly sold accounts on the dark web, but how much is your data really worth?
What Are OTP Bots?
OTP bots target one-time password systems to hack your accounts. Here's how to defend against them.
How Secure Is a Refurbished Phone?
A refurbished phone can be secure if you know what to look for. Here's what you need to know about used phone security.
5 Red Flags to Identify a Phishing Website
Phishing isn't just for email or social media—you can also land directly on a phishing website. Here are some of the top indicators.
How Secure Is Airplane Wi-Fi?
Airplane Wi-Fi keeps you connected while you're tens of thousands of feet in the air. It's convenient, but is it secure?
Have You Changed the Default Passwords on Your IoT Devices?
Not changing the default passwords on IoT devices leaves you vulnerable to hacking. Have you updated your passwords?
What Are Ransomware Negotiators and How Can They Save You Serious Cash?
You might not have heard of a ransomware negotiator before. Here's what they can do and why the role is essential.
Is Your Smart Thermostat a Cybersecurity Risk?
Smart thermostats are convenient for homeowners, but do they also provide easy access for hackers?
Why You Shouldn't Trust Giveaway Contests on Social Media
If it seems too good to be true, it probably is—and that applies doubly to social media. Here are the signs of a giveaway scam.
Killware vs. Ransomware: What's the Difference?
Killware and ransomware are both types of cyberattacks, but do you know how to differentiate them?
Can You Spot Phishing Emails? Test Your Awareness With These Quizzes
Phishing emails are becoming harder to spot, but these quizzes test your phishing knowledge and help you stay safe.
What Are the Pros and Cons of Passwordless Authentication?
You might already be using passwordless authentication on some services. But what are the risks and benefits of a password-free society?
Would You Infect Others to Rid Yourself of Ransomware?
A ransomware variant offers you a choice: pay the ransom, or infect two other people with the ransomware. What would you choose?
Think Twice Before Unsubscribing From Spam Emails: It Could Be a Scam
It's natural to hit unsubscribe when you receive unwanted emails—but with spam, doing so could be risky.
If You Have These 6 Personality Traits, You're More Vulnerable to Phishing Scams
No one is immune from phishing, but some personality traits can make you more susceptible. Do you have any of these most vulnerable traits?
What Is a Blank Image Phishing Scam?
An email with a .html attachment could be a blank image phishing scam. Here's how to recognize one.
AI Hallucinations Could Be a Cybersecurity Risk
AI chatbots may hallucinate, giving confidently incorrect answers—which hackers can take advantage of. Here's how hackers weaponize hallucinations.
Is Your Electric Vehicle Charger a Security Risk?
Some EV chargers have been found to have security flaws. So is this really something you need to worry about?