Latest Articles
Stay informed with the most recent scam alerts and protection tips
MFA Fatigue & Push‑Bombing: How Scammers Bypass 2FA and How to Stop It Today
Telehealth Impersonation Scams: Fake E‑Visits, Prescription Fraud & How Seniors Can Verify Providers
Voice‑Biometrics Bypass: How Fraudsters Outsmart Bank & Call‑Center Voice ID — Questions to Ask Your Provider
Beginner’s Guide to Email Safety for Seniors: Spot Phishing, Dangerous Attachments & Links
Browse by Category
Explore articles organized by scam type and safety topics
Common Types of Scams
Learn to recognize the most prevalent scams targeting individuals online. Knowledge is your first line of defense.
Fraudulent emails or messages designed to steal your personal information, passwords, or financial details by impersonating legitimate organizations.
Unsolicited calls from scammers pretending to be from government agencies, tech support, or financial institutions to extract money or information.
Scams involving fake payment requests, counterfeit checks, or fraudulent online transactions that result in financial loss.
Criminals stealing your personal information to open accounts, make purchases, or commit crimes in your name.
Fraudulent investment opportunities promising unrealistic returns, including cryptocurrency scams and Ponzi schemes.
Fake websites or sellers that take your money but never deliver products, or sell counterfeit goods.
How to Protect Yourself
Follow these essential tips to stay safe from scams and protect your personal information online.
Verify Before You Trust
Always verify the identity of people or organizations contacting you. Call back using official phone numbers, not the ones provided in suspicious messages.
Protect Your Information
Never share passwords, social security numbers, or financial information via email, text, or phone unless you initiated the contact.
Be Skeptical of Urgency
Scammers create false urgency to pressure you into acting quickly. Take your time to verify any urgent requests or offers.
Use Strong Security
Enable two-factor authentication, use unique passwords for each account, and keep your software updated to protect against threats.
Senior Safety
Easy Scripts & Safety Settings for Seniors: What to Say, Where to Click, and When to Hang Up
Senior-friendly scripts and step-by-step phone/text settings to block robocalls and smishing. Learn what to say, where to click, and when to hang up.
MFA Fatigue & Push‑Bombing: How Scammers Bypass 2FA and How to Stop It Today
Learn how MFA fatigue (push‑bombing) bypasses 2FA and the immediate steps—passkeys, hardware keys, number‑matching, and reporting—to stop attackers today.
Financial & Investment Scams
If a P2P Payment Went Wrong: How to Recover After Zelle, Venmo or App Payment Scams
Step‑by‑step recovery for victims of Zelle, Venmo and app payment scams: immediate actions, documentation checklist, disputes, and escalation to banks, IC3, FTC and CFPB.
Cloned DApps, Malicious Bridges & Approval Tricks: On‑Chain Checklist Before You Connect
Step-by-step on-chain checklist to spot cloned DApps, malicious bridges, and approval tricks. Pre-connection checks to protect your crypto wallet safely.
Romance & Relationship Scams
Digital Background Checks for Dating Apps: Verify Profiles, Spot AI Matches, Protect Your Heart and Wallet
Learn how to verify dating profiles, spot AI-generated photos, avoid fake verification services, and protect your money and safety on dating apps in 2025.
Live‑Stream Deepfake Romance: How to Verify Video Dates and Avoid Scams
Learn how live‑stream deepfake romance scams work and step‑by‑step verification & reporting guidance for dating‑app users and platforms to avoid fraud.
Phone, SMS & Voice Scams
eSIM, Number‑Porting & Port‑Out Scams: How to Lock Your Mobile Number Now
Learn how eSIM and port‑out scams work, steps to lock your number, what to ask carriers, and recovery actions to stop robocalls, smishing and spoofing.
Marketplace Payment Scams: How the 'Overpayment' and Fake Zelle‑Business Tricks Work
Learn how 'overpayment' and fake Zelle business account scams target marketplace sellers. Steps to verify payments, protect funds and report fraud.
Support & Remote Access Scams
Fake QR Codes and Payment Phishing: How Scammers Use QR Stickers to Redirect You to Tech Support and Checkout Pages
How scammers use fake QR stickers to redirect payments and tech‑support phishing — verification steps to avoid losses and how to report.
Why “Allow This App” Is the New Phishing: Consent‑Phishing, OAuth Scams & an Admin Playbook
Learn how consent‑phishing ('Allow this app') OAuth attacks bypass MFA and steal data—detection steps, admin playbook and user red flags to stop token theft.
Emerging & AI-Enabled Scams
Vendor‑Invoice Scams Using AI Voices and Deepfakes: The New Face of BEC
AI-driven BEC uses voice cloning and deepfakes to fake vendor invoices and force urgent wires. Learn red flags, verification steps, and how to report quickly.
Deepfake Phone Calls and AI Voices: How Scammers Use Synthetic Media to Steal Identities
Learn how scammers use deepfake phone calls and AI voices to impersonate others, plus practical detection tips and steps to report and recover from attacks.






