Latest Articles
Stay informed with the most recent scam alerts and protection tips
Voice‑Biometrics Bypass: How Fraudsters Outsmart Bank & Call‑Center Voice ID — Questions to Ask Your Provider
Beginner’s Guide to Email Safety for Seniors: Spot Phishing, Dangerous Attachments & Links
How to Set Up a Safe Home Computer for Seniors: Settings, Backups & Malware Protection
Password Managers vs. Browser Passwords: Which Is Safer for Seniors and Busy People?
Browse by Category
Explore articles organized by scam type and safety topics
Common Types of Scams
Learn to recognize the most prevalent scams targeting individuals online. Knowledge is your first line of defense.
Fraudulent emails or messages designed to steal your personal information, passwords, or financial details by impersonating legitimate organizations.
Unsolicited calls from scammers pretending to be from government agencies, tech support, or financial institutions to extract money or information.
Scams involving fake payment requests, counterfeit checks, or fraudulent online transactions that result in financial loss.
Criminals stealing your personal information to open accounts, make purchases, or commit crimes in your name.
Fraudulent investment opportunities promising unrealistic returns, including cryptocurrency scams and Ponzi schemes.
Fake websites or sellers that take your money but never deliver products, or sell counterfeit goods.
How to Protect Yourself
Follow these essential tips to stay safe from scams and protect your personal information online.
Verify Before You Trust
Always verify the identity of people or organizations contacting you. Call back using official phone numbers, not the ones provided in suspicious messages.
Protect Your Information
Never share passwords, social security numbers, or financial information via email, text, or phone unless you initiated the contact.
Be Skeptical of Urgency
Scammers create false urgency to pressure you into acting quickly. Take your time to verify any urgent requests or offers.
Use Strong Security
Enable two-factor authentication, use unique passwords for each account, and keep your software updated to protect against threats.
Senior Safety
Telehealth Impersonation Scams: Fake E‑Visits, Prescription Fraud & How Seniors Can Verify Providers
Learn how telehealth impersonation and fake e‑visits work, red flags for seniors, step‑by‑step verification tips for providers and pharmacies, and where to report fraud.
Voice‑Biometrics Bypass: How Fraudsters Outsmart Bank & Call‑Center Voice ID — Questions to Ask Your Provider
Learn how attackers bypass bank and call‑center voice ID, what NIST and researchers warn, and the questions and mitigations to demand from your provider.
Financial & Investment Scams
AI‑Powered Seller Rings: How Generative Models Are Fueling TikTok Shop & Social‑Commerce Fraud
Learn how generative AI fuels fake seller rings on TikTok Shop and social marketplaces — plus a practical seller‑verification checklist to avoid scams.
BNPL Trap Alerts: How Scammers Exploit Refund Loops, Stacking and Prize Schemes in 2025
Learn how BNPL refund loops, account stacking and charity/sweepstakes schemes enable fraud in 2025 — tips to spot scams, protect payments and report abuse.
Romance & Relationship Scams
Live‑Stream Deepfake Romance: How to Verify Video Dates and Avoid Scams
Learn how live‑stream deepfake romance scams work and step‑by‑step verification & reporting guidance for dating‑app users and platforms to avoid fraud.
Dating Deepfakes: How Scammers Use AI Photos to Build Trust and Ask for Money
How scammers use AI-generated dating photos to build trust, extract money, and how to verify profiles, spot red flags, and report abuse.
Phone, SMS & Voice Scams
Smart‑Speaker Skill Scams: How Alexa, Google Assistant and Home Hubs Are Being Weaponized (and How to Lock Them Down)
How attackers abuse Alexa, Google Assistant and home hubs via fake 'skills' and voice phishing. Practical steps to secure settings, permissions and purchases.
Why Robocalls Keep Getting Worse — Spoofing, Call Farms, and What You Can Do Right Now
Robocalls are rising despite new rules. Learn how spoofing, call farms and AI voices fuel scams — and 10 practical steps to block, report and protect your phone.
Support & Remote Access Scams
Fake QR Codes and Payment Phishing: How Scammers Use QR Stickers to Redirect You to Tech Support and Checkout Pages
How scammers use fake QR stickers to redirect payments and tech‑support phishing — verification steps to avoid losses and how to report.
Why “Allow This App” Is the New Phishing: Consent‑Phishing, OAuth Scams & an Admin Playbook
Learn how consent‑phishing ('Allow this app') OAuth attacks bypass MFA and steal data—detection steps, admin playbook and user red flags to stop token theft.
Emerging & AI-Enabled Scams
Vendor‑Invoice Scams Using AI Voices and Deepfakes: The New Face of BEC
AI-driven BEC uses voice cloning and deepfakes to fake vendor invoices and force urgent wires. Learn red flags, verification steps, and how to report quickly.
Deepfake Phone Calls and AI Voices: How Scammers Use Synthetic Media to Steal Identities
Learn how scammers use deepfake phone calls and AI voices to impersonate others, plus practical detection tips and steps to report and recover from attacks.






