Latest Articles
Featured image for “You Shouldn’t Use the Browser Inside an App”

You Shouldn’t Use the Browser Inside an App

While we’ve bridged the gap considerably, smartphones and computers are very different devices, meant to be used in very different…
August 22, 2023
Featured image for “Researchers Trick AI Models Into Hacking”

Researchers Trick AI Models Into Hacking

AI large language models seems complex, and they are. But they aren’t so complex that they can’t be tricked into…
August 15, 2023
Featured image for “Hackers Can Win Almost $20 Million By Using AI to Protect Against Cyberattacks”

Hackers Can Win Almost $20 Million By Using AI to Protect Against Cyberattacks

When you hear “hackers” and “cyberattacks” in the same sentence, it’s usually bad news. Usually. Sometimes, however, it can actually…
August 15, 2023
Featured image for “It Takes a Lot to Protect Your Accounts”

It Takes a Lot to Protect Your Accounts

The security of your business often comes down to individual decisions and actions. Hackers frequently break into networks through one…
August 7, 2023
Featured image for “We Might Need AI to Defeat AI”

We Might Need AI to Defeat AI

AI presents many potential positives for both business and personal lives, but it also comes with many risks as well.…
August 7, 2023
Featured image for “How Copy and Paste Can Compromise Your Business”

How Copy and Paste Can Compromise Your Business

Copy and paste is an integral computing tool we all use every day. However, it seems it’s also a tool…
July 31, 2023
Featured image for “FBI Warns of Increased AI Cyberattacks”

FBI Warns of Increased AI Cyberattacks

The FBI is warning the public that the number of cyberattacks aided by artificial intelligence is skyrocketing. As Tom’s Hardware…
July 31, 2023
Featured image for “Official Warns Hackers Are Already Using AI”

Official Warns Hackers Are Already Using AI

You might use ChatGPT to see how well it can put together a recipe for dinner, or even to see…
July 24, 2023
Featured image for “2024 Elections at Risk From Generative AI”

2024 Elections at Risk From Generative AI

AI is an impressive technology that continues to subvert our expectations with every development. Not all of these developments are…
July 24, 2023
Featured image for “Text Messages Could Compromise Your Business”

Text Messages Could Compromise Your Business

You’re likely aware of phishing attacks, schemes hackers use to coax unsuspecting users out of their personal data and information.…
July 18, 2023

The World Wide Web Is 30 Years Old

You're reading these words thanks to the internet. Before it, you might've needed to subscribe to a physical newsletter, or a magazine produced by the company directly. But with the power of the internet, and the World Wide Web, it's...
May 2, 2023

Hackers Don’t Always Attack Your Business on the Internet

When we think of hackers, we think we of sophisticated actors across the internet—users who know how to code their way into malicious attacks to earn money. That is true, and it's the basis for many attacks. However, sometimes, attacks...
April 25, 2023

Singapore and France Are Working Together on AI for Cybersecurity

AI is advancing more rapidly than anyone thought possible. It has gone beyond niche tech circles, and is now accessible by anyone with a smartphone or computer. As such, everyone from businesses to governments is working on ways to implement...
April 25, 2023

Public Chargers Are Not Safe, Warns FBI

Our society is mobile: From smartphones to laptops, work can go wherever we do, as long as there's charge left in the batteries. However, you shouldn't charge your devices just anywhere, as the FBI warned last week. You may be...
April 18, 2023

Protecting Your Business From Different Types of Phishing Attacks

A phishing attack is a general term for a type of cyberattack in which bad actors contact a large pool of people with malicious links or software hoping to trick some into clicking. The end goal, of course, is a...
April 18, 2023

Apple Issues Security Update for Older Devices

Our devices last longer and longer these days, even when their manufacturers' decide to stop supporting them. But just because a smartphone or computer does not receive the last software updates, that doesn't mean they're cut off from the rest...
April 10, 2023

Protecting Your Business from Cloud Security Breaches

Cloud-based solutions have never been more popular for small to medium-sized businesses, and it's easy to see why. The convenience and potential offered by the cloud means businesses can operate and grow at a greater pace. However, just as it's...
April 10, 2023

Federal Agents Need to Patch These Spyware Exploits

Spyware is nasty business. It's a form of malware designed to live on the victim's devices and report back their every move to the host, including everything from browsing activity to keystrokes. Unfortunately, a massive spyware campaign was successfully run...
April 4, 2023

OneNote Won’t Be Home to Hackers for Long

Microsoft may have intended for its note-taking software, OneNote, to be used for productivity, creativity, and organization. Unfortunately, it's become the app for hackers and malicious users to target victims with malware. Lucky for the world, Microsoft is changing that...
April 4, 2023

Apple Just Patched Over 30 iPhones Security Vulnerabilities

Software updates are an important way to keep your tech safe from malicious users. Whenever developers discover new security vulnerabilities, they'll work on patches to fix them, and include those patches in the next update. Apple just did the same,...
March 28, 2023
1 3 4 5 6 7 18

Sign Up for weekly MERIT Security Briefing

By signing up, you agree to our Privacy Policy.