Articles

Latest Articles
Featured image for “Bad Actors Can Use Copy and Paste Against You”

Bad Actors Can Use Copy and Paste Against You

Copy and paste is second nature to just about all of us. You probably use it every day, on both…
March 11, 2025
Featured image for “Why HTTPS Matters So Much on the Web”

Why HTTPS Matters So Much on the Web

You visit websites like meritsolutions.net every day. But do you ever take a close look at the URL before you…
March 11, 2025
Featured image for “Windows’ File Explorer Is More Like a Web Browser Than You Think”

Windows’ File Explorer Is More Like a Web Browser Than You Think

When you’re browsing the internet, you rarely keep one window open at a time. Instead, you use tabs to multitask,…
March 4, 2025
Featured image for “You Can Connect Your Smartphone to Your Windows PC”

You Can Connect Your Smartphone to Your Windows PC

Control your phone from your PC.…
March 4, 2025
Featured image for “You Don’t Need to Tell Apps and Websites Exactly Where You Are”

You Don’t Need to Tell Apps and Websites Exactly Where You Are

It’s no secret smartphones actively use our locations. After all, navigation apps like Google Maps would be useless if not…
February 25, 2025
Featured image for “Organizations That Deal With Cardholder Information Must Adopt DMARC”

Organizations That Deal With Cardholder Information Must Adopt DMARC

Penalties for non-compliance range as high as $100,000.…
February 25, 2025
Featured image for “Google Chrome Now Uses AI to Protect Your Browsing Online”

Google Chrome Now Uses AI to Protect Your Browsing Online

It isn’t clear what’s new, however.…
February 17, 2025
Featured image for “Microsoft’s February Patch Tuesday Fixes Four Zero-Day Vulnerabilities”

Microsoft’s February Patch Tuesday Fixes Four Zero-Day Vulnerabilities

Fix these Windows issues ASAP.…
February 17, 2025
Featured image for “If You Have an iPhone, Turn On ‘Stolen Device Protection’ ASAP”

If You Have an iPhone, Turn On ‘Stolen Device Protection’ ASAP

A good password is essential for securing your devices and data. However, it isn’t foolproof. If a thief knows your…
February 11, 2025
Featured image for “Microsoft Edge Now Blocks Scareware”

Microsoft Edge Now Blocks Scareware

The internet is full of scams and malicious activity, but “scareware” or tech support scams are some of the more…
February 11, 2025

Cybersecurity Tips for Small to Midsize Businesses

Cyberattacks are reported in the news so often these days, you would be forgiven for thinking they were inevitable. While attackers are quite sophisticated, a good plan of attack can keep them away from your networks. From both preventing attacks...
May 15, 2023

U.S. Justice Department Seizes 13 DDoS-for-hire Domains

The U.S. Justice Department seized 13 domains responsible for DDoS-for-hire services, sometimes called "stressor" or "booter" services. These services outsource the work of hacking to those with the resources and skills to do so (as well as access to the...
May 9, 2023

You Can Report Spam Messages to Your Carrier

Spam texts are frustrating, and numerous. For some of us, it's tough to see a day go by without another text from a malicious or suspicious sender, which, at the end of the day, can threaten your business. But you...
May 9, 2023

Don’t Fall for Spoofing

When you receive a phone call, caller ID is supposed to tell you who's on the other end. And yet, it can't be trusted: While the caller might be based in the location they're calling from, or might be the...
May 2, 2023

The World Wide Web Is 30 Years Old

You're reading these words thanks to the internet. Before it, you might've needed to subscribe to a physical newsletter, or a magazine produced by the company directly. But with the power of the internet, and the World Wide Web, it's...
May 2, 2023

Hackers Don’t Always Attack Your Business on the Internet

When we think of hackers, we think we of sophisticated actors across the internet—users who know how to code their way into malicious attacks to earn money. That is true, and it's the basis for many attacks. However, sometimes, attacks...
April 25, 2023

Singapore and France Are Working Together on AI for Cybersecurity

AI is advancing more rapidly than anyone thought possible. It has gone beyond niche tech circles, and is now accessible by anyone with a smartphone or computer. As such, everyone from businesses to governments is working on ways to implement...
April 25, 2023

Public Chargers Are Not Safe, Warns FBI

Our society is mobile: From smartphones to laptops, work can go wherever we do, as long as there's charge left in the batteries. However, you shouldn't charge your devices just anywhere, as the FBI warned last week. You may be...
April 18, 2023

Protecting Your Business From Different Types of Phishing Attacks

A phishing attack is a general term for a type of cyberattack in which bad actors contact a large pool of people with malicious links or software hoping to trick some into clicking. The end goal, of course, is a...
April 18, 2023

Apple Issues Security Update for Older Devices

Our devices last longer and longer these days, even when their manufacturers' decide to stop supporting them. But just because a smartphone or computer does not receive the last software updates, that doesn't mean they're cut off from the rest...
April 10, 2023
1 18 19 20 21 22 33



Sign Up for weekly MERIT Security Briefing

By signing up, you agree to our Privacy Policy.