Articles

Latest Articles

This Dangerous Russian Botnet Is No More

If you were a hacker, what would make for an ideal target? Would you send phishing emails to unsuspecting users, hoping one would share their credentials? Would you ping their phone with a malicious link that gives you access to...
June 24, 2022

Microsoft Patches 55 Vulnerabilities, Including Zero-Day ‘Follina’

Microsoft's Patch Tuesday is, at this point, security tradition. The company issues new software updates for machines running Windows on the second Tuesday of every month, containing patches for security vulnerabilities discovered since the last Patch Tuesday. Microsoft's latest update...
June 20, 2022

Update Your Zoom Client ASAP

The COVID-19 pandemic propelled Zoom as the choice for video conferencing in both professional and personal circles. While Microsoft Teams is a close second, the name "Zoom" has become a noun and a verb, similar to how we "Google" questions...
June 20, 2022

Four Steps to Address the Threat of Ransomware

Ransomware is a concerning trend in the modern business world. With each new cybersecurity story that makes the news, it may seem nearly impossible to protect your business from these devastating attacks. However, if you follow certain best practices, you...
June 14, 2022

Beware ‘SearchNightmare,’ the Latest Microsoft Vulnerability

Last week, we covered "Follina," the Microsoft security vulnerability affecting Microsoft Office documents. After you opened an affected Office document, a bad actor could potentially take control of your system. This week, the threat turns to "SearchNightmare," another Microsoft vulnerability....
June 7, 2022

Don’t Let Hurricanes Impact Your Systems

Severe weather events, like hurricanes, are common, but nevertheless devastating. When high winds and torrential rains interfere with electricity and power, shutting down networks and systems, business grinds to a halt. With the proper precautions, however, you can ensure your business...
June 7, 2022

How to Avoid ‘Facestealer’ Malware on Android

Malware on Android isn't a rare topic, unfortunately. While Google has a system to vet apps on the Play Store, hackers are clever, and find ways to slip malicious software through the cracks. "Facestealer" is the latest such software to...
May 31, 2022

Watch Out for This Microsoft Office Vulnerability

Security vulnerabilities aren't fun, especially when they affect products we rely on every day. A new vulnerability, dubbed "Follina," unfortunately targets a suite of apps you likely use all the time: Microsoft Office. Follina, which Microsoft has identified as CVE-2022-30190,...
May 31, 2022

Apple Releases Security Patches for All Devices

Last week, Apple released security patches for the iPhone, iPad, and Mac. While the company didn't advertise these software updates as security patches, the new versions fix dozens upon dozens of security vulnerabilities across iOS, iPadOS, and macOS. If you...
May 23, 2022

You Can Remove Your Personal Information From Google

Google is a powerful, essential search engine that helps us find everything from new recipes to affordable flights. But unless you're trying to sell something attached to your name, you probably don't want your personal, identifying information available on Google...
May 23, 2022
1 28 29 30 31 32 35



Sign Up for weekly MERIT Security Briefing

By signing up, you agree to our Privacy Policy.