Articles

Latest Articles

Did You Know Your iPhone’s Camera Can Copy and Paste Text?

If you see an interesting sign when on a walk, or you want to save a menu for later, you might take a photo with your smartphone for future reference. But, as it turns out, you don't actually need to...
August 13, 2024

How You Can Protect Your Business From the Next CrowdStrike Fiasco

Microsoft and Delta are not getting along. Following last month's giant CrowdStrike outage, Delta struggled to get its flight schedules back to normal, and says the issue cost the airline $500 million. CrowdStrike objected to the criticisms, saying Delta failed...
August 13, 2024

Why Everyone Should Use a Password Manager

It's common cybersecurity advice to use a strong and unique password for each of your accounts. But keeping tabs on those many passwords is impossible if you try to keep them all memorized. While you might be tempted to jot...
August 6, 2024

Did You Know Your iPhone Can Remove the Background of Your Photos?

In the very recent past, if you wanted to remove the background of a picture, you had to master expensive editing software like Photoshop. No longer: Your iPhone is perfectly capable of isolating a subject in any of your photos,...
August 6, 2024

What Is The Dark Web?

If you read enough news stories about hackers and cyberattacks, you probably notice one term popping up again and again: “the dark web.” Reports make the dark web sound like a lawless corner of the internet, and, in many ways,...
July 30, 2024

Watch Out for Wire Transfer Fraud

Wire transfers are a standard practice for businesses and consumers to exchange funds. But watch out: Wire transfer fraud has risen dramatically, so it is critical that you and your employees understand the risks and become better prepared to protect your business from this pervasive threat. What...
July 23, 2024

What Are Business Email Compromises?

Business Email Compromises (BEC), also known as Email Account Compromises (EAC), pose a significant threat for businesses. These scams primarily target companies through email: The criminals behind BEC scams often act as trusted sources, such as company owners and executives, coworkers, vendors,...
July 23, 2024

Google Might Spend $23 Billion to Acquire a Cybersecurity Startup

According to The Wall Street Journal, Google is in "advanced talks" to acquire Wiz, a cybersecurity firm, for $23 billion. Wiz is not a legacy company in this space: The startup is only four years old, but has been growing...
July 16, 2024

Did You Know Your iPhone Can Identify Plants and Animals?

Your iPhone is smart (hence, smartphone) and is capable of many intelligent tasks. In fact, later this year, Apple will add some generative AI-powered features to certain iPhone models, as well. But you don't need an iPhone compatible with "Apple...
July 16, 2024

Did You Know Your iPhone Can Read Things to You?

Technology is supposed to make our lives easier. In many ways, it does without us thinking about it. But it can probably help out a lot more than you realize. Case in point: You shouldn't have to actually read anything...
July 8, 2024
1 15 16 17 18 19 40



Sign Up for weekly MERIT Security Briefing

By signing up, you agree to our Privacy Policy.