Articles

Latest Articles
Featured image for “Bad Actors Can Use Copy and Paste Against You”

Bad Actors Can Use Copy and Paste Against You

Copy and paste is second nature to just about all of us. You probably use it every day, on both…
March 11, 2025
Featured image for “Why HTTPS Matters So Much on the Web”

Why HTTPS Matters So Much on the Web

You visit websites like meritsolutions.net every day. But do you ever take a close look at the URL before you…
March 11, 2025
Featured image for “Windows’ File Explorer Is More Like a Web Browser Than You Think”

Windows’ File Explorer Is More Like a Web Browser Than You Think

When you’re browsing the internet, you rarely keep one window open at a time. Instead, you use tabs to multitask,…
March 4, 2025
Featured image for “You Can Connect Your Smartphone to Your Windows PC”

You Can Connect Your Smartphone to Your Windows PC

Control your phone from your PC.…
March 4, 2025
Featured image for “You Don’t Need to Tell Apps and Websites Exactly Where You Are”

You Don’t Need to Tell Apps and Websites Exactly Where You Are

It’s no secret smartphones actively use our locations. After all, navigation apps like Google Maps would be useless if not…
February 25, 2025
Featured image for “Organizations That Deal With Cardholder Information Must Adopt DMARC”

Organizations That Deal With Cardholder Information Must Adopt DMARC

Penalties for non-compliance range as high as $100,000.…
February 25, 2025
Featured image for “Google Chrome Now Uses AI to Protect Your Browsing Online”

Google Chrome Now Uses AI to Protect Your Browsing Online

It isn’t clear what’s new, however.…
February 17, 2025
Featured image for “Microsoft’s February Patch Tuesday Fixes Four Zero-Day Vulnerabilities”

Microsoft’s February Patch Tuesday Fixes Four Zero-Day Vulnerabilities

Fix these Windows issues ASAP.…
February 17, 2025
Featured image for “If You Have an iPhone, Turn On ‘Stolen Device Protection’ ASAP”

If You Have an iPhone, Turn On ‘Stolen Device Protection’ ASAP

A good password is essential for securing your devices and data. However, it isn’t foolproof. If a thief knows your…
February 11, 2025
Featured image for “Microsoft Edge Now Blocks Scareware”

Microsoft Edge Now Blocks Scareware

The internet is full of scams and malicious activity, but “scareware” or tech support scams are some of the more…
February 11, 2025

What’s a Zero-Day Vulnerability?

The cybersecurity news is full of horror stories these days of companies patching terrible security vulnerabilities left and right. But one term keeps popping up throughout these reports, so much so it might have you wondering: What is a zero-day...
January 17, 2023

You Need to Be Careful With Public Wi-Fi Networks

When you’re out and about, Wi-Fi can be hard to come by. That’s why it’s so useful to connect to public networks at coffee shops, airports, hotels, wherever you happen to be. But these networks aren’t exactly secure, and could...
January 17, 2023

What the LastPass Breach Means for You

In December, password manager LastPass issued a report detailing a massive data breach. The breach saw customer data leaked, including company names, user names, addresses, email addresses, phone numbers, and IP addresses. Most concerningly, though, hackers were able to obtain...
January 10, 2023

Microsoft Officially Ending Support for Windows 7

While the majority of PC users are running Windows 10 and Windows 11, millions of people around the world still run Windows 7. In fact, according to Statcounter GlobalStats, 11% of the world's Windows systems are running version 7. That's...
January 10, 2023

Your Webcam Can Be Better

Your computer or tablet's built-in webcam is great for convenience, but it won't give you the best image quality possible. When you're spending hours of your workday in virtual meetings, you want to put your best face forward. To up...
January 3, 2023

Ransomware Group Apologizes After Attacking Children’s Hospital

As we enter 2023, it's no secret hackers are a disruptive bunch. They attack any and all organizations, from governments to tech giants to essential services like hospitals. However, as it turns out, there is a line hackers don't want...
January 3, 2023

What’s the Difference Between USB-C and USB 3?

Even in an increasingly wireless world, USB cables are still a major presence in nearly all of our tech. Computers, smartphones, tablets, and cameras all use USB cables to charge batteries, transfer information, and connect other USB devices. Knowing which...
December 27, 2022

Ransomware Attack Temporarily Takes Down the Met

According to The New York Times, the Metropolitan Opera in New York is the largest performing arts organization in the country. As such, it might not be surprising to learn the Met is the latest high-profile organization to be targeted...
December 20, 2022

Microsoft Patches Two Zero-Day Vulnerabilities

Each month, Microsoft releases a big security update known as "Patch Tuesday." As the name implies, the update comes on the second Tuesday of each month, fixing any security vulnerabilities the company found since the previous Patch Tuesday update. This...
December 20, 2022

Is It Safe to Use AI Face Art?

You might have noticed recently an interesting trend on social media: More and more people are sharing portraits of themselves "painted" by AI. This AI art is generated by software to make fantastical portraits in seconds. But while the technology...
December 12, 2022
1 21 22 23 24 25 33



Sign Up for weekly MERIT Security Briefing

By signing up, you agree to our Privacy Policy.