Articles

Latest Articles
Featured image for “The US and UK Accuse China of Spying on Millions of Citizens”

The US and UK Accuse China of Spying on Millions of Citizens

Officials from the US and UK accused the Chinese government of an extensive cyberespionage scheme that targeted millions of people,…
March 26, 2024
Featured image for “How SEO Poisoning Can Threaten Your Business”

How SEO Poisoning Can Threaten Your Business

When you want to look something up on the internet, you turn to a search engine, like Google or Bing.…
March 26, 2024
Featured image for “Unprompted MFA Codes Are Bad News”

Unprompted MFA Codes Are Bad News

Multi-factor authentication (MFA) is one of the most powerful tools in your cybersecurity arsenal. When enabled, MFA can prevent bad…
March 19, 2024
Featured image for “Is ChatGPT a Security Threat?”

Is ChatGPT a Security Threat?

ChatGPT took the world by storm, and for good reason: The generative AI chatbot is capable of many feats, and…
March 18, 2024
Featured image for “Microsoft Has a Russian Hacker Problem”

Microsoft Has a Russian Hacker Problem

You read that right: Microsoft can’t seem to shake its Russian hackers. The company said Friday it was still attempting…
March 12, 2024
Featured image for “US DoJ Arrests Former Google Engineer for AI Tech Theft”

US DoJ Arrests Former Google Engineer for AI Tech Theft

As reported by The Hacker News, the US Department of Justice (DoJ) has indicted a Chinese national and resident of…
March 12, 2024
Featured image for “What to Do When Your Wi-Fi Seems Slow”

What to Do When Your Wi-Fi Seems Slow

When the internet is working as it should, you think nothing of it. Clicking on a website takes you where…
March 5, 2024
Featured image for “The FBI Is Watching Out for AI Attacks in the Upcoming Election”

The FBI Is Watching Out for AI Attacks in the Upcoming Election

The FBI expects the 2024 election to be a target for cyberattacks, especially those generated by artificial intelligence, FBI Director…
March 5, 2024
Featured image for “Protect Your Accounts from SIM-Swap and Port-Out Attacks”

Protect Your Accounts from SIM-Swap and Port-Out Attacks

There isn’t one type of cyberattack out there, nor is there one point of entry for hackers to target. While…
February 27, 2024
Featured image for “What Happens When Windows Server OS Reaches End of Life?”

What Happens When Windows Server OS Reaches End of Life?

No matter what type of technology you’re using, it’s important to stay up to date with the latest updates and…
February 25, 2024

OneNote Won’t Be Home to Hackers for Long

Microsoft may have intended for its note-taking software, OneNote, to be used for productivity, creativity, and organization. Unfortunately, it's become the app for hackers and malicious users to target victims with malware. Lucky for the world, Microsoft is changing that...
April 4, 2023

Apple Just Patched Over 30 iPhones Security Vulnerabilities

Software updates are an important way to keep your tech safe from malicious users. Whenever developers discover new security vulnerabilities, they'll work on patches to fix them, and include those patches in the next update. Apple just did the same,...
March 28, 2023

Is TikTok a Security Threat?

Congress seems poised to either ban TikTok from US app stores, or force the Chinese-based ByteDance to sell to an American company. But, why? What are the main concerns, and do they mean you can't use the app yourself? In...
March 28, 2023

Greek Government Installs Spyware on Dual-Citizen’s Smartphone

We all need to be wary when operating online. However, some of us need to be more careful than others. High-profile people are common targets for cyberattacks, as we see with a former executive on Meta's security policy team. The...
March 21, 2023

Certain Samsung Phones Susceptible to 18 Zero-Days Vulnerabilities

As far as security flaws go, zero-day vulnerabilities are among the worst. These vulnerabilities were unknown to the developer of the software, opening the risk that bad actors could find an exploit before a patch could be created. Samsung is...
March 21, 2023

Microsoft Shows How Business Email Compromise Attacks Are Quick

We all the understand the risk that comes with cyberattacks. Hackers are sophisticated, calculated, and ruthless, with the goal of taking as much data and money from victims as possible. However, these attacks may be even more dangerous than previously...
March 14, 2023

Introducing MERIT Solutions’ Acceptable Use Policy Template

Merit Solutions now has a template of our Acceptable Use Policy (AUP) conveniently placed on our website for all customers to download and review for their employees. In this piece, we will walk through what an Acceptable Use Policy is,...
March 13, 2023

Your iPhone Passcode Isn’t Secure

If you have an iPhone, you likely unlock it with Face ID or Touch ID. However, after enough time, we all need to punch in our four or six-digit passcodes to gain access. As it turns out, that passcode is...
March 7, 2023

Microsoft Is Forcing Everyone to Use ‘Defender’

There are plenty of excellent security tools out there to keep you safe while using your devices. However, the best security tools work best when most users (if not all) install them. Microsoft seems to be taking the extreme option...
February 28, 2023

Any MFA Is Better Than No MFA

It is difficult to emphasize enough the importance of multi-factor authentication (or MFA). It isn't enough to protect your account with a password alone. You need a secondary security solution that ensures bad actors can't break into your account if...
February 28, 2023
1 10 11 12 13 14 24



Sign Up for weekly MERIT Security Briefing

By signing up, you agree to our Privacy Policy.