Articles

Latest Articles
Featured image for “What Is The Dark Web?”

What Is The Dark Web?

If you read enough news stories about hackers and cyberattacks, you probably notice one term popping up again and again:…
July 30, 2024
Featured image for “Here’s What to Do If Your Credentials Are Compromised”

Here’s What to Do If Your Credentials Are Compromised

No one wants to learn their passwords were found in hack. Unfortunately, it’s all too common of an event: Bad…
July 30, 2024
Featured image for “Watch Out for Wire Transfer Fraud”

Watch Out for Wire Transfer Fraud

Wire transfers are a standard practice for businesses and consumers to exchange funds. But watch out: Wire transfer fraud has risen dramatically, so it…
July 23, 2024
Featured image for “What Are Business Email Compromises?”

What Are Business Email Compromises?

Business Email Compromises (BEC), also known as Email Account Compromises (EAC), pose a significant threat for businesses. These scams primarily target companies…
July 23, 2024
Featured image for “Google Might Spend $23 Billion to Acquire a Cybersecurity Startup”

Google Might Spend $23 Billion to Acquire a Cybersecurity Startup

According to The Wall Street Journal, Google is in “advanced talks” to acquire Wiz, a cybersecurity firm, for $23 billion.…
July 16, 2024
Featured image for “Did You Know Your iPhone Can Identify Plants and Animals?”

Did You Know Your iPhone Can Identify Plants and Animals?

Your iPhone is smart (hence, smartphone) and is capable of many intelligent tasks. In fact, later this year, Apple will…
July 16, 2024
Featured image for “Did You Know Your iPhone Can Read Things to You?”

Did You Know Your iPhone Can Read Things to You?

Technology is supposed to make our lives easier. In many ways, it does without us thinking about it. But it…
July 8, 2024
Featured image for “Try to Keep Your Phone Out of the Sun”

Try to Keep Your Phone Out of the Sun

Smartphones are a part of daily life, so of course they accompany us outside during summer. But with summer, comes…
July 8, 2024
Featured image for “Don’t Download Apps From Shady Sites”

Don’t Download Apps From Shady Sites

The internet is a massive place, and sometimes feels like it contains just about anything you could think of. If…
July 2, 2024
Featured image for “Did You Know There’s a Better Way to Select Items on Your iPhone?”

Did You Know There’s a Better Way to Select Items on Your iPhone?

Your iPhone is full of hidden controls and features you may or may not have stumbled upon over the years.…
July 2, 2024

Cisco Cyberattack Highlights Threats to MFA

Every cyberattack is bad news: As hackers and their attacks become more sophisticated, the information they steal and the networks they compromise are worth far more. However, some attacks are worse than others, including the method of attack. You need to...
August 15, 2022

Chrome Updates Matter For Many Browsers

While Google Chrome is the browser of choice for many of us, it's not a monopoly. There are plenty of other web browsers on the digital market for us to use, whether we browse on desktop or mobile. However, chances...
August 9, 2022

Apple Has a Malware Problem

Apple's App Stores are known for their tight-knit security: If an app is featured on the App Store, Apple wants you to feel confident it isn't harmful or dangerous (although it might not be able to vouch for its quality)....
August 9, 2022

The Genius of MFA Codes

Multi-factor authentication or two-factor authentication (MFA or 2FA, respectively), is one of the best ways you can protect your accounts from bad actors and malicious users. Even if hackers get a hold of your username and passwords (sometimes routinely leaked...
July 28, 2022

Delete These Malware Apps From Android ASAP

While the Google Play Store advertises itself as a safe place to download apps on Android, it isn't perfect. We learn about apps containing malware all the time, thanks to diligent work from researchers around the globe. It seems nearly...
July 28, 2022

US Seizes $500,000 From North Korean Hackers

North Korean hackers suffered a blow in their plot to steal funds from healthcare providers. The US Department of Justice seized $500,000 in Bitcoin from the alleged hackers, returning the funds to two hospitals. The hackers stole this money from...
July 25, 2022

Malware Threatens Developers Using GitHub

For developers, GitHub is an essential tool for collaborating on software projects. It allows teams to work together to build new features and address bugs and issues, without affecting the main code until everything is ready to go. While GitHub...
July 18, 2022

The White House Wants You Working In Cybersecurity

There are a lot of cybersecurity issues facing the tech world, as you no doubt are aware. The rise of cyberattacks against businesses, organizations, and governments is highly concerning, with the answer being less than certain. According to the US...
July 18, 2022

Google Fixes Zero-Day Chrome Flaw for Windows & Android

It's not uncommon for Google to issue new software updates for Chrome. In fact, the company issues at least one a month like clockwork. However, last week, we saw something slightly unusual: Not only did Google release a security update...
July 12, 2022

Traveling Internationally? Pay With Your Smartphone

As the world beings to return to a type of normalcy following the COVID-19 pandemic, travel (especially international travel) is starting to pick up. Many people will be flying overseas for the first time in years, ready to see new...
July 4, 2022
1 19 20 21 22 23 27



Sign Up for weekly MERIT Security Briefing

By signing up, you agree to our Privacy Policy.