Articles

Latest Articles
Featured image for “What Is The Dark Web?”

What Is The Dark Web?

If you read enough news stories about hackers and cyberattacks, you probably notice one term popping up again and again:…
July 30, 2024
Featured image for “Here’s What to Do If Your Credentials Are Compromised”

Here’s What to Do If Your Credentials Are Compromised

No one wants to learn their passwords were found in hack. Unfortunately, it’s all too common of an event: Bad…
July 30, 2024
Featured image for “Watch Out for Wire Transfer Fraud”

Watch Out for Wire Transfer Fraud

Wire transfers are a standard practice for businesses and consumers to exchange funds. But watch out: Wire transfer fraud has risen dramatically, so it…
July 23, 2024
Featured image for “What Are Business Email Compromises?”

What Are Business Email Compromises?

Business Email Compromises (BEC), also known as Email Account Compromises (EAC), pose a significant threat for businesses. These scams primarily target companies…
July 23, 2024
Featured image for “Google Might Spend $23 Billion to Acquire a Cybersecurity Startup”

Google Might Spend $23 Billion to Acquire a Cybersecurity Startup

According to The Wall Street Journal, Google is in “advanced talks” to acquire Wiz, a cybersecurity firm, for $23 billion.…
July 16, 2024
Featured image for “Did You Know Your iPhone Can Identify Plants and Animals?”

Did You Know Your iPhone Can Identify Plants and Animals?

Your iPhone is smart (hence, smartphone) and is capable of many intelligent tasks. In fact, later this year, Apple will…
July 16, 2024
Featured image for “Did You Know Your iPhone Can Read Things to You?”

Did You Know Your iPhone Can Read Things to You?

Technology is supposed to make our lives easier. In many ways, it does without us thinking about it. But it…
July 8, 2024
Featured image for “Try to Keep Your Phone Out of the Sun”

Try to Keep Your Phone Out of the Sun

Smartphones are a part of daily life, so of course they accompany us outside during summer. But with summer, comes…
July 8, 2024
Featured image for “Don’t Download Apps From Shady Sites”

Don’t Download Apps From Shady Sites

The internet is a massive place, and sometimes feels like it contains just about anything you could think of. If…
July 2, 2024
Featured image for “Did You Know There’s a Better Way to Select Items on Your iPhone?”

Did You Know There’s a Better Way to Select Items on Your iPhone?

Your iPhone is full of hidden controls and features you may or may not have stumbled upon over the years.…
July 2, 2024

The iPhone’s Port Is Likely to Change Again (But That’s OK)

Apple has a history of changing up its ports across its devices. You can look to the different types of charging cables its used for its MacBooks over the years: You could note how the company dropped almost all of...
July 4, 2022

Alleged Cyberattack Sets Off Israeli Missile Sirens

Cyberattacks comes in many shapes and sizes: Hackers use the tools at their disposal to go after companies and organisations with different goals, such as money, power, or simply to "troll." However, sometimes, the stakes are much higher: Global powers...
June 27, 2022

This Dangerous Russian Botnet Is No More

If you were a hacker, what would make for an ideal target? Would you send phishing emails to unsuspecting users, hoping one would share their credentials? Would you ping their phone with a malicious link that gives you access to...
June 24, 2022

Microsoft Patches 55 Vulnerabilities, Including Zero-Day ‘Follina’

Microsoft's Patch Tuesday is, at this point, security tradition. The company issues new software updates for machines running Windows on the second Tuesday of every month, containing patches for security vulnerabilities discovered since the last Patch Tuesday. Microsoft's latest update...
June 20, 2022

Update Your Zoom Client ASAP

The COVID-19 pandemic propelled Zoom as the choice for video conferencing in both professional and personal circles. While Microsoft Teams is a close second, the name "Zoom" has become a noun and a verb, similar to how we "Google" questions...
June 20, 2022

Four Steps to Address the Threat of Ransomware

Ransomware is a concerning trend in the modern business world. With each new cybersecurity story that makes the news, it may seem nearly impossible to protect your business from these devastating attacks. However, if you follow certain best practices, you...
June 14, 2022

Beware ‘SearchNightmare,’ the Latest Microsoft Vulnerability

Last week, we covered "Follina," the Microsoft security vulnerability affecting Microsoft Office documents. After you opened an affected Office document, a bad actor could potentially take control of your system. This week, the threat turns to "SearchNightmare," another Microsoft vulnerability....
June 7, 2022

Don’t Let Hurricanes Impact Your Systems

Severe weather events, like hurricanes, are common, but nevertheless devastating. When high winds and torrential rains interfere with electricity and power, shutting down networks and systems, business grinds to a halt. With the proper precautions, however, you can ensure your business...
June 7, 2022

How to Avoid ‘Facestealer’ Malware on Android

Malware on Android isn't a rare topic, unfortunately. While Google has a system to vet apps on the Play Store, hackers are clever, and find ways to slip malicious software through the cracks. "Facestealer" is the latest such software to...
May 31, 2022

Watch Out for This Microsoft Office Vulnerability

Security vulnerabilities aren't fun, especially when they affect products we rely on every day. A new vulnerability, dubbed "Follina," unfortunately targets a suite of apps you likely use all the time: Microsoft Office. Follina, which Microsoft has identified as CVE-2022-30190,...
May 31, 2022
1 20 21 22 23 24 27



Sign Up for weekly MERIT Security Briefing

By signing up, you agree to our Privacy Policy.