Articles

Latest Articles
Featured image for “Bad Actors Can Use Copy and Paste Against You”

Bad Actors Can Use Copy and Paste Against You

Copy and paste is second nature to just about all of us. You probably use it every day, on both…
March 11, 2025
Featured image for “Why HTTPS Matters So Much on the Web”

Why HTTPS Matters So Much on the Web

You visit websites like meritsolutions.net every day. But do you ever take a close look at the URL before you…
March 11, 2025
Featured image for “Windows’ File Explorer Is More Like a Web Browser Than You Think”

Windows’ File Explorer Is More Like a Web Browser Than You Think

When you’re browsing the internet, you rarely keep one window open at a time. Instead, you use tabs to multitask,…
March 4, 2025
Featured image for “You Can Connect Your Smartphone to Your Windows PC”

You Can Connect Your Smartphone to Your Windows PC

Control your phone from your PC.…
March 4, 2025
Featured image for “You Don’t Need to Tell Apps and Websites Exactly Where You Are”

You Don’t Need to Tell Apps and Websites Exactly Where You Are

It’s no secret smartphones actively use our locations. After all, navigation apps like Google Maps would be useless if not…
February 25, 2025
Featured image for “Organizations That Deal With Cardholder Information Must Adopt DMARC”

Organizations That Deal With Cardholder Information Must Adopt DMARC

Penalties for non-compliance range as high as $100,000.…
February 25, 2025
Featured image for “Google Chrome Now Uses AI to Protect Your Browsing Online”

Google Chrome Now Uses AI to Protect Your Browsing Online

It isn’t clear what’s new, however.…
February 17, 2025
Featured image for “Microsoft’s February Patch Tuesday Fixes Four Zero-Day Vulnerabilities”

Microsoft’s February Patch Tuesday Fixes Four Zero-Day Vulnerabilities

Fix these Windows issues ASAP.…
February 17, 2025
Featured image for “If You Have an iPhone, Turn On ‘Stolen Device Protection’ ASAP”

If You Have an iPhone, Turn On ‘Stolen Device Protection’ ASAP

A good password is essential for securing your devices and data. However, it isn’t foolproof. If a thief knows your…
February 11, 2025
Featured image for “Microsoft Edge Now Blocks Scareware”

Microsoft Edge Now Blocks Scareware

The internet is full of scams and malicious activity, but “scareware” or tech support scams are some of the more…
February 11, 2025

MGM Shuts Down Computers Across the Country Due to Cybersecurity Issue

No business is immune to cybersecurity threats—not even casinos. A "cybersecurity issue" has caused MGM Resorts International to shut down computers across some of its casinos and hotels here in the US. This issue reportedly started Sunday, affecting properties in...
September 12, 2023

What Apple’s Latest Software Update Means for Your Security

Apple's latest security update is one you won't want to skip. Whether you have a personal Apple device or one for work, a new security flaw is currently threatening both your private and business data. The company released its newest...
September 12, 2023

Watch Out for Charity Scammers

Phone scams are becoming more and more sophisticated. While they can be easy to spot—such as a call about your car's extended warranty—they can also be clever, and trick you into thinking there's a legitimate caller on the other end...
September 5, 2023

X Will Collect Biometric Data to Fight Its Impersonation Problem

Twitter, now known as X, will collect biometric data from its premium users in an effort to combat its fraud and impersonation problem. The company didn't announce this news publicly. Rather, X quietly updated its privacy policy to reflect the...
September 5, 2023

Should Your Turn Off Wi-Fi & Bluetooth on Your Devices?

Wi-Fi and Bluetooth are essential connection types. All of our modern devices use them, and use them frequently: Your computer uses Wi-Fi to connect to the internet, and power everything from email to Zoom, while Bluetooth is responsible for making...
August 29, 2023

How to Control Which Apps Have Access to Your Camera & Microphone

These days, most of our devices come equipped with a camera and/or a microphone. Whether it's your work laptop, with its webcam you use for Zoom calls, or your smartphone, whose camera you use for all the photos and videos...
August 29, 2023

Researchers Trick AI Models Into Hacking

AI large language models seems complex, and they are. But they aren't so complex that they can't be tricked into doing things they weren't designed for. In fact, with enough know-how, you can trick AI models like ChatGPT into scamming...
August 15, 2023

Hackers Can Win Almost $20 Million By Using AI to Protect Against Cyberattacks

When you hear "hackers" and "cyberattacks" in the same sentence, it's usually bad news. Usually. Sometimes, however, it can actually be a good thing. Take this week's news for example, where the Biden administration invited hackers to help protect the...
August 15, 2023

It Takes a Lot to Protect Your Accounts

The security of your business often comes down to individual decisions and actions. Hackers frequently break into networks through one weak point, whether that's because an employee left their password on a sticky note, or reused their password multiple times....
August 7, 2023

We Might Need AI to Defeat AI

AI presents many potential positives for both business and personal lives, but it also comes with many risks as well. We've seen how AI can be used to improve the abilities of bad actors, both through the development of malware...
August 7, 2023
1 15 16 17 18 19 33



Sign Up for weekly MERIT Security Briefing

By signing up, you agree to our Privacy Policy.