IsThisAScam
ГоловнаBlogЦіниПро насHistoryAPIExtension
Upgrade
UK
Sign in
Sign in
IsThisAScam

Independent scam & phishing analysis. Free for individuals. APIs for developers.

Operated by Zeplik, Inc.
Продукт
  • Home
  • Blog
  • Pricing
  • Про нас
  • History
  • Chrome Extension
Resources
  • Developers
  • Документація API
  • Phishing brief
  • Romance scams
  • Tech support
  • Crypto scams
  • Apple scams
  • PayPal scams
Правова інформація
  • Політика конфіденційності
  • Умови використання
  • product@zeplik.com

© 2026 Zeplik, Inc. Усі права захищено.

Built for the calm, the cautious, and the careful.

Reference

Cybersecurity Glossary.

Plain-language definitions of every scam type, attack vector, and security concept you need to understand to stay safe online.

44 Terms
Advance Fee FraudBaitingBotnetBrute Force AttackBusiness Email CompromiseCatfishingClickjackingCredential StuffingCryptocurrency ScamDark PatternDeepfakeDKIMDMARCIdentity TheftKeyloggerMalwareMan-in-the-MiddleMoney MulePharmingPhishingPig ButcheringPonzi SchemePretextingRansomwareRomance ScamRug PullShoulder SurfingSIM SwappingSkimmingSmishingSocial EngineeringSpear PhishingSPFSpoofingSpywareTailgatingTech Support ScamTrojanTwo-Factor AuthenticationTyposquattingVishingWatering Hole AttackWhalingZero-Day Exploit

Attack Vector

Phishing
Fraudulent messages disguised as trusted sources to steal information.
→
Spear Phishing
Targeted phishing using personal information about the victim.
→
Whaling
Spear phishing aimed at senior executives and high-value individuals.
→
Smishing
Phishing via SMS text messages.
→
Vishing
Phishing via phone calls (voice phishing).
→
SIM Swapping
Transferring a victim's phone number to steal 2FA codes.
→
Credential Stuffing
Using stolen passwords to break into accounts where they were reused.
→
Brute Force Attack
Systematically trying every password combination.
→
Man-in-the-Middle
Intercepting communications between two parties.
→
Spoofing
Disguising communications to appear from a trusted source.
→
Pharming
Redirecting website traffic to fraudulent sites via DNS manipulation.
→
Typosquatting
Registering misspelled domain names to catch typing errors.
→
Clickjacking
Tricking users into clicking hidden elements on web pages.
→
Watering Hole Attack
Compromising websites frequented by a target group.
→
Skimming
Stealing card data with hidden devices at ATMs and terminals.
→
Shoulder Surfing
Watching someone enter PINs or passwords in public.
→

Scam Type

Catfishing
Creating a fake online identity to deceive others.
→
Pig Butchering
Long-con combining romance and fake investment platforms.
→
Rug Pull
Crypto developers abandoning a project and stealing investors' funds.
→
Ponzi Scheme
Using new investors' money to pay returns to earlier investors.
→
Advance Fee Fraud
Requiring upfront payment for a promised larger sum that never arrives.
→
Business Email Compromise
Fraudulent emails targeting businesses to authorize wire transfers.
→
Money Mule
A person who transfers stolen money on behalf of criminals.
→
Cryptocurrency Scam
Fraud exploiting crypto complexity to steal money.
→
Romance Scam
Fake online relationships used to extract money from victims.
→
Tech Support Scam
Posing as tech support to charge for fake computer repairs.
→
Identity Theft
Stealing personal information to commit fraud in someone's name.
→

Social Engineering

Social Engineering
Manipulating people into revealing information or taking harmful actions.
→
Pretexting
Creating a fabricated scenario to extract information.
→
Baiting
Luring victims with tempting offers to compromise security.
→
Tailgating
Following authorized people through secured entrances.
→

Technical

Ransomware
Malware that encrypts files and demands payment for the decryption key.
→
Malware
Any software designed to damage or gain unauthorized access to systems.
→
Trojan
Malware disguised as legitimate software.
→
Keylogger
Software or hardware that records keystrokes to steal passwords.
→
Spyware
Software that secretly monitors and collects user activity data.
→
Deepfake
AI-generated fake videos, audio, or images of real people.
→
Dark Pattern
Deceptive UI design that tricks users into unintended actions.
→
Zero-Day Exploit
Attacking an unknown vulnerability before a patch exists.
→
Botnet
Network of compromised devices controlled remotely by criminals.
→

Defense

DKIM
Email authentication using digital signatures to verify the sender.
→
SPF
Email protocol specifying which servers can send for a domain.
→
DMARC
Policy layer tying SPF and DKIM together for email authentication.
→
Two-Factor Authentication
Requiring two forms of ID to access an account.
→
Suspect Something?

Run a scan on the message you received.

Run a scan →