Alerts, guides, and research from the IsThisAScam team. Updated weekly.
Verify any business is legally registered using free government databases. Secretary of State lookups, EIN verification, and more.
Account verification emails are one of the most common phishing tactics. Learn to distinguish legitimate verification requests from credential-stealing fakes.
Scammers exploit natural disasters and crises by creating fake charity emails. Learn how to verify charitable organizations and donate safely.
Watering hole attacks compromise websites your organization already trusts. Learn how attackers poison the well and what to watch for.
Use reverse image search to expose fake profiles, stolen product photos, and scam identities. Step-by-step for Google, TinEye, and Yandex.
Twenty specific warning signs of a romance scam, based on analysis of real cases. Includes behavioral patterns, financial red flags, and what to do if you suspect you are being scammed.
Inheritance scam emails have evolved from obvious Nigerian prince schemes into convincing narratives. Learn how modern inheritance fraud works and how to spot it.
Major law enforcement actions against scam operations in 2026. Arrests, seizures, and the investigations that brought down fraud networks.
Lottery winner emails are a classic advance-fee fraud that still catches victims. Learn why every unsolicited lottery win notification is a scam without exception.
Man-in-the-middle attacks let scammers secretly sit between you and the websites you visit. Learn how interception works and why encryption matters.
Verify any phone caller with these proven techniques. Government impersonation, tech support, and bank scam calls exposed.
A complete guide to two-factor authentication: what it is, why it matters, how to set it up on every major platform, and which methods are most secure.
Fake shipping notifications from FedEx, UPS, and DHL are among the most clicked phishing emails. Learn why these scams work and how to protect yourself.
Fake subscription renewal emails for Norton, McAfee, and other services trick victims into calling scam call centers. Here is how these scams operate.
Evil twin attacks create fake WiFi networks that mimic legitimate ones. Learn how attackers intercept your traffic at coffee shops, airports, and hotels.
Identify spam and scam text messages with these verification techniques. Smishing detection, reporting methods, and protection tools.
Scammers send fake invoices hoping businesses will pay without verification. Learn to identify fraudulent invoices and protect your accounts payable process.
Comprehensive 2026 scam statistics: total losses, average per victim, demographics, reporting rates, and trend data with sources.
Wire transfer fraud costs billions annually because wires are nearly irreversible. Learn how scammers manipulate victims into sending money they can never recover.
CEO fraud costs businesses billions annually. Scammers impersonate executives to trick employees into sending money or sensitive data. Learn how to fight back.