Kim Key's profile photo

Kim Key

Georgia

Tech Writer at PCMag

BlueSky: https://t.co/pPlgX4NvhB Security and software @PCMag. Bylines @NYTimes @TechRadar @Mashable @CNN @ESPN and more.

Articles

  • 3 days ago | pcmag.com | Kim Key

    When you enter into a long-term relationship, you can expect to share a lot of accounts with your partner—utilities, streaming services, perhaps even banking. All these things require passwords. But instead of writing them down on a piece of paper, storing them on your phone, or memorizing some too-easy passwords, you should talk to your partner about using a password manager. A password manager creates long, strong, and unique passwords for all your accounts and fills them automatically.

  • 1 week ago | me.pcmag.com | Kim Key

    Mobile payment apps attract fraudsters hoping to bilk customers out of their cash. The New York Times recently published a story concerning scammers using the popular Zelle app. And banking services such as Capital One have begun sending out emails warning customers about people impersonating bank employees who demand payments over the phone, text, or email. Clearly something is going on. What do you need to know to stay safe? We'll explain.

  • 1 week ago | pcmag.com | Kim Key

    Cybersecurity experts can be a little cynical. For example, on social media, comments like “you can’t patch stupid” or “the human link is the weakest in any cybersecurity chain” often appear after a CEO gets hacked or under a report about an employee falling victim to a deepfake scam. Those sentiments sidestep the core security problem: Humans are the only “link” that matters in the cybersecurity chain.

  • 1 week ago | pcmag.com | Kim Key

    At the RSAC 2025 Conference, Ayelet Biger-Levin, CEO of RangersAI, the maker of AI-enhanced scam detection app ScamRanger, asked the audience who they believe are scammers’ most frequent targets. Immediately, several people shouted out, “The elderly!” After a beat, one participant replied, “Everyone.” Biger-Levin nodded in agreement. “Anyone can be a scam target,” she said, adding that it happens most often when we’re vulnerable.

  • 1 week ago | pcmag.com | Kim Key

    Most people have a pretty low threat level, so they’re not likely to be targeted by sophisticated hackers. However, thanks to the explosive growth of smart home devices and work-from-home policies, cybercriminals are starting to attack employees’ home networks to bypass corporate security measures.

Try JournoFinder For Free

Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.

Start Your 7-Day Free Trial →

X (formerly Twitter)

Followers
3K
Tweets
10K
DMs Open
No
Kim Key
Kim Key @KimNewsome
22 Nov 24

Let’s fly the friendlier skies together friendos: https://t.co/i8YLQChxgG

Kim Key
Kim Key @KimNewsome
9 Jul 24

Fantastic writing from @michelledean. I know so many people were affected by the news from her daughter, and this essay offers an insightful way of looking at the (horrible) situation

The Cut
The Cut @TheCut

I know Alice Munro’s writing by heart. I know her failures by heart, too. In the aftermath of Andrea Skinner’s abuse revelation, Michelle Dean reflects on secrets and lies within families — and what clues were present in Munro’s writing all along. https://t.co/WhkS1DTwO7

Kim Key
Kim Key @KimNewsome
9 Jul 24

RT @chrissyfarr: Technologies that I was told would revolutionize health care in my career so far: — 2010-2012: Electronic medical records…