Accessibility links
  • Skip to main content
News Icon NEWS FILTER
All News Security Education Videos Scams & Phishing Your Security Mobile Security Identity Theft Corporate Security
Search Icon SEARCH
 

Email Icon SUBSCRIBE TO WEEKLY NEWSLETTER
Is Your Computer Hacked? The Clues and Tips You Should Know

Your Security

Is Your Computer Hacked? The Clues and Tips You Should Know

Wondering if your computer might be a hacking victim is an uneasy feeling at best. The signs and symptoms are there, and you need to know what they are and what to do about them. It’s a kind of one-two punch to hackers from you and your device. But there are clues that help you decide if someone other than you has had access to your computer. Treating a hacked computer begins with preventing one in the first place. It takes a promise to use cyber-smarts daily, and bolstering your device with security software. READ FULL STORY

A Scammer Can Wreak Havoc With Your Online Banking Account Number

Your Security

A Scammer Can Wreak Havoc With Your Online Banking Account Number

FBI Warns: Cybercrime Groups Exploit Salesforce to Steal Data

Corporate Security

FBI Warns: Cybercrime Groups Exploit Salesforce to Steal Data

Social Media Brings Out The Worst Scammers

Scams & Phishing

Social Media Brings Out The Worst Scammers

This Cunning Account Takeover Robbed A “Cybersmart” User’s Account

Scams & Phishing

This Cunning Account Takeover Robbed A “Cybersmart” User’s Account

January 16, 2026

While banking online, this person received a message saying her account had been compromised and provided her a phone number to call. A woman in New York learned the hard way that even those who know the tell-tale signs of a cyberattack can be fooled. She fell victim to an account takeover (ATO) of her financial accounts – to the tune of over $30,000. Know that all types of accounts are vulnerable to ATOs, and not just those that are financial. READ FULL STORY

 The Truth About Temu Shopping App Gives Reasons To Delete It

Your Security

The Truth About Temu Shopping App Gives Reasons To Delete It

Temu, the insanely popular Chinese-owned discount marketplace app is creating a stir in the U.S. With help from 50 million+ Americans now onboard, Temu snuck into first place bypassing Amazon, Walmart, and Shein with its global number of app users. And like any app you consider downloading, Temu deserves a closer look first. Not long after Temu’s U.S. launch during last year’s Superbowl, the app came under scrutiny from disillusioned customers and cybersecurity professionals, but for very different reasons. READ FULL STORY

High-Level Execs Prime Targets For Whaling Attacks

Corporate Security

High-Level Execs Prime Targets For Whaling Attacks

Why settle for minnows when whales make much bigger, better targets? That’s a question hackers might ask themselves when determining their next victim. With no shortage of information available online about C-Suite and other high-level executives, they make lucrative email phishing targets. These execs are known as “whales” and bad actors love reeling them in because it pays big time. Because these execs can make large wire transfers happen, among other things, they have become a gold standard for phishing, fraud, and profits. READ FULL STORY

IC3 Issues Alert About a Cybercrime Group Recruiting Kids

Your Security

IC3 Issues Alert About a Cybercrime Group Recruiting Kids

The FBI's IC3 has just sounded the alarm about a growing online criminal network called The Com (short for "The Community") and it's not your average hacker crew. This sprawling, international ecosystem includes thousands of members, many of them minors who are wrapped up in cybercrime, extortion, swatting, SIM swapping, ransomware, and even child sexual abuse content. What’s worse? They recruit young people, some as young as 11 through gaming sites and social media. READ FULL STORY

How Cybercriminals Are Outsmarting Us These Days

Scams & Phishing

How Cybercriminals Are Outsmarting Us These Days

January 12, 2026

Phishing isn’t new, but it’s evolving faster than ever, and if you’re not paying attention, you could be the next victim. These scams trick you into handing over personal information—logins, financial details, or even access to your entire business network by impersonating trusted sources. Whether through email, text, or cleverly crafted websites, cybercriminals are always one step ahead, looking for new ways to exploit unsuspecting users. READ FULL STORY

Hackers Drive Off With Data of 2.9 Million Hyundai, Kia, and Genesis Customers

Identity Theft

Hackers Drive Off With Data of 2.9 Million Hyundai, Kia, and Genesis Customers

If you own a Hyundai, Kia, or Genesis vehicle, your personal information may have been driven off with cybercriminals earlier this year. Hyundai AutoEver America (HAEA), the automaker’s IT services subsidiary, has confirmed a massive data breach potentially affecting up to 2.7 million customers. The exposed data includes Social Security numbers and driver’s license information—information that puts victims at high risk for identity theft. READ FULL STORY

