
Kim Key
Tech Writer at PCMag
BlueSky: https://t.co/pPlgX4NvhB Security and software @PCMag. Bylines @NYTimes @TechRadar @Mashable @CNN @ESPN and more.
Articles
-
3 days ago |
pcmag.com | Kim Key
When you enter into a long-term relationship, you can expect to share a lot of accounts with your partner—utilities, streaming services, perhaps even banking. All these things require passwords. But instead of writing them down on a piece of paper, storing them on your phone, or memorizing some too-easy passwords, you should talk to your partner about using a password manager. A password manager creates long, strong, and unique passwords for all your accounts and fills them automatically.
-
1 week ago |
me.pcmag.com | Kim Key
Mobile payment apps attract fraudsters hoping to bilk customers out of their cash. The New York Times recently published a story concerning scammers using the popular Zelle app. And banking services such as Capital One have begun sending out emails warning customers about people impersonating bank employees who demand payments over the phone, text, or email. Clearly something is going on. What do you need to know to stay safe? We'll explain.
-
1 week ago |
pcmag.com | Kim Key
Cybersecurity experts can be a little cynical. For example, on social media, comments like “you can’t patch stupid” or “the human link is the weakest in any cybersecurity chain” often appear after a CEO gets hacked or under a report about an employee falling victim to a deepfake scam. Those sentiments sidestep the core security problem: Humans are the only “link” that matters in the cybersecurity chain.
-
1 week ago |
pcmag.com | Kim Key
At the RSAC 2025 Conference, Ayelet Biger-Levin, CEO of RangersAI, the maker of AI-enhanced scam detection app ScamRanger, asked the audience who they believe are scammers’ most frequent targets. Immediately, several people shouted out, “The elderly!” After a beat, one participant replied, “Everyone.” Biger-Levin nodded in agreement. “Anyone can be a scam target,” she said, adding that it happens most often when we’re vulnerable.
-
1 week ago |
pcmag.com | Kim Key
Most people have a pretty low threat level, so they’re not likely to be targeted by sophisticated hackers. However, thanks to the explosive growth of smart home devices and work-from-home policies, cybercriminals are starting to attack employees’ home networks to bypass corporate security measures.
Try JournoFinder For Free
Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.
Start Your 7-Day Free Trial →X (formerly Twitter)
- Followers
- 3K
- Tweets
- 10K
- DMs Open
- No

Let’s fly the friendlier skies together friendos: https://t.co/i8YLQChxgG

Fantastic writing from @michelledean. I know so many people were affected by the news from her daughter, and this essay offers an insightful way of looking at the (horrible) situation

I know Alice Munro’s writing by heart. I know her failures by heart, too. In the aftermath of Andrea Skinner’s abuse revelation, Michelle Dean reflects on secrets and lies within families — and what clues were present in Munro’s writing all along. https://t.co/WhkS1DTwO7

RT @chrissyfarr: Technologies that I was told would revolutionize health care in my career so far: — 2010-2012: Electronic medical records…