Articles

Latest Articles

Microsoft Exchange Servers ’Under Active Exploitation’

Zero days are not good days, nor are they days at all. A zero day is a security vulnerability with an active exploit, which means someone, somewhere knows how to use the security flaw against other users. Luckily, most zero...
October 3, 2022

This Insurance Company Wants to Fight Cyberattacks

The battle against cyberattacks isn't easy. It's a hard fought, ever-changing challenge. In order to solve the issue, we need innovative solutions. One insurance company thinks they have the answers. Protocol interviewed Rotem Iram, co-founder and CEO of At-Bay, an...
October 3, 2022

Your Face Is AI Art’s Latest Subject

DALL•E 2 is an impressive piece of technology. At its core, it is an image generator powered by AI, that can create multiple versions of anything you tell it to in an instant. If you ask it to paint you...
September 26, 2022

AT&T Hosting Free Virtual Cybersecurity Conference

AT&T is no stranger to hosting cybersecurity conferences. Last year, the company's big event drew in more than 3,500 attendees. Perhaps you were among them! If not, no worries, because AT&T is back with a free, virtual cybersecurity conference, featuring...
September 26, 2022

Weak Password Cause in ‘Just For Fun’ Hack

High-profile hacks are not uncommon these days. Large companies and organizations are consistently subjected to cyberattacks. However, rarely do we hear one quite like this: The latest hack we're following in the news targeted Intercontinental Hotels Group (IHG), the owner...
September 19, 2022

The iPhone 14 Has a Fantastic Safety Feature

We tend to focus on the cybersecurity features our devices, and the devices rolling out, have to offer. However, Apple piqued our interest last week, with the unveiling of its new lines of iPhones. While the company's new iOS 16...
September 12, 2022

‘EvilProxy’ Helps Bad Actors Break Into Your Accounts

Your accounts are constantly under attack. Bad actors always look for new ways to break into services such as iCloud, Microsoft, and Facebook. When they don't know how to do it themselves, they turn to underground experts for help. EvilProxy,...
September 11, 2022

Malware From Outer Space

The James Webb Space Telescope is a feat of modern engineering, and continues to deliver one inspirational view of our universe after another. There is, unfortunately, one side effect of these fantastic, high-quality images, that Webb Telescope engineers likely never...
September 6, 2022

Google Chrome Has Another Zero-Day Problem

Google tends to update its popular web browser, Chrome, quite frequently. In fact, we tend to see at least one update a month, complete with new features and bug fixes cooked up by Google labs. However, every once in a...
September 6, 2022

How DuckDuckGo Can Protect Your Email

Your primary email address is under attack. On one hand, you have scammers and phishers, constantly bombarding your inbox with bunk in an attempt to steal your data. On the other hand, you have trackers, which follow your email activity...
August 30, 2022
1 25 26 27 28 29 34



Sign Up for weekly MERIT Security Briefing

By signing up, you agree to our Privacy Policy.