Accessibility links
  • Skip to main content
News Icon NEWS FILTER
All News Scams & Phishing Security Education Videos Important Resources & Information Mobile Security Your Security Education Identity Theft Corporate Security
Search Icon SEARCH
 

Email Icon SUBSCRIBE TO WEEKLY NEWSLETTER
Zero-Day Issues in Firefox Browsers Require Update Now

Your Security

Zero-Day Issues in Firefox Browsers Require Update Now

Cybersecurity news regarding Google’s Chrome browser is getting a little “old hat.” After all, that browser has been in the news a lot lately. However, not to be outdone, there is now a warning for those of you who use something different for your web browsing needs: Firefox. Yep, at a hacking contest, two zero-day vulnerabilities were found in the Firefox browser, so read on for more information on this find be researchers at a hacking contest. READ FULL STORY

BOLO! MacOS Infostealer Malware on the Rise

Scams & Phishing

BOLO! MacOS Infostealer Malware on the Rise

Spam Filters Won’t Save You All The Time

Scams & Phishing

Spam Filters Won’t Save You All The Time

Finding Payment Card Fraud and What to Do About It

Identity Theft

Finding Payment Card Fraud and What to Do About It

There is an Uptick in Fake Emergency Data Requests

Scams & Phishing

There is an Uptick in Fake Emergency Data Requests

July 9, 2025

Late last year, the FBI issued a Private Industry Notification (PIN) alerting U.S.-based companies and law enforcement agencies about the rise in fraudulent Emergency Data Requests (EDRs) used by cybercriminals. While not a new tactic, cybercriminals have started using them again. EDRs are urgent requests for sensitive user data, typically reserved for life-threatening situations, bypassing the standard warrant process. Hackers exploit this by posing as legitimate law enforcement officers and tricking companies into releasing private user data. READ FULL STORY

Old School Phishing Attacks in Your USPS Mailbox

Scams & Phishing

Old School Phishing Attacks in Your USPS Mailbox

It’s not what you’d expect with the usual phishing attacks, but it seems that’s the point. A new flurry of phishing is sending written letters to prospective victims. The letter in your mailbox appears to be from your financial institution, and that leads to trusting what it says. Using the mail is an old school tactic from scammers and it only takes one victim to bite the hook. This scam likely works because these days we expect to get phished via email, text, or phone. But the regular mail? Nonsense! READ FULL STORY

Amazon Scams Ramp Up Ahead of Prime Day

Scams & Phishing

Amazon Scams Ramp Up Ahead of Prime Day

As Amazon Prime Day—Ok, it’s really a week—approaches (July 8–11, 2025), scammers are dialing up their schemes, and law enforcement is taking notice. On June 25, 2025, the Steuben County Sheriff’s Office in New York State, issued an urgent alert about an increasingly common phone scam targeting Amazon customers. Meanwhile, a separate but related text-message-based scam was reported that’s catching unsuspecting users off guard. Both are designed to trick victims into revealing personal information or installing malware—all under the guise of a trusted brand. READ FULL STORY

Cash to Play Mobile Games; Are They Scams?

Your Security

Cash to Play Mobile Games; Are They Scams?

In the ever-expanding world of mobile gaming, there's a growing trend of games that promise to pay you real money while you play. Titles like Solitaire Cash and Bingo Cash have gained popularity for their enticing proposition — earning money while having fun on your mobile device. And some of us play various games to while away the time when we’re waiting in lines or when our brains need a break. But how do these games that promise to pay work? Do they really deliver on their promises or are they just scams? READ FULL STORY

Accounts Drained By Zelle Smishing Scam

Mobile Security

Accounts Drained By Zelle Smishing Scam

July 5, 2025

From time to time, scammers come up with a new tactic using new technology, new events, or whatever they can to continue tricking us into giving up our personal or confidential information. Over the past few years and with the increasing use of texting and SMS messaging, a newer one in the bag of tricks has been coined as “smishing.” Because it’s text, it often catches people off guard and causes them to react quickly, which is exactly what you shouldn’t do. READ FULL STORY

Keep Track Of Common UPS Scams

Scams & Phishing

Keep Track Of Common UPS Scams

With the popularity of online shopping, we all are getting packages delivered to our doors. While perusing the UPS website for important tracking information on a package I was expecting, I noticed there is an entire web page devoted to combatting fraud with regard to the shipment of UPS packages. We're sharing them with you too, as these types of scams are happening more and more these days, and with the impending holiday shopping season nearly upon us, they will most definitely increase in volume. READ FULL STORY

