Alerts, guides, and research from the IsThisAScam team. Updated weekly.
Seniors lose more money to scams than any other age group. Complete guide covering tech support fraud, grandparent scams, Medicare fraud, and prevention.
Digital estate planning ensures your online accounts, photos, and digital assets are handled properly. Guide to legacy contacts, digital wills, and access.
15 practical rules for safe online shopping covering fake stores, payment security, and return scams. Protect your money when buying online.
How to use VirusTotal to check email attachments and links. Limitations for email content analysis and better alternatives.
Comprehensive identity theft prevention for 2026 covering credit freezes, monitoring, digital hygiene, and recovery if your identity is stolen.
Children face unique online threats from gaming scams to predatory apps. Age-appropriate strategies for parents to protect kids without destroying trust.
Fake reviews manipulate buying decisions on Amazon, Google, and Yelp. Learn the telltale patterns that distinguish genuine reviews from paid fakes.
Your data was exposed in a breach. Follow this 10-step recovery plan to protect your accounts, finances, and identity from further damage.
Phishing explained in plain English: how fake emails, texts, and calls trick people into giving up passwords and money. No technical knowledge required.
OfferUp scams include fake listings, payment app fraud, and shipping scams. Complete guide to buying and selling safely on local marketplace apps.
Dating app scams on Bumble, Hinge, and Match use romance fraud, catfishing, and crypto manipulation. Complete guide to safe online dating in 2026.
From taxi overcharging in Bangkok to fake tickets in Paris, this country-by-country guide covers the most common travel scams and how to avoid them in 2026.
Smishing uses text messages to trick you into clicking malicious links. Learn why SMS phishing has exploded and how to identify fake bank texts.
Business Email Compromise has caused over $50 billion in losses worldwide. Learn how BEC attacks work, why they bypass security tools, and how to defend against them.
Verify if products are genuine before and after buying. Serial numbers, packaging, authentication tools, and category-specific guides.
Vishing uses phone calls instead of emails to steal your information. Learn the scripts scammers use, how AI voice cloning has changed the game, and how to protect yourself.
Verify any business is legally registered using free government databases. Secretary of State lookups, EIN verification, and more.
Account verification emails are one of the most common phishing tactics. Learn to distinguish legitimate verification requests from credential-stealing fakes.
Scammers exploit natural disasters and crises by creating fake charity emails. Learn how to verify charitable organizations and donate safely.
Verify any phone caller with these proven techniques. Government impersonation, tech support, and bank scam calls exposed.