LEARN

Understand how scammers operate and how to protect yourself.

THE THREE VECTORS

PHISHING

Email-based fraud

Attackers send fraudulent emails impersonating trusted organizations — banks, government agencies, or popular services — to steal credentials or money.

RED FLAGS
  • Urgent subject lines threatening account suspension
  • Generic greetings like 'Dear Customer'
  • Mismatched sender email domains
  • Suspicious links that don't match the claimed sender
  • Requests for passwords, OTP codes, or card numbers
REAL EXAMPLE
From: [email protected]
Subject: URGENT: Verify your account now!

Dear Customer, your account has been flagged for suspicious activity. Click here to verify within 24 hours or your account will be permanently closed.

VISHING

Voice/phone fraud

Scammers call victims impersonating IRS agents, bank fraud departments, tech support, or government officials to extract money or personal information.

RED FLAGS
  • Caller claims you owe taxes or face arrest
  • Requests for gift cards as payment method
  • Pressure to stay on the line and not tell anyone
  • Asks for remote access to your computer
  • Spoofed caller ID showing legitimate numbers
REAL EXAMPLE
"This is the IRS. You have an outstanding tax debt of $2,400. A warrant has been issued for your arrest. To avoid prosecution, you must pay immediately using Google Play gift cards. Do NOT hang up."

SMISHING

SMS-based fraud

Fraudulent text messages designed to trick recipients into clicking malicious links, calling fake numbers, or revealing personal information.

RED FLAGS
  • Unexpected package delivery notifications with fees
  • Bank alerts asking to click a link
  • Prize or lottery win notifications
  • Government benefit claims requiring personal info
  • Short URLs hiding the actual destination
REAL EXAMPLE
ALERT: Your HSBC account has been locked due to suspicious activity. Verify your identity now: http://hsbc-secure-verify.net/login

PSYCHOLOGICAL MANIPULATION

Scammers are expert manipulators. They exploit fundamental human psychology to bypass rational thinking. Recognizing these tactics is critical.

FEAR & THREAT

Threats of arrest, account closure, or legal action to force immediate compliance without rational thought.

FALSE AUTHORITY

Impersonating police, IRS, banks, or tech companies to leverage perceived authority and trust.

ARTIFICIAL SCARCITY

"Only 2 hours left" or "Final warning" to create panic and bypass careful decision-making.

RECIPROCITY

Offering something free (prize, refund) to create a sense of obligation to comply with requests.

SOCIAL PROOF

"Other customers have already verified" to normalize the fraudulent request.

ISOLATION

"Don't tell anyone" or "Stay on the line" to prevent victims from seeking outside advice.

PROTECTION RULES

VERIFY INDEPENDENTLY

Never use contact information provided in a suspicious message. Look up the official number or website independently and contact them directly.

NEVER SHARE OTP CODES

Legitimate organizations will never ask for one-time passwords, PINs, or passwords over phone, email, or SMS. This is always a scam.

GIFT CARDS ≠ PAYMENT

No legitimate government agency, utility company, or business accepts gift cards as payment. Any such request is 100% a scam.

RESIST URGENCY

Scammers create artificial urgency to prevent you from thinking clearly. Legitimate organizations give you time to verify. Slow down and verify.

TRUST YOUR INSTINCTS

If something feels wrong, it probably is. Hang up, delete the message, or close the email. You can always verify through official channels.

USE SCAMGUARD

When in doubt, paste the suspicious message into ScamGuard for an instant AI-powered analysis before taking any action.

RECEIVED SOMETHING SUSPICIOUS?

Analyze it instantly with our AI engine.

SCAN NOW