Articles

Latest Articles

New Vulnerabilities Threaten Backup Systems for Major Institutions

Uninterruptible power supply (UPS) devices are used for supplying backup power in case of an outage. These devices are used primarily in institutions such as hospitals, industrial systems, and server rooms. A new report spells bad news for these devices,...
March 15, 2022

Video Call Tip: What’s Your Name?

When you join a video call, whether on Zoom, Teams, or another platform, an important aspect is one that's taken for granted: Your name. You likely don't think about your video call name at all; you set it once and...
March 8, 2022

Hackers Steal Samsung Galaxy Source Code

Samsung announced on Monday, March 7, that hackers successfully stole source code for the company's Galaxy smartphones. This type of attack isn't something we hear about daily, so it's an important red flag in cybersecurity news. The hacker group responsible,...
March 8, 2022

Be On Alert From Increased International Cyberattacks

The ongoing conflict—and now war—between Russia and Ukraine is dangerous in many ways, not least of which in terms of cybersecurity vulnerabilities. As the war presses on, you'll need to be on the lookout for Russian cyberattacks, since the country...
March 1, 2022

You Should Update Google Chrome Immediately

Google is generally good at reminding you to update your browser. If you don't check on your own, you'll eventually see a little "update" button in your window's menu bar. However, don't wait for Google to recommend this latest update,...
February 22, 2022

Update Your Apple Devices Now If You Use Safari

If you use an iPhone, iPad, or Mac, you likely rely on Safari for your web browsing. If your device isn’t fully up to date, however, you might be placing your browsing, and the personal data that comes from it,...
February 15, 2022

Apple’s Upcoming iPhone Update Lets You Unlock With a Mask

One of the byproducts of wearing a mask throughout the pandemic has been its effect on the iPhone's Face ID. The secure authentication method relies on scanning your face to work; if half your face is obscured by a mask,...
February 8, 2022

Be On Alert for Microsoft Office Website Scam

Microsoft has identified a multi-stage phishing attack against a number of users. The company reported that hackers took stolen credentials, and registered devices on the targets' networks, which were then used to deploy phishing email scams. This latest fishing scheme...
February 8, 2022

Watch Out: There Are Many Fake COVID Sites on the Web

When you're a scammer, your goal is to trick people any way you can. A common tactic is to create websites that appear legitimate, or are close to the real deal, while really acting as a means for you to...
January 31, 2022

Apple Upgrades Autofill Feature to Block Phishing Attacks

Apple's autofill feature is a convenient way to enter saved passwords and 2FA codes immediately. However, bad actors have taken advantage of the feature, tricking users into autofilling 2FA codes on malicious websites. Luckily, Apple is now blocking this type...
January 31, 2022
1 30 31 32 33 34



Sign Up for weekly MERIT Security Briefing

By signing up, you agree to our Privacy Policy.