IsThisAScam
InicioBlogPreciosAcerca deHistoryAPI
Upgrade
ES
Sign in
Sign in
IsThisAScam

Independent scam & phishing analysis. Free for individuals. APIs for developers.

Operated by Zeplik, Inc.
Producto
  • Home
  • Blog
  • Pricing
  • Acerca de
  • History
Resources
  • Docs de API
  • Phishing brief
  • Romance scams
  • Tech support
Legal
  • Política de Privacidad
  • Términos de Servicio
  • product@zeplik.com

© 2026 Zeplik, Inc. Todos los derechos reservados.

Built for the calm, the cautious, and the careful.

Blog

Scam intelligence.

Alerts, guides, and research from the IsThisAScam team. Updated weekly.

AllGuidesScam AlertsSecurity TipsIndustry NewsProduct Updates
GuidesJun 17, 20264 min read

Scams Targeting Seniors: Complete Protection Guide

Seniors lose more money to scams than any other age group. Complete guide covering tech support fraud, grandparent scams, Medicare fraud, and prevention.

GuidesJun 16, 20264 min read

Digital Estate Planning: Securing Accounts for the Future

Digital estate planning ensures your online accounts, photos, and digital assets are handled properly. Guide to legacy contacts, digital wills, and access.

GuidesJun 12, 20264 min read

Safe Online Shopping: 15 Rules to Never Get Scammed

15 practical rules for safe online shopping covering fake stores, payment security, and return scams. Protect your money when buying online.

GuidesJun 12, 20263 min read

VirusTotal for Emails: How to Check Messages

How to use VirusTotal to check email attachments and links. Limitations for email content analysis and better alternatives.

GuidesJun 7, 20264 min read

Identity Theft Prevention: 2026 Complete Guide

Comprehensive identity theft prevention for 2026 covering credit freezes, monitoring, digital hygiene, and recovery if your identity is stolen.

GuidesJun 6, 20264 min read

How to Protect Children from Online Scams

Children face unique online threats from gaming scams to predatory apps. Age-appropriate strategies for parents to protect kids without destroying trust.

GuidesJun 3, 20264 min read

How to Spot Fake Reviews on Amazon, Google, Yelp

Fake reviews manipulate buying decisions on Amazon, Google, and Yelp. Learn the telltale patterns that distinguish genuine reviews from paid fakes.

GuidesJun 1, 20264 min read

What to Do After a Data Breach: 10-Step Recovery Plan

Your data was exposed in a breach. Follow this 10-step recovery plan to protect your accounts, finances, and identity from further damage.

GuidesMay 28, 20264 min read

What is Phishing? Complete Guide for Non-Technical People

Phishing explained in plain English: how fake emails, texts, and calls trick people into giving up passwords and money. No technical knowledge required.

GuidesMay 25, 20264 min read

OfferUp Scams: How to Buy and Sell Safely

OfferUp scams include fake listings, payment app fraud, and shipping scams. Complete guide to buying and selling safely on local marketplace apps.

GuidesMay 20, 20264 min read

Dating App Scams: Guide for Bumble, Hinge, Match

Dating app scams on Bumble, Hinge, and Match use romance fraud, catfishing, and crypto manipulation. Complete guide to safe online dating in 2026.

GuidesMay 9, 20264 min read

Travel Scams Around the World: Country-by-Country Guide

From taxi overcharging in Bangkok to fake tickets in Paris, this country-by-country guide covers the most common travel scams and how to avoid them in 2026.

GuidesApr 19, 20263 min read

Smishing: SMS Phishing That Looks Like Your Bank

Smishing uses text messages to trick you into clicking malicious links. Learn why SMS phishing has exploded and how to identify fake bank texts.

GuidesApr 18, 20264 min read

Business Email Compromise: A $50 Billion Problem

Business Email Compromise has caused over $50 billion in losses worldwide. Learn how BEC attacks work, why they bypass security tools, and how to defend against them.

GuidesApr 18, 20264 min read

How to Check Product Authenticity: Spotting Counterfeits

Verify if products are genuine before and after buying. Serial numbers, packaging, authentication tools, and category-specific guides.

GuidesApr 17, 20264 min read

Vishing: Phone Call Phishing Explained

Vishing uses phone calls instead of emails to steal your information. Learn the scripts scammers use, how AI voice cloning has changed the game, and how to protect yourself.

GuidesApr 17, 20263 min read

How to Check if a Business is Registered

Verify any business is legally registered using free government databases. Secretary of State lookups, EIN verification, and more.

GuidesApr 16, 20264 min read

Account Verification Emails: Real vs Fake

Account verification emails are one of the most common phishing tactics. Learn to distinguish legitimate verification requests from credential-stealing fakes.

GuidesApr 15, 20263 min read

Fake Charity Emails: How to Verify Before Donating

Scammers exploit natural disasters and crises by creating fake charity emails. Learn how to verify charitable organizations and donate safely.

GuidesApr 13, 20264 min read

How to Check if a Caller is Legitimate

Verify any phone caller with these proven techniques. Government impersonation, tech support, and bank scam calls exposed.

1234