Articles

Latest Articles
Featured image for “Bad Actors Can Use Copy and Paste Against You”

Bad Actors Can Use Copy and Paste Against You

Copy and paste is second nature to just about all of us. You probably use it every day, on both…
March 11, 2025
Featured image for “Why HTTPS Matters So Much on the Web”

Why HTTPS Matters So Much on the Web

You visit websites like meritsolutions.net every day. But do you ever take a close look at the URL before you…
March 11, 2025
Featured image for “Windows’ File Explorer Is More Like a Web Browser Than You Think”

Windows’ File Explorer Is More Like a Web Browser Than You Think

When you’re browsing the internet, you rarely keep one window open at a time. Instead, you use tabs to multitask,…
March 4, 2025
Featured image for “You Can Connect Your Smartphone to Your Windows PC”

You Can Connect Your Smartphone to Your Windows PC

Control your phone from your PC.…
March 4, 2025
Featured image for “You Don’t Need to Tell Apps and Websites Exactly Where You Are”

You Don’t Need to Tell Apps and Websites Exactly Where You Are

It’s no secret smartphones actively use our locations. After all, navigation apps like Google Maps would be useless if not…
February 25, 2025
Featured image for “Organizations That Deal With Cardholder Information Must Adopt DMARC”

Organizations That Deal With Cardholder Information Must Adopt DMARC

Penalties for non-compliance range as high as $100,000.…
February 25, 2025
Featured image for “Google Chrome Now Uses AI to Protect Your Browsing Online”

Google Chrome Now Uses AI to Protect Your Browsing Online

It isn’t clear what’s new, however.…
February 17, 2025
Featured image for “Microsoft’s February Patch Tuesday Fixes Four Zero-Day Vulnerabilities”

Microsoft’s February Patch Tuesday Fixes Four Zero-Day Vulnerabilities

Fix these Windows issues ASAP.…
February 17, 2025
Featured image for “If You Have an iPhone, Turn On ‘Stolen Device Protection’ ASAP”

If You Have an iPhone, Turn On ‘Stolen Device Protection’ ASAP

A good password is essential for securing your devices and data. However, it isn’t foolproof. If a thief knows your…
February 11, 2025
Featured image for “Microsoft Edge Now Blocks Scareware”

Microsoft Edge Now Blocks Scareware

The internet is full of scams and malicious activity, but “scareware” or tech support scams are some of the more…
February 11, 2025

Protecting Your Business from Cloud Security Breaches

Cloud-based solutions have never been more popular for small to medium-sized businesses, and it's easy to see why. The convenience and potential offered by the cloud means businesses can operate and grow at a greater pace. However, just as it's...
April 10, 2023

Federal Agents Need to Patch These Spyware Exploits

Spyware is nasty business. It's a form of malware designed to live on the victim's devices and report back their every move to the host, including everything from browsing activity to keystrokes. Unfortunately, a massive spyware campaign was successfully run...
April 4, 2023

OneNote Won’t Be Home to Hackers for Long

Microsoft may have intended for its note-taking software, OneNote, to be used for productivity, creativity, and organization. Unfortunately, it's become the app for hackers and malicious users to target victims with malware. Lucky for the world, Microsoft is changing that...
April 4, 2023

Apple Just Patched Over 30 iPhones Security Vulnerabilities

Software updates are an important way to keep your tech safe from malicious users. Whenever developers discover new security vulnerabilities, they'll work on patches to fix them, and include those patches in the next update. Apple just did the same,...
March 28, 2023

Is TikTok a Security Threat?

Congress seems poised to either ban TikTok from US app stores, or force the Chinese-based ByteDance to sell to an American company. But, why? What are the main concerns, and do they mean you can't use the app yourself? In...
March 28, 2023

Greek Government Installs Spyware on Dual-Citizen’s Smartphone

We all need to be wary when operating online. However, some of us need to be more careful than others. High-profile people are common targets for cyberattacks, as we see with a former executive on Meta's security policy team. The...
March 21, 2023

Certain Samsung Phones Susceptible to 18 Zero-Days Vulnerabilities

As far as security flaws go, zero-day vulnerabilities are among the worst. These vulnerabilities were unknown to the developer of the software, opening the risk that bad actors could find an exploit before a patch could be created. Samsung is...
March 21, 2023

Microsoft Shows How Business Email Compromise Attacks Are Quick

We all the understand the risk that comes with cyberattacks. Hackers are sophisticated, calculated, and ruthless, with the goal of taking as much data and money from victims as possible. However, these attacks may be even more dangerous than previously...
March 14, 2023

Introducing MERIT Solutions’ Acceptable Use Policy Template

Merit Solutions now has a template of our Acceptable Use Policy (AUP) conveniently placed on our website for all customers to download and review for their employees. In this piece, we will walk through what an Acceptable Use Policy is,...
March 13, 2023

Your iPhone Passcode Isn’t Secure

If you have an iPhone, you likely unlock it with Face ID or Touch ID. However, after enough time, we all need to punch in our four or six-digit passcodes to gain access. As it turns out, that passcode is...
March 7, 2023
1 19 20 21 22 23 33



Sign Up for weekly MERIT Security Briefing

By signing up, you agree to our Privacy Policy.