Articles

Latest Articles
Featured image for “Bad Actors Can Use Copy and Paste Against You”

Bad Actors Can Use Copy and Paste Against You

Copy and paste is second nature to just about all of us. You probably use it every day, on both…
March 11, 2025
Featured image for “Why HTTPS Matters So Much on the Web”

Why HTTPS Matters So Much on the Web

You visit websites like meritsolutions.net every day. But do you ever take a close look at the URL before you…
March 11, 2025
Featured image for “Windows’ File Explorer Is More Like a Web Browser Than You Think”

Windows’ File Explorer Is More Like a Web Browser Than You Think

When you’re browsing the internet, you rarely keep one window open at a time. Instead, you use tabs to multitask,…
March 4, 2025
Featured image for “You Can Connect Your Smartphone to Your Windows PC”

You Can Connect Your Smartphone to Your Windows PC

Control your phone from your PC.…
March 4, 2025
Featured image for “You Don’t Need to Tell Apps and Websites Exactly Where You Are”

You Don’t Need to Tell Apps and Websites Exactly Where You Are

It’s no secret smartphones actively use our locations. After all, navigation apps like Google Maps would be useless if not…
February 25, 2025
Featured image for “Organizations That Deal With Cardholder Information Must Adopt DMARC”

Organizations That Deal With Cardholder Information Must Adopt DMARC

Penalties for non-compliance range as high as $100,000.…
February 25, 2025
Featured image for “Google Chrome Now Uses AI to Protect Your Browsing Online”

Google Chrome Now Uses AI to Protect Your Browsing Online

It isn’t clear what’s new, however.…
February 17, 2025
Featured image for “Microsoft’s February Patch Tuesday Fixes Four Zero-Day Vulnerabilities”

Microsoft’s February Patch Tuesday Fixes Four Zero-Day Vulnerabilities

Fix these Windows issues ASAP.…
February 17, 2025
Featured image for “If You Have an iPhone, Turn On ‘Stolen Device Protection’ ASAP”

If You Have an iPhone, Turn On ‘Stolen Device Protection’ ASAP

A good password is essential for securing your devices and data. However, it isn’t foolproof. If a thief knows your…
February 11, 2025
Featured image for “Microsoft Edge Now Blocks Scareware”

Microsoft Edge Now Blocks Scareware

The internet is full of scams and malicious activity, but “scareware” or tech support scams are some of the more…
February 11, 2025

These Google Ads Are Actually Malicious

Google ads can be a mild annoyance, or useful, if relevant to your search or general interests. However, occasionally, they can be malicious and dangerous, so you need to be on the lookout at all times.  As reported by The...
October 24, 2023

Okta Customer Data Exposed in Security Breach

Okta, a popular identity services provider, acknowledged a security breach that allowed bad actors to access its support case management system via stolen account credentials.  David Bradbury, chief security officer for Okta, commented the following: "The threat actor was able...
October 24, 2023

Don’t Store Your Company Passwords in a Plain Text File

There are plenty of "rules" for keeping your various accounts safe: Use a strong password for each of your accounts; don't reuse passwords; set up multi-factor authentication whenever possible. But as important as making your passwords is, it's just as...
October 17, 2023

Vietnamese Government Agents Attempted to Infect U.S. Congressmen’s iPhones

We all need to be on the lookout for hacking, but some of us need to be more careful than others. The higher profile you are, the more likely you are to be targeted in one of these attacks. That’s...
October 10, 2023

The NSA Is Creating an Artificial Intelligence Security Center

As AI—specifically generative AI—continues to capture the attention and imagination of us all, it becomes more evident than ever that we need to be prepared to live in an AI-influence world. Governments, as it seems, are well aware of this...
October 3, 2023

Thinking About AI’s Role in Election Security

One of the biggest stories in cybersecurity over the last decade or so has been election interference. The internet empowers hackers in different countries to meddle in other nations’ election processes. But there’s a new factor we haven’t seen in...
October 3, 2023

Watch Out for PDF Phishing Schemes

Scams are an unavoidable part of daily life these days. But that doesn't mean all scams are the same: There is a huge variety of ways hackers and bad actors attempt to steal your personal information, with no end in...
September 26, 2023

Passkeys Are Here to Replace Passwords

We all have a lot of passwords. Ideally, each one is strong and unique, but that isn't always the case. Many of us reuse the same, weak passwords, which leaves our digital data vulnerable to hacking. Even if our passwords...
September 26, 2023

Apple’s ‘Lockdown Mode’ Can Protect Against the Worst Cyberattacks

We all have to deal with cybersecurity threats. Calls, texts, and emails from scammers and bad actors can jeopardize our data and digital lives. However, a small percentage of us have cybersecurity issues that are far more serious. Journalists, politicians,...
September 19, 2023

Scammers Are Getting Better at Stealing Money From You and Your Business

While many still fall for even the most basic of scams these days, more of us than ever are educated on what to look out for. You probably know, for example, that a call about your "car's extended warranty" is...
September 19, 2023
1 14 15 16 17 18 33



Sign Up for weekly MERIT Security Briefing

By signing up, you agree to our Privacy Policy.