Alerts, guides, and research from the IsThisAScam team. Updated weekly.
How to recognize and handle PayPal phishing emails. Covers the most common PayPal scam formats, verification steps, and what to do if you already clicked.
Fake Google account recovery emails are flooding inboxes. Learn how to distinguish real Google security alerts from phishing attempts that steal your credentials.
Actual phishing emails reported this year — dissected line by line so you can spot the red flags before clicking anything.
Learn to read email headers to verify sender authenticity. SPF, DKIM, DMARC explained with real examples for Gmail, Outlook, and Apple Mail.
April 2026 scam roundup: new threats, trending fraud schemes, victim statistics, and how to protect yourself this month.
Spot fake profiles on Instagram, Facebook, LinkedIn, and dating apps. Reverse image search, activity analysis, and red flags.
A practical guide to reading email headers, understanding authentication results, and identifying forged sender addresses.
Password managers are the single most effective security tool for regular people. Here's how they work, which to choose, and how to set one up.
A detailed breakdown of the most common Amazon scam emails in circulation, with real redacted examples and step-by-step instructions for verifying any Amazon email.
Avoid rental scams with these verification steps. Check landlord identity, listing legitimacy, and payment safety before signing.
Comprehensive ranking of the 25 most prevalent scams in 2026 by victim count. How each works, who it targets, and how to avoid it.
Twelve practical methods for verifying whether a website is legitimate, including URL analysis, WHOIS lookup, SSL certificate checks, and automated tools.
Practical methods for verifying link safety, from quick visual checks to technical tools, with examples of deceptive URLs.
Protect your money from investment fraud. Verify brokers, check SEC registrations, spot Ponzi schemes, and use due diligence tools.
Your email address is probably on the dark web. Here's how to find out, what it means, and the concrete steps to protect yourself.
Before installing that app, check these signals. Permissions, developer history, reviews, and security scans to protect your device.
Clicked a suspicious link by accident? Here is exactly what to do in the first 10 minutes, first hour, and first week to minimize damage.
A detailed guide to Social Security Administration impersonation calls, the specific tactics used, and what the real SSA will and will not do.
Ever wondered what happens if you engage with a spam email? Here's what unfolds behind the scenes when you reply, click, or interact.
How AI tools transformed scam operations in 2026. Deepfake voices, AI phishing, chatbot manipulation, and the arms race to detect them.