Articles

Latest Articles
Featured image for “Google Is Making Your Android Phone More Secure”

Google Is Making Your Android Phone More Secure

If you use an Android phone for work, there are plenty of steps you can take to keep your sensitive…
May 21, 2024
Featured image for “This Apple Feature Can Ruin Your Business Calls”

This Apple Feature Can Ruin Your Business Calls

A couple weeks ago, we highlighted Voice Isolation, a feature on your iPhone that can enhance your voice when making…
May 21, 2024
Featured image for “Recommendations for Passwords on National Password Day”

Recommendations for Passwords on National Password Day

Earlier this month was National Password Day, and for a long time, the common attitude towards passwords was this: Make…
May 14, 2024
Featured image for “Apple’s Latest Update for iPhone Patches 15 Security Vulnerabilities”

Apple’s Latest Update for iPhone Patches 15 Security Vulnerabilities

Apple’s latest update for iPhones, iOS 17.5, adds a few new features for your smartphone. But aside from these fresh…
May 14, 2024
Featured image for “Hackers Break Into Dropbox Sign, Stealing Customer Information”

Hackers Break Into Dropbox Sign, Stealing Customer Information

As companies employ new tactics to defend themselves against cyberattacks, hackers continue to find a way in. So it is…
May 7, 2024
Featured image for “How “Voice Isolation” Can Make Your iPhone Calls Clearer”

How “Voice Isolation” Can Make Your iPhone Calls Clearer

Phone calls are an essential part of business life, but they aren’t always easy. There are many times that it’s…
May 7, 2024
Featured image for “Microsoft May Be Trying to Earn Back Trust in Cybersecurity”

Microsoft May Be Trying to Earn Back Trust in Cybersecurity

On an earnings call last week, Satya Nadella, CEO of Microsoft, told investors and analysts that the company would be…
April 30, 2024
Featured image for “Email Isn’t Always Secure (but It Can Be)”

Email Isn’t Always Secure (but It Can Be)

Usually, it’s good advice to keep sensitive and private information away from email. If you need to share confidential business…
April 30, 2024
Featured image for “You Should Check Which Apps on Your Smartphone Are Using Your Location”

You Should Check Which Apps on Your Smartphone Are Using Your Location

Thirty years ago, no one would believe we’d all voluntarily carry around devices that could be used to track our…
April 23, 2024
Featured image for “Protect Your Privacy By Forwarding Your Emails Through a Decoy Account”

Protect Your Privacy By Forwarding Your Emails Through a Decoy Account

One of the reasons our inboxes are full of spam is because our email addresses are all over the internet.…
April 23, 2024

This Insurance Company Wants to Fight Cyberattacks

The battle against cyberattacks isn't easy. It's a hard fought, ever-changing challenge. In order to solve the issue, we need innovative solutions. One insurance company thinks they have the answers. Protocol interviewed Rotem Iram, co-founder and CEO of At-Bay, an...
October 3, 2022

Your Face Is AI Art’s Latest Subject

DALL•E 2 is an impressive piece of technology. At its core, it is an image generator powered by AI, that can create multiple versions of anything you tell it to in an instant. If you ask it to paint you...
September 26, 2022

AT&T Hosting Free Virtual Cybersecurity Conference

AT&T is no stranger to hosting cybersecurity conferences. Last year, the company's big event drew in more than 3,500 attendees. Perhaps you were among them! If not, no worries, because AT&T is back with a free, virtual cybersecurity conference, featuring...
September 26, 2022

Weak Password Cause in ‘Just For Fun’ Hack

High-profile hacks are not uncommon these days. Large companies and organizations are consistently subjected to cyberattacks. However, rarely do we hear one quite like this: The latest hack we're following in the news targeted Intercontinental Hotels Group (IHG), the owner...
September 19, 2022

The iPhone 14 Has a Fantastic Safety Feature

We tend to focus on the cybersecurity features our devices, and the devices rolling out, have to offer. However, Apple piqued our interest last week, with the unveiling of its new lines of iPhones. While the company's new iOS 16...
September 12, 2022

‘EvilProxy’ Helps Bad Actors Break Into Your Accounts

Your accounts are constantly under attack. Bad actors always look for new ways to break into services such as iCloud, Microsoft, and Facebook. When they don't know how to do it themselves, they turn to underground experts for help. EvilProxy,...
September 11, 2022

Malware From Outer Space

The James Webb Space Telescope is a feat of modern engineering, and continues to deliver one inspirational view of our universe after another. There is, unfortunately, one side effect of these fantastic, high-quality images, that Webb Telescope engineers likely never...
September 6, 2022

Google Chrome Has Another Zero-Day Problem

Google tends to update its popular web browser, Chrome, quite frequently. In fact, we tend to see at least one update a month, complete with new features and bug fixes cooked up by Google labs. However, every once in a...
September 6, 2022

How DuckDuckGo Can Protect Your Email

Your primary email address is under attack. On one hand, you have scammers and phishers, constantly bombarding your inbox with bunk in an attempt to steal your data. On the other hand, you have trackers, which follow your email activity...
August 30, 2022

Hackers Can Take Over Your Apple Devices

Last week, Apple issued emergency security updates for iOS, iPadOS, and macOS. The company typically releases software updates for all its platforms at roughly the same time, but it doesn’t usually seed security updates like this, save for significant situations....
August 23, 2022
1 16 17 18 19 20 25



Sign Up for weekly MERIT Security Briefing

By signing up, you agree to our Privacy Policy.