Accessibility links
  • Skip to main content
News Icon NEWS FILTER
All News Security Education Videos Scams & Phishing Your Security Mobile Security Identity Theft Corporate Security
Search Icon SEARCH
 

Email Icon SUBSCRIBE TO WEEKLY NEWSLETTER
Top Email Scams Fooling Us These Days

Scams & Phishing

Top Email Scams Fooling Us These Days

Your inbox might look harmless, but cybersecurity experts say some of the most dangerous scams are hiding in plain sight. Despite awareness campaigns and sophisticated security tools, scammers are staying one step ahead, and they're using urgency, deception, and artificial intelligence to make their attacks nearly impossible to detect. According to the FBI's Internet Crime Complaint Center's Internet Crime Report, 193,407 Americans reported falling victim to phishing and spoofing in 2024 and some of these scams are more effective than others. READ FULL STORY

Senior Scams—When Elder Fraud Gets Personal

Scams & Phishing

Senior Scams—When Elder Fraud Gets Personal

A Check on the Safety of P2P Apps

Mobile Security

A Check on the Safety of P2P Apps

Online Banking Smishing Scam

Mobile Security

Video Icon Online Banking Smishing Scam

Texting MFA Codes Isn’t Your Most Secure Option. Here Are Some Alternatives

Your Security

Texting MFA Codes Isn’t Your Most Secure Option. Here Are Some Alternatives

April 18, 2026

For the longest time, verifying our identity logging into an account involved getting texted an MFA (multi-factor authentication) code. At the time, it was usually considered safe to do. Well, not so much anymore. In fact, cybersecurity pros agree, although better than nothing, this option has almost as many security holes as a piece of Swiss cheese. Today there are more secure identity verification options to consider and should be used when you have the option to do so. READ FULL STORY

Every 19 Seconds AI Supercharges the Phishing Game

Scams & Phishing

Every 19 Seconds AI Supercharges the Phishing Game

Phishing has always been a numbers game. Now artificial intelligence has turned it into a high-speed assembly line. In its report, “The New Era of Phishing: Threats Built in the Age of AI,” Cofense reveals that an AI-powered phishing attack hits inboxes every 19 seconds. That means possibly, in the time it takes you to read this paragraph, several more have already landed somewhere. A Cofense report outlines five major trends shaping today’s threat landscape. Here’s what’s changing and how to protect yourself. READ FULL STORY

Predator iOS Spyware Opens Up Apple Devices

Mobile Security

Predator iOS Spyware Opens Up Apple Devices

Jamf Threat Labs has uncovered Predator, a stealthy iOS spyware that can secretly spy through an iPhone’s camera and microphone while hiding Apple’s warning indicators. Designed for targeted surveillance, it uses malicious links and exploits to stay invisible. Here’s who’s at risk and how to keep Predator off your device. sophisticated surveillance tool developed by a commercial spyware consortium and used primarily for targeted espionage. But you still may need to worry. It has evolved to bypass security protections, making anyone a potential target. READ FULL STORY

Keep Track Of Common UPS Scams

Scams & Phishing

Keep Track Of Common UPS Scams

With the popularity of online shopping, we all are getting packages delivered to our doors. While perusing the UPS website for important tracking information on a package I was expecting, I noticed there is an entire web page devoted to combatting fraud with regard to the shipment of UPS packages. We're sharing them with you too, as these types of scams are happening more and more these days, and with the impending holiday shopping season nearly upon us, they will most definitely increase in volume. READ FULL STORY

Email And Clickbait Lead To Facebook Trouble

Scams & Phishing

Email And Clickbait Lead To Facebook Trouble

April 17, 2026

In 2022, there were more than 333 billion email messages exchanged. That’s according to the website Statista. And of those, roughly 36% are spam. While most email products are fairly good at detecting and sorting out spam for us, many unwanted messages still make it past the filters and into our inboxes. Many of those lead to scams, downloaded malware, or cause some other type of digital harm. But the scams and malware don’t stop at email spam. READ FULL STORY

Not All Cookies Are Created Equal; Know When Not To Accept Them

Your Security

Not All Cookies Are Created Equal; Know When Not To Accept Them

It seems every webpage you land on these days has an “Accept Cookies” pop-up. After all, what’s the big deal about a few cookies, so we click “Accept” and move on. Well, turns out it’s a bigger deal to accept cookies than most users realize. Thinking twice before you accept them can help keep malicious and zombie cookies off your device, among other things. Who would ever think a few innocent cookies could be a bad thing, but unfortunately, many of them are. READ FULL STORY

