Latest Articles
Stay informed with the most recent scam alerts and protection tips
Telehealth Impersonation Scams: Fake E‑Visits, Prescription Fraud & How Seniors Can Verify Providers
Voice‑Biometrics Bypass: How Fraudsters Outsmart Bank & Call‑Center Voice ID — Questions to Ask Your Provider
Beginner’s Guide to Email Safety for Seniors: Spot Phishing, Dangerous Attachments & Links
How to Set Up a Safe Home Computer for Seniors: Settings, Backups & Malware Protection
Browse by Category
Explore articles organized by scam type and safety topics
Common Types of Scams
Learn to recognize the most prevalent scams targeting individuals online. Knowledge is your first line of defense.
Fraudulent emails or messages designed to steal your personal information, passwords, or financial details by impersonating legitimate organizations.
Unsolicited calls from scammers pretending to be from government agencies, tech support, or financial institutions to extract money or information.
Scams involving fake payment requests, counterfeit checks, or fraudulent online transactions that result in financial loss.
Criminals stealing your personal information to open accounts, make purchases, or commit crimes in your name.
Fraudulent investment opportunities promising unrealistic returns, including cryptocurrency scams and Ponzi schemes.
Fake websites or sellers that take your money but never deliver products, or sell counterfeit goods.
How to Protect Yourself
Follow these essential tips to stay safe from scams and protect your personal information online.
Verify Before You Trust
Always verify the identity of people or organizations contacting you. Call back using official phone numbers, not the ones provided in suspicious messages.
Protect Your Information
Never share passwords, social security numbers, or financial information via email, text, or phone unless you initiated the contact.
Be Skeptical of Urgency
Scammers create false urgency to pressure you into acting quickly. Take your time to verify any urgent requests or offers.
Use Strong Security
Enable two-factor authentication, use unique passwords for each account, and keep your software updated to protect against threats.
Senior Safety
MFA Fatigue & Push‑Bombing: How Scammers Bypass 2FA and How to Stop It Today
Learn how MFA fatigue (push‑bombing) bypasses 2FA and the immediate steps—passkeys, hardware keys, number‑matching, and reporting—to stop attackers today.
Telehealth Impersonation Scams: Fake E‑Visits, Prescription Fraud & How Seniors Can Verify Providers
Learn how telehealth impersonation and fake e‑visits work, red flags for seniors, step‑by‑step verification tips for providers and pharmacies, and where to report fraud.
Financial & Investment Scams
Charity Crowdfund Verification Toolkit: How to Spot Fake Relief Campaigns
Practical toolkit to verify donation requests: use WHOIS, payment-trail checks, IRS and charity registries, reverse image search, and reporting steps to avoid fake relief campaigns.
AI‑Powered Seller Rings: How Generative Models Are Fueling TikTok Shop & Social‑Commerce Fraud
Learn how generative AI fuels fake seller rings on TikTok Shop and social marketplaces — plus a practical seller‑verification checklist to avoid scams.
Romance & Relationship Scams
Live‑Stream Deepfake Romance: How to Verify Video Dates and Avoid Scams
Learn how live‑stream deepfake romance scams work and step‑by‑step verification & reporting guidance for dating‑app users and platforms to avoid fraud.
Dating Deepfakes: How Scammers Use AI Photos to Build Trust and Ask for Money
How scammers use AI-generated dating photos to build trust, extract money, and how to verify profiles, spot red flags, and report abuse.
Phone, SMS & Voice Scams
Smart‑Speaker Skill Scams: How Alexa, Google Assistant and Home Hubs Are Being Weaponized (and How to Lock Them Down)
How attackers abuse Alexa, Google Assistant and home hubs via fake 'skills' and voice phishing. Practical steps to secure settings, permissions and purchases.
Why Robocalls Keep Getting Worse — Spoofing, Call Farms, and What You Can Do Right Now
Robocalls are rising despite new rules. Learn how spoofing, call farms and AI voices fuel scams — and 10 practical steps to block, report and protect your phone.
Support & Remote Access Scams
Fake QR Codes and Payment Phishing: How Scammers Use QR Stickers to Redirect You to Tech Support and Checkout Pages
How scammers use fake QR stickers to redirect payments and tech‑support phishing — verification steps to avoid losses and how to report.
Why “Allow This App” Is the New Phishing: Consent‑Phishing, OAuth Scams & an Admin Playbook
Learn how consent‑phishing ('Allow this app') OAuth attacks bypass MFA and steal data—detection steps, admin playbook and user red flags to stop token theft.
Emerging & AI-Enabled Scams
Vendor‑Invoice Scams Using AI Voices and Deepfakes: The New Face of BEC
AI-driven BEC uses voice cloning and deepfakes to fake vendor invoices and force urgent wires. Learn red flags, verification steps, and how to report quickly.
Deepfake Phone Calls and AI Voices: How Scammers Use Synthetic Media to Steal Identities
Learn how scammers use deepfake phone calls and AI voices to impersonate others, plus practical detection tips and steps to report and recover from attacks.