Ways To See If Your Data Has Been Stolen

Education

Ways To See If Your Data Has Been Stolen

With all the data breaches, whether by intrusion or accident lately, it’s likely your information was exposed somehow to someone you didn’t intend. After all, the marketing company Exactis, exposed hundreds of traits on us in 350 million records. Yahoo let out email addresses and passwords on billions of people, and of course who can forget the massive breach of Equifax just last year. There is a lot of information that gets leaked on us and the more the bad actors have on us, the more targeted their phishing campaigns can be. Checking on whether or not your data is available in the underground can help you mitigate any fraud or identity theft. READ FULL STORY

Online And Mobile Payment Option Security

Your Security

Online And Mobile Payment Option Security

Most of us have heard of the various payment systems that allow us to pay almost anyone without writing the old-fashioned paper check. Now, we can pay nearly anyone, residing anywhere in the world with just a few taps on the keyboard or touch of an app. The three best known are PayPal, Venmo, and Zelle and all of them are increasingly being used for business purposes. PayPal and Venmo work essentially the same way and are actually owned by the same company, though there are some small differences in how they are used. READ FULL STORY

Year-Round Package Delivery Scams To Watch For, 24-7-365

Scams & Phishing

Year-Round Package Delivery Scams To Watch For, 24-7-365

Hackers Flush Out Users’ Google Credentials

Your Security

Hackers Flush Out Users’ Google Credentials

Your Data For Sale On The Dark Web And What You Can Do About It

Identity Theft

Your Data For Sale On The Dark Web And What You Can Do About It

Sneaky Email Phishing Uses Corrupt MS Word Files

Scams & Phishing

Sneaky Email Phishing Uses Corrupt MS Word Files

Always looking for new ways to swindle us, hackers are using purposely corrupted Word files to hook unsuspecting users. The success rate of this email phishing attack is nearly 100%, so knowing what to look for before you get hooked can help prevent this latest cybercrime. Any.Run, a malware hunting firm, found corrupt Word files attached to emails, infected with malware that bypass Microsoft's malware checks. Even worse, this scam uses Microsoft’s own document recovery feature to open the corrupt file. READ FULL STORY

Are You A Money Mule? What You Need To Know

Scams & Phishing

Are You A Money Mule? What You Need To Know

Criminals of all kinds traffic in stolen money and need middlemen to relocate the funds. From romance scams to phishing attacks and more, there’s plenty of fraudsters with hijacked money needing laundering—and that’s where money mules come in handy. Unfortunately, sometimes those people are unaware of what they are doing, but that doesn’t mean they can’t be punished for it. Check out the red flags of avoiding becoming a money mule—and a criminal. READ FULL STORY

Avoiding Insurance Fraud And Fraudsters

Scams & Phishing

Avoiding Insurance Fraud And Fraudsters

Insurance fraud is a problem everywhere and it makes things more expensive for those of us playing by the rules. With this fraud in particular, whether it’s for our health, car, or home, fraudsters are scamming like never before. Suspecting a sketchy seller and policy in an open marketplace can help prevent a potential nightmare. Knowing tell-tale signs of insurance fraud when we see it is smart shopping, and the information below will help. READ FULL STORY

Phishing Examples Of  The Current Top Ransomware Threats

Your Security

Phishing Examples Of The Current Top Ransomware Threats

Ransomware attacks have become increasingly prevalent and damaging in recent years and they do not discriminate. Every person, industry, or organization is fair game for cybercriminals wanting to make a buck; in most cases, many bucks. Cybercriminals are constantly on the lookout for vulnerabilities they can exploit to gain unauthorized access and deploy ransomware. Here, we highlight some of the most significant vulnerabilities leveraged by ransomware groups, their implications, and the importance of securing these weaknesses. READ FULL STORY

Shimming Right Along To Skim Your Payment Card Number

Education

Shimming Right Along To Skim Your Payment Card Number

By now, most of us have at least one or two EMV (Europay, MasterCard, Visa) cards. These are the payment cards that were touted as far more secure than the ones with the magnetic strips on the backs. And indeed, if you ask Visa these cards have resulted in a 75% decrease in fraud in the three years since they were introduced. Cybercriminals are of course finding ways to take advantage of the EMV cards too. Now, there are reports of a new way to skim. READ FULL STORY








Close
Fraud News & Alerts!

Keep up with the latest cyber security news through our weekly Fraud News & Alerts updates. Each week you will receive an email containing the latest cyber security news, tips and breach notifications.



You're all set!

You will receive your first official security update email within the next week.

A welcome email has also just been sent to you. If you do not receive this email within the next few minutes, please check your Junk box or spam filter to confirm our emails are not being blocked.


 
Help  
Enter any word or words you like.        

The email newsletter will arrive from news@stickleyonsecurity.com


Loading
Please wait...