Unlocking the Mystery of VPN’s: Why You Need One

Education

Unlocking the Mystery of VPN’s: Why You Need One

You may have heard about VPN’s (Virtual Private Network) more often lately, even popping up in TV ads for VPN service providers. What’s behind the sudden surge of VPN’s and why would you want or need one? For those who use WiFi internet connections at home or work, for shopping, banking, or just plain fun, VPN’s provide a layer of security that WiFi cannot. Although free public WiFi is found most everywhere, it’s long been a favorite for hackers because there is virtually no online security offered when using it. READ FULL STORY

How To Tell If Your Webcam Has Been Compromised

Scams & Phishing

How To Tell If Your Webcam Has Been Compromised

Sometimes, does it always feel like someone is watching you? Does your television turn on in the middle of the night? Do you feel eyes on you when you’re at the computer? Your television issue might just be a problem with the remote. But, the computer eeriness? That might actually be someone wanting to launch a ransomware attack or it could be a Peeping Tom. Detecting whether your webcam has been hacked is crucial for protecting your privacy and security, so we are here to help. READ FULL STORY

Facebook, Instagram Shopping Scams Run Wild And Rake In Millions

Scams & Phishing

Facebook, Instagram Shopping Scams Run Wild And Rake In Millions

Slow Browser? It May Have Been Hijacked By Malware

Your Security

Slow Browser? It May Have Been Hijacked By Malware

Researcher Reveals Clickjacking Flaw That Can Spill Your Secrets

Your Security

Researcher Reveals Clickjacking Flaw That Can Spill Your Secrets

Your New Gig Could Be a Money Trap

General News

Your New Gig Could Be a Money Trap

Cyber crooks are turning “easy side gigs” into dangerous traps, according to Trend Micro’s new Unmasking Task Scams report. Victims are lured with small payouts for liking videos or posting reviews—“easy” gig work— to make an extra bit of cash. But then these victims are pushed to deposit money to “unlock” higher rewards—money they’ll never see again. Some scammers even pose as mentors or real companies. But there are some ways to avoid this when you’re looking for your next gig. READ FULL STORY

Has Your Email Been Hacked? Here’s How You Can Tell And What You Can Do

Your Security

Has Your Email Been Hacked? Here’s How You Can Tell And What You Can Do

There are any number of signs that may give you a clue that your email has been hacked. And what do you do if it has? You may wonder what you can do if you suspect that’s the case. Let’s go over a few indicators of a compromised email box and what you can do about it, if it happens to you. Fortunately, there are some indicators for to watch out for and we can provide some suggestions on how to tell and what to do if you do think someone has been in your inbox. READ FULL STORY

Don't Wake Up to a TrickMo Attack

Mobile Security

Don't Wake Up to a TrickMo Attack

TrickMo, the Android banking trojan is back with a vengeance. The malware has a history of targeting Android phones to steal banking info and money. And now, TrickMo’s latest version is stealing a lot more, and possibly doing it while you’re sleeping. This updated version of TrickMo is being seen worldwide. Since no one wants to wake up to a TrickMo attack, it’s time to grab a cup of coffee, sit in your favorite chair, and learn more about this tricky trojan TrickMo. READ FULL STORY

Can Using The Same Password Lead To A Stolen Car?

Your Security

Can Using The Same Password Lead To A Stolen Car?

In an age where cybercrime is increasingly sophisticated, it’s no surprise that criminals are using open-source tools to automate the process of cracking online accounts. This is especially true when it comes to mass password cracking or credential stuffing. This dangerous trend has allowed cybercriminals to make a lot of money with very little time or effort. This time, they're going after something you may not expect from cybercriminals...your vehicle! READ FULL STORY

Holiday Shopping May Be Over but the Scams Aren’t

Scams & Phishing

Holiday Shopping May Be Over but the Scams Aren’t

Think the shopping season ends on December 25? Not even close. Retailers launch a whole new wave of promotions: after-holiday blowouts, New Year deals, clearance events, and anything else they can dream up to keep shoppers clicking. But while stores ramp up the marketing, cybercriminals ramp up their tricks — especially domain-jacking and typosquatting. And during this busy online shopping stretch, more people than ever are falling for them. READ FULL STORY








Close
Fraud News & Alerts!

Keep up with the latest cyber security news through our weekly Fraud News & Alerts updates. Each week you will receive an email containing the latest cyber security news, tips and breach notifications.



You're all set!

You will receive your first official security update email within the next week.

A welcome email has also just been sent to you. If you do not receive this email within the next few minutes, please check your Junk box or spam filter to confirm our emails are not being blocked.


 
Help  
Enter any word or words you like.        

The email newsletter will arrive from news@stickleyonsecurity.com


Loading
Please wait...