IsThisAScam
InícioBlogPreçosSobreHistoryAPI
Upgrade
PT
Sign in
Sign in
IsThisAScam

Independent scam & phishing analysis. Free for individuals. APIs for developers.

Operated by Zeplik, Inc.
Produto
  • Home
  • Blog
  • Pricing
  • Sobre
  • History
Resources
  • Documentação da API
  • Phishing brief
  • Romance scams
  • Tech support
Legal
  • Política de Privacidade
  • Termos de Serviço
  • product@zeplik.com

© 2026 Zeplik, Inc. Todos os direitos reservados.

Built for the calm, the cautious, and the careful.

Blog

Scam intelligence.

Alerts, guides, and research from the IsThisAScam team. Updated weekly.

AllGuidesScam AlertsSecurity TipsIndustry NewsProduct Updates
Security TipsApr 9, 20264 min read

Pharming: The Invisible Phishing You Can't See

Pharming redirects you to fake websites without you clicking a bad link. Learn how DNS poisoning and host file manipulation work and how to protect yourself.

Security TipsApr 9, 20261 min read

How to Check WHOIS Data for Any Website

WHOIS records reveal who owns a website. Learn to read WHOIS data, spot privacy proxies, and use registration details to assess trust.

Scam AlertsApr 8, 20264 min read

DHL Customs Fee Email: How to Check If It's Real

Fake DHL customs fee emails demand payment for non-existent packages. Learn to distinguish real DHL notifications from scams that steal your money and data.

GuidesApr 7, 20268 min read

How to Tell if a Text Message is a Scam: 10 Warning Signs

Ten specific warning signs that a text message is a scam, with real-world examples of smishing attacks and instructions for reporting scam texts.

GuidesApr 7, 20265 min read

How to Protect Elderly Parents from Online Scams

A compassionate, practical guide for helping older adults avoid scams without undermining their independence or dignity.

Scam AlertsApr 7, 20264 min read

Microsoft 365 Password Expiry Emails: Always a Scam

Microsoft 365 password expiry emails are always phishing. Microsoft removed password expiration policies years ago. Here is how to recognize and handle them.

Security TipsApr 7, 20264 min read

Clone Phishing: How Scammers Copy Real Emails

Clone phishing duplicates legitimate emails you have already received and replaces links or attachments with malicious versions. Here is how to detect the copies.

Security TipsApr 7, 20261 min read

How to Check Domain Age: Why New Domains Are Suspicious

Learn why domain age matters for website trust. Step-by-step guide to check when any website was registered and what it reveals.

Scam AlertsApr 6, 20264 min read

Fake LinkedIn Connection Requests: What to Watch For

Scammers use fake LinkedIn connection requests to harvest personal data, spread malware, and launch targeted attacks. Spot the warning signs before connecting.

Scam AlertsApr 5, 20263 min read

DocuSign Scam Emails: How Scammers Exploit Digital Signatures

Fake DocuSign emails trick people into revealing credentials or signing fraudulent documents. Learn to identify phishing emails disguised as DocuSign requests.

Security TipsApr 5, 20264 min read

Whaling Attacks: When Scammers Target Executives

Whaling goes after CEOs, CFOs, and board members with meticulously crafted attacks. Learn how these high-stakes scams work and why executives are uniquely vulnerable.

Security TipsApr 5, 20261 min read

How to Check a Website's SSL Certificate

Learn to inspect SSL certificates to verify website identity. Step-by-step for Chrome, Firefox, and Safari with real examples.

Scam AlertsApr 4, 20263 min read

Fake Zoom Meeting Invitations: A New Phishing Technique

Scammers are sending fake Zoom meeting invitations to steal credentials and install malware. Learn to spot these phishing emails before clicking.

Scam AlertsApr 3, 20263 min read

Facebook Account Disabled Email: Real or Phishing?

Emails claiming your Facebook account has been disabled are a top phishing vector. Learn how to verify these notices and protect your Meta account.

Scam AlertsApr 3, 20263 min read

Dropbox Shared Document Email: Why You Shouldn't Click

Fake Dropbox document sharing emails are a common phishing vector targeting both personal and business users. Learn why these notifications are dangerous.

Security TipsApr 3, 20265 min read

Spear Phishing vs Regular Phishing: Why Targeted Attacks Are Worse

Regular phishing casts a wide net. Spear phishing researches you personally. Here is why targeted attacks succeed far more often and how to defend against them.

Security TipsApr 3, 20261 min read

How to Check URL Safety: Free Tools and Methods

Verify any URL before clicking with free tools and manual techniques. Protect yourself from phishing, malware, and scam sites.

Security TipsApr 2, 20265 min read

SPF, DKIM, and DMARC Explained: Email Authentication for Everyone

A plain-language explanation of the three email authentication protocols that protect against email spoofing and phishing.

Security TipsApr 2, 20264 min read

Do VPNs Protect You from Scams? What Actually Works

VPN companies market themselves as security tools, but they don't protect against most scams. Here's what VPNs actually do and what actually keeps you safe.

Scam AlertsApr 2, 20263 min read

Netflix Payment Failed Email: Scam or Real?

That Netflix payment failed email might not be from Netflix at all. Learn to identify fake Netflix billing emails and protect your payment information.

1234567891011