The FBI Has ‘National Security Concerns’ About TikTok

TikTok is no stranger to controversy, particularly from a cybersecurity perspective. The app has come under fire many times in the past as a data mining tool for the Chinese government, including an allegation the company had plans to spy on a US citizen. Now, the FBI is expressing its deep concerns with the social media app. As reported by …

Copy and Paste Isn’t Safe?

Copy and paste is an integral computing tool we all use every day. When you need to rewrite text from one app verbatim in another, or you simply don’t want to deal with the hassle, copy and and paste is there for you. However, it seems it’s also there for bad actors and hackers. In some cases, nefarious apps have …

When in Doubt, Play it Safe

It can be difficult these days to quickly identify whether a message is spam or not. Sure, some are dead giveaways: Emails that get your name wrong; texts riddled with typos and grammatical mistakes; calls from services you don’t subscribe to. However, others are more sophisticated, copying legitimate design cues to trick users into thinking their alerts and websites are …

over 400 iPhone & Android Apps Stole Facebook Login Data - MERIT Solutions

Over 400 iPhone & Android Apps Stole Facebook Login Data

Facebook isn’t known for its privacy standards. In fact, it’s known for the opposite. Facebook takes and sells user data as a business model, and that isn’t news to anyone. However, its parent company, Meta, is looking out for the community in some way. Its researchers discovered over 400 apps stole Facebook login data from users. Are you among them? …

The Genius of MFA Codes

Multi-factor authentication or two-factor authentication (MFA or 2FA, respectively), is one of the best ways you can protect your accounts from bad actors and malicious users. Even if hackers get a hold of your username and passwords (sometimes routinely leaked in data breaches online) they won’t be able to get into your account without access to MFA’s secret weapon: the …

Apple’s New ‘Lockdown Mode’ Is a Game Changer

We all have to deal with cybersecurity threats. Calls, texts, and emails from scammers and bad actors can jeopardize our data and digital lives. However, a small percentage of us have cybersecurity issues that are far more serious. Journalists, politicians, and other high-profile individuals are subject to intense cyberattacks from highly skilled organizations, who spy on these people through personal …

Beware ‘SearchNightmare,’ the Latest Microsoft Vulnerability

Last week, we covered “Follina,” the Microsoft security vulnerability affecting Microsoft Office documents. After you opened an affected Office document, a bad actor could potentially take control of your system. This week, the threat turns to “SearchNightmare,” another Microsoft vulnerability. SearchNightmare is not unlike Follina: like the latter, SearchNightmare tricks the victim into opening a malicious document, such as Word …

Make Sure Your Systems Are Protected From Severe Weather

Severe weather events, like hurricanes, are common, but nevertheless devastating. When high winds and torrential rains interfere with electricity and power, shutting down networks and systems, business grinds to a halt. With the proper precautions, however, you can ensure your business is protected from whatever Mother Nature throws our way. Cox has an eight-step guide to ensure your business and its …