Articles

Latest Articles
Featured image for “Unprompted MFA Codes Are Bad News”

Unprompted MFA Codes Are Bad News

Multi-factor authentication (MFA) is one of the most powerful tools in your cybersecurity arsenal. When enabled, MFA can prevent bad…
March 19, 2024
Featured image for “Is ChatGPT a Security Threat?”

Is ChatGPT a Security Threat?

ChatGPT took the world by storm, and for good reason: The generative AI chatbot is capable of many feats, and…
March 18, 2024
Featured image for “Microsoft Has a Russian Hacker Problem”

Microsoft Has a Russian Hacker Problem

You read that right: Microsoft can’t seem to shake its Russian hackers. The company said Friday it was still attempting…
March 12, 2024
Featured image for “US DoJ Arrests Former Google Engineer for AI Tech Theft”

US DoJ Arrests Former Google Engineer for AI Tech Theft

As reported by The Hacker News, the US Department of Justice (DoJ) has indicted a Chinese national and resident of…
March 12, 2024
Featured image for “What to Do When Your Wi-Fi Seems Slow”

What to Do When Your Wi-Fi Seems Slow

When the internet is working as it should, you think nothing of it. Clicking on a website takes you where…
March 5, 2024
Featured image for “The FBI Is Watching Out for AI Attacks in the Upcoming Election”

The FBI Is Watching Out for AI Attacks in the Upcoming Election

The FBI expects the 2024 election to be a target for cyberattacks, especially those generated by artificial intelligence, FBI Director…
March 5, 2024
Featured image for “Protect Your Accounts from SIM-Swap and Port-Out Attacks”

Protect Your Accounts from SIM-Swap and Port-Out Attacks

There isn’t one type of cyberattack out there, nor is there one point of entry for hackers to target. While…
February 27, 2024
Featured image for “What Happens When Windows Server OS Reaches End of Life?”

What Happens When Windows Server OS Reaches End of Life?

No matter what type of technology you’re using, it’s important to stay up to date with the latest updates and…
February 25, 2024
Featured image for “Watch Out for These Malicious Apps on Android”

Watch Out for These Malicious Apps on Android

Malware on the Play Store is back. Google seems to have more issues with malicious software on its app marketplace…
February 20, 2024
Featured image for “Google Chrome’s New Feature Protects Your Home Network From Cyberattacks”

Google Chrome’s New Feature Protects Your Home Network From Cyberattacks

Bad actors are always looking for new ways to attack your network and steal your data. That’s why company’s like…
February 20, 2024

Can Your PC Be Upgraded to Windows 11?

Windows 10's days are numbered. As we outline here, Microsoft will drop support for Windows 10 on October 25, 2025. That's less than two years away, and anyone still running the popular OS will be putting themselves at risk once...
February 13, 2024

What Happens to PCs When Microsoft Stops Supporting Windows 10

All good things must come to an end—Windows 10 included. This OS is beloved for a reason, with many users enjoying everything from the UI to its stability and reliability. However, Windows 10 has been old news for some time...
February 13, 2024

Cyberattack Takes Lurie Children’s Hospital’s Network Offline

As a general rule of thumb, hackers—particularly those that engage in large scale cyberattacks—don't have much of a moral compass. They'll attack any business, large or small, if it means they'll make some money in the process. However, it's still...
February 6, 2024

Mastercard Is Using AI to Fight Fraud

Credit card fraud threatens both personal spending as well as your business' finances. Bad actors use a series of tricks to steal credit card information, and use that data to spend as much as they can before the target catches...
February 6, 2024

Senators Introduce New “Farm and Food Cybersecurity Act”

While personal responsibility goes a long way in preventing cybersecurity attacks, so too does legislative action. The more we can shore up our security from the top, the better off the entire system is. That's why it's intriguing to see...
January 30, 2024

Apple’s Stolen Device Protection Is a Powerful Security Tool

A good password is essential for securing your devices and data. However, it isn't foolproof. If a thief knows your iPhone passcode, for example, not only could they steal your device and unlock it, they could use that passcode to...
January 30, 2024

These Common Passwords Could Compromise Your Business

While there are plenty of excellent cybersecurity practices to follow, perhaps one of the top tips to keep in mind is to always use unique, difficult-to-guess passwords for all of your accounts. Of course, it's tempting to use a password...
January 23, 2024

How Copilot Can Boost Your Business in Microsoft 365

AI is everywhere these days, and Microsoft is certainly no exception. If you've been hearing about the company's latest AI endeavor, Copilot, you might be curious about what the tech can really do, and whether it's worth it for your...
January 23, 2024

Samsung Has Over 70 Bug Fixes for Your Galaxy Phone

The good thing about using a device made by a major company is the updates are usually reliable and effective. So it is with Samsung: The company's January update comes with more than 70 bug fixes for your Galaxy phone....
January 16, 2024

Watch Out for Hackers on Your Google Accounts

Google wants to retire the password, which is why it (along with other tech giants) are pushing passkeys as a security successor. However, sometimes passwords aren't the weak point in a security system. Case in point: It seems there's a...
January 16, 2024
1 2 3 4 5 24



Sign Up for weekly MERIT Security Briefing

By signing up, you agree to our Privacy Policy.