
Kim Key
Tech Writer at PCMag
BlueSky: https://t.co/pPlgX4NvhB Security and software @PCMag. Bylines @NYTimes @TechRadar @Mashable @CNN @ESPN and more.
Articles
-
1 week ago |
me.pcmag.com | Kim Key
If you share online accounts with family members or you and your friends cut costs by sharing streaming services, you need to secure those accounts with a password that's accessible to everyone you trust. We recommend not sharing passwords with other people very often, but the right password manager can make sending credentials a lot safer with very little effort on your part.
-
1 week ago |
uk.pcmag.com | Kim Key
How Is a Proxy Different Than a VPN? If you're unfamiliar with the technology, proxies are like first cousins to VPNs. They work by sending web traffic from your home or work computer through a proxy server on the way to its destination. This makes your traffic look like it's coming from somewhere else and hides your real IP address at the same time. The bad news? Each application requires its own proxy connection.
-
2 weeks ago |
me.pcmag.com | Kim Key
Anyone can destroy your company’s security in just a few seconds. That’s the time it takes one harried employee to click on a phishing link sent by a scammer, infecting every device on the network with malware. It would take a hacker just as long to crack a CEO’s simple password that they’ve memorized and used for all of their online accounts. If you’re looking for a reason to create a cybersecurity strategy for your business, consider the bottom line.
-
3 weeks ago |
pcmag.com | Kim Key
When you enter into a long-term relationship, you can expect to share a lot of accounts with your partner—utilities, streaming services, perhaps even banking. All these things require passwords. But instead of writing them down on a piece of paper, storing them on your phone, or memorizing some too-easy passwords, you should talk to your partner about using a password manager. A password manager creates long, strong, and unique passwords for all your accounts and fills them automatically.
-
1 month ago |
me.pcmag.com | Kim Key
Mobile payment apps attract fraudsters hoping to bilk customers out of their cash. The New York Times recently published a story concerning scammers using the popular Zelle app. And banking services such as Capital One have begun sending out emails warning customers about people impersonating bank employees who demand payments over the phone, text, or email. Clearly something is going on. What do you need to know to stay safe? We'll explain.
Try JournoFinder For Free
Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.
Start Your 7-Day Free Trial →X (formerly Twitter)
- Followers
- 3K
- Tweets
- 10K
- DMs Open
- No

Let’s fly the friendlier skies together friendos: https://t.co/i8YLQChxgG

Fantastic writing from @michelledean. I know so many people were affected by the news from her daughter, and this essay offers an insightful way of looking at the (horrible) situation

I know Alice Munro’s writing by heart. I know her failures by heart, too. In the aftermath of Andrea Skinner’s abuse revelation, Michelle Dean reflects on secrets and lies within families — and what clues were present in Munro’s writing all along. https://t.co/WhkS1DTwO7

RT @chrissyfarr: Technologies that I was told would revolutionize health care in my career so far: — 2010-2012: Electronic medical records…