Is Your Email Account Hacked? What You Need To Know

Your Security

Is Your Email Account Hacked? What You Need To Know

The reality is these days, stolen email addresses are a dime a dozen. Thanks to relentless data breaches, it’s safe to assume your email address is already in the wrong hands. Although it may not sound like much, it’s a goldmine for further crimes involving you. Considering what a hacker can do with your cracked email account, prevention is always the best medicine. Read on for a few tips to keep your email in your control and also how hackers can use your email against you. READ FULL STORY

A Two-Word Google Search Can Hand Your Device to Hackers

Your Security

A Two-Word Google Search Can Hand Your Device to Hackers

The latest cyber danger isn’t a mysterious bug or secret flaw hidden deep inside your Mac. It’s a simple Google search phrase that’s being used like bait to trap unwary people into a harmful trick. When millions of Apple users search for two particular words — the phrase many people casually type when they want tools to “clean up” their Mac — they can be steered toward fake Apple support pages that look real but are built to deceive. Anyone with a Mac who searches online for maintenance tools outside of the official Apple App Store or trusted software sources is at risk. READ FULL STORY

FTC Warns of Travel Plans Text Trap

Your Security

FTC Warns of Travel Plans Text Trap

Phishing Scams Exploit Pricey Auto-Subscription Fears

Scams & Phishing

Phishing Scams Exploit Pricey Auto-Subscription Fears

WhatsApp Screen-Mirroring Scam Draining Bank Accounts

Scams & Phishing

WhatsApp Screen-Mirroring Scam Draining Bank Accounts

Just Two Words Can Put You In The Middle Of A Smishing Scam

Scams & Phishing

Just Two Words Can Put You In The Middle Of A Smishing Scam

Phishing by text or “smishing” has long been a thorn in the side of smartphone users. With cybercriminals always looking for new ways to lure victims, this latest smishing attack is doing the trick. And now, a Chinese smishing network using just two words in a text are tricking victims into handing over sensitive information. The Federal Trade Commission (FTC) reports that last year, scam texts alone cost consumers a reported $470 million and growing. READ FULL STORY

AI Generated Fraud Takeover

Your Security

AI Generated Fraud Takeover

As cybercrime is known to do, attacks trend over time, creating new and improved assaults. Fighting back against trending fraud attacks requires everyone, including organization leaders and those overseeing security to be prepared for the latest threats. And with artificial intelligence (AI) now playing a significant role with these crimes, awareness can be an invaluable fraud prevention tool. AI-generated deepfakes make “authorized fraud” a must know of trending crimes. Phishing emails orchestrate 91% of all cyberattacks, with many starting and ending with fraud. READ FULL STORY

Are Text Message Sign-In Links Safe?

Mobile Security

Are Text Message Sign-In Links Safe?

Millions of people may be unknowingly exposed by “sign-in” links sent via text message. A recent study from researchers at several universities in the U.S. found that poorly secured SMS login links can be guessed or reused by attackers, opening the door to account takeovers and data theft. While it's convenient to not have to create an account and keep track of yet another password, those links often have predictable or weak security tokens at the end of their URLs. Attackers with only basic tools can guess or tweak these tokens to access other users’ accounts.  READ FULL STORY

Is Your VPN Falling Behind? What You Need to Know

Your Security

Is Your VPN Falling Behind? What You Need to Know

Making sure your software is always up to date makes for much safer online activity, whether you’re traveling or working on the go. That’s especially true when using a VPN (Virtual Private Network). Some use them for security, others for privacy, and many for both. Having a VPN makes you a much tougher target for attackers, but only if it’s running at full capacity. Keeping hackers out of our online activities gets tougher every day. Keeping your VPN up to date is a smart way to fight back. READ FULL STORY

These Companies May Try to Phish You

Scams & Phishing

These Companies May Try to Phish You

Every year, one of the cybersecurity companies in the world releases a report of the most impersonated firms used in phishing attacks. Unsurprisingly and typically, many of those companies are technology firms. Recently, Check Point released their report on this topic and it’s unlikely anyone will be surprised to see the results. Just taking a moment to consider whether the message is legitimate or not, may save you from a lot of stress. READ FULL STORY








Close
Fraud News & Alerts!

Keep up with the latest cyber security news through our weekly Fraud News & Alerts updates. Each week you will receive an email containing the latest cyber security news, tips and breach notifications.



You're all set!

You will receive your first official security update email within the next week.

A welcome email has also just been sent to you. If you do not receive this email within the next few minutes, please check your Junk box or spam filter to confirm our emails are not being blocked.


 
Help  
Enter any word or words you like.        

The email newsletter will arrive from news@stickleyonsecurity.com


Loading
Please wait...