Articles

Latest Articles
Featured image for “Watch Out for These Malicious Apps on Android”

Watch Out for These Malicious Apps on Android

Malware on the Play Store is back. Google seems to have more issues with malicious software on its app marketplace…
February 20, 2024
Featured image for “Google Chrome’s New Feature Protects Your Home Network From Cyberattacks”

Google Chrome’s New Feature Protects Your Home Network From Cyberattacks

Bad actors are always looking for new ways to attack your network and steal your data. That’s why company’s like…
February 20, 2024
Featured image for “Can Your PC Be Upgraded to Windows 11?”

Can Your PC Be Upgraded to Windows 11?

Windows 10’s days are numbered. As we outline here, Microsoft will drop support for Windows 10 on October 25, 2025.…
February 13, 2024
Featured image for “What Happens to PCs When Microsoft Stops Supporting Windows 10”

What Happens to PCs When Microsoft Stops Supporting Windows 10

All good things must come to an end—Windows 10 included. This OS is beloved for a reason, with many users…
February 13, 2024
Featured image for “Cyberattack Takes Lurie Children’s Hospital’s Network Offline”

Cyberattack Takes Lurie Children’s Hospital’s Network Offline

As a general rule of thumb, hackers—particularly those that engage in large scale cyberattacks—don’t have much of a moral compass.…
February 6, 2024
Featured image for “Mastercard Is Using AI to Fight Fraud”

Mastercard Is Using AI to Fight Fraud

Credit card fraud threatens both personal spending as well as your business’ finances. Bad actors use a series of tricks…
February 6, 2024
Featured image for “Senators Introduce New “Farm and Food Cybersecurity Act””

Senators Introduce New “Farm and Food Cybersecurity Act”

While personal responsibility goes a long way in preventing cybersecurity attacks, so too does legislative action. The more we can…
January 30, 2024
Featured image for “Apple’s Stolen Device Protection Is a Powerful Security Tool”

Apple’s Stolen Device Protection Is a Powerful Security Tool

A good password is essential for securing your devices and data. However, it isn’t foolproof. If a thief knows your…
January 30, 2024
Featured image for “These Common Passwords Could Compromise Your Business”

These Common Passwords Could Compromise Your Business

While there are plenty of excellent cybersecurity practices to follow, perhaps one of the top tips to keep in mind…
January 23, 2024
Featured image for “How Copilot Can Boost Your Business in Microsoft 365”

How Copilot Can Boost Your Business in Microsoft 365

AI is everywhere these days, and Microsoft is certainly no exception. If you’ve been hearing about the company’s latest AI…
January 23, 2024

Twitter Faces a New Verification Scam

Elon Musk has finally taken control of Twitter. After months of news headlines and speculations, Musk has acquired the social media company and taken the helm as CEO. While there is plenty of discussion about this new leadership, and the...
November 1, 2022

Netflix Is Ending Free Password Sharing

Streaming used to be the answer to cable TV: Customers were fed up with high prices, without any way to pick and choose the channels they wanted to subscribe to. Services like Netflix brought that choice back to the market,...
October 25, 2022

TikTok Allegedly Planned to Spy on American Citizens

For all its rampant growth and success as a social media app, TikTok has landed itself in hot water more than a few times. The US Government has highlighted the app as a potential security risk for US citizens, and...
October 25, 2022

When in Doubt, Play it Safe

It can be difficult these days to quickly identify whether a message is spam or not. Sure, some are dead giveaways: Emails that get your name wrong; texts riddled with typos and grammatical mistakes; calls from services you don't subscribe...
October 18, 2022

Over 400 iPhone & Android Apps Stole Facebook Login Data

Facebook isn't known for its privacy standards. In fact, it's known for the opposite. Facebook takes and sells user data as a business model, and that isn't news to anyone. However, its parent company, Meta, is looking out for the...
October 10, 2022

Google’s Big Privacy Play With the Pixel 7

Last week, Google unveiled its latest two smartphones: the Pixel 7 and Pixel 7 Pro. These devices offer some modest upgrades over last year’s Pixel 6 and Pixel 6 Pro, including upgraded Tensor processors and improved cameras. But with these...
October 10, 2022

Microsoft Exchange Servers ’Under Active Exploitation’

Zero days are not good days, nor are they days at all. A zero day is a security vulnerability with an active exploit, which means someone, somewhere knows how to use the security flaw against other users. Luckily, most zero...
October 3, 2022

This Insurance Company Wants to Fight Cyberattacks

The battle against cyberattacks isn't easy. It's a hard fought, ever-changing challenge. In order to solve the issue, we need innovative solutions. One insurance company thinks they have the answers. Protocol interviewed Rotem Iram, co-founder and CEO of At-Bay, an...
October 3, 2022

Your Face Is AI Art’s Latest Subject

DALL•E 2 is an impressive piece of technology. At its core, it is an image generator powered by AI, that can create multiple versions of anything you tell it to in an instant. If you ask it to paint you...
September 26, 2022

AT&T Hosting Free Virtual Cybersecurity Conference

AT&T is no stranger to hosting cybersecurity conferences. Last year, the company's big event drew in more than 3,500 attendees. Perhaps you were among them! If not, no worries, because AT&T is back with a free, virtual cybersecurity conference, featuring...
September 26, 2022
1 13 14 15 16 17 23



Sign Up for weekly MERIT Security Briefing

By signing up, you agree to our Privacy Policy.