Articles

Latest Articles

Beware ‘SearchNightmare,’ the Latest Microsoft Vulnerability

Last week, we covered "Follina," the Microsoft security vulnerability affecting Microsoft Office documents. After you opened an affected Office document, a bad actor could potentially take control of your system. This week, the threat turns to "SearchNightmare," another Microsoft vulnerability....
June 7, 2022

Don’t Let Hurricanes Impact Your Systems

Severe weather events, like hurricanes, are common, but nevertheless devastating. When high winds and torrential rains interfere with electricity and power, shutting down networks and systems, business grinds to a halt. With the proper precautions, however, you can ensure your business...
June 7, 2022

How to Avoid ‘Facestealer’ Malware on Android

Malware on Android isn't a rare topic, unfortunately. While Google has a system to vet apps on the Play Store, hackers are clever, and find ways to slip malicious software through the cracks. "Facestealer" is the latest such software to...
May 31, 2022

Watch Out for This Microsoft Office Vulnerability

Security vulnerabilities aren't fun, especially when they affect products we rely on every day. A new vulnerability, dubbed "Follina," unfortunately targets a suite of apps you likely use all the time: Microsoft Office. Follina, which Microsoft has identified as CVE-2022-30190,...
May 31, 2022

Apple Releases Security Patches for All Devices

Last week, Apple released security patches for the iPhone, iPad, and Mac. While the company didn't advertise these software updates as security patches, the new versions fix dozens upon dozens of security vulnerabilities across iOS, iPadOS, and macOS. If you...
May 23, 2022

You Can Remove Your Personal Information From Google

Google is a powerful, essential search engine that helps us find everything from new recipes to affordable flights. But unless you're trying to sell something attached to your name, you probably don't want your personal, identifying information available on Google...
May 23, 2022

It’s Possible to Hack an iPhone When Powered Off

With the infamous Pegasus malware making the news, the idea of bad actors installing malicious software on your iPhone isn't far fetched. However, that malware usually gets there when the phone is turned on. As it happens, researchers have found...
May 17, 2022

Microsoft Edge Deletes Cookies Every Time You Close Your Browser

When you use an internet browser, like Google Chrome or Microsoft Edge, you generate cookies. Cookies are used to track your activity across websites as you browse, which can be an invasion of privacy. Edge has a built-in solution. Microsoft...
May 17, 2022

AirTags Have a Built-In Anti-Stalking System

Apple's AirTags are a convenient way to keep track of your various items, but they can also pose a security risk. Let's take a look at how Apple designed a system to protect the public against would-be AirTag stalkers. Let's...
May 10, 2022

Spanish Prime Minister Newest Target of Pegasus Spyware

Pedro Sánchez, the Prime Minister of Spain, as well as defense minister Margarita Robles are the latest two targets of the NSO Group's Pegasus spyware. This is the first time the Prime Minister has been the subject of Pegasus spyware,...
May 10, 2022
1 33 34 35 36 37 40



Sign Up for weekly MERIT Security Briefing

By signing up, you agree to our Privacy Policy.