

Check out our materials below for more information on how you can remain up-to-date and protected.
Impersonation Scams
What they are
Impersonation scams occur when criminals pretend to be someone you trust—such as a company, government agency, family member, or tech support—to trick you into sending money, sharing personal information, or giving account access. These scams rely heavily on urgency, fear, and authority to push victims into acting quickly without verifying the request.
Legitimate organizations do not pressure you, demand secrecy, or request unusual forms of payment. Slow down, verify independently, and trust your instincts.
Red flags to watch for
Be cautious if you notice any of the following:
- Unexpected contact claiming to be from a trusted organization
- Urgent or threatening language (“Act now,” “Your account will be locked”)
- Requests for payment via gift cards, wire transfers, or cryptocurrency
- Pressure to keep the situation secret
- Requests for login credentials, verification codes, or remote access
- Refusal to let you verify their identity through official channels
If something feels rushed or off, it probably is.
What to do next (if you are a victim)
If you believe you’ve interacted with an impersonation scam:
- Stop communication immediately with the scammer
- Do not send additional money or information
- Contact your bank or credit card provider right away
- Change passwords on affected accounts and enable multi‑factor authentication
- Report the scam to the FTC at reportfraud.ftc.gov
- Warn others, especially family members who may be targeted
Acting quickly can help limit financial and identity damage.
Common examples of impersonation scams
Grandparent Scam
Scammers pose as a grandchild (or someone calling on their behalf) claiming an emergency and urgently requesting money.
Amazon Imposter Scam
Fake representatives claim there’s a problem with an Amazon account or order to steal login or payment details.
Bank Impersonator Scam
Criminals pretend to be from your bank, warning of suspicious activity to trick you into sharing account information.
Microsoft “Hacked” Scam
Victims are told their computer is infected or hacked and are pressured into granting remote access or paying for fake fixes.
Jury Duty Scam
Scammers claim you’ve missed jury duty and demand immediate payment to avoid arrest.
Charity Scam
Fake charities solicit donations, often after disasters or during holidays, using emotional manipulation.
Customer Service Scam
Imposters pretend to be support agents for popular companies and trick victims into sharing credentials.
Toll Road Scam
Victims receive texts or emails claiming unpaid tolls with links leading to fake payment sites.
Car Warranty Scam
Calls or messages warn that a vehicle warranty is expiring and attempt to collect payment or personal details.
Payment & Financial Fraud
What they are
Payment and financial fraud scams are designed to steal money directly by manipulating how victims send or receive payments. Scammers often exploit unfamiliar payment methods, fake invoices, fraudulent checks, or compromised email accounts. These scams typically move money quickly and irreversibly, making recovery difficult if action isn’t taken fast.
Legitimate payments don’t require secrecy, urgency, or unusual payment methods. Always verify payment requests through trusted channels before sending money.
Red flags to watch for
Be alert if you notice any of the following:
- Requests for payment using gift cards, wire transfers, cryptocurrency, or peer‑to‑peer apps
- Instructions to act quickly to avoid penalties or missed opportunities
- Overpayments with requests to “refund” the difference
- Invoices or payment changes sent via email without verification
- Unusual payment requests that bypass normal procedures
- Pressure to keep the transaction confidential
If the payment method feels rushed or unusual, stop and verify.
What to do next (if you are a victim)
If you believe you’ve been targeted or affected:
- Stop all payments immediately
- Contact your bank or payment provider as soon as possible
- Do not return or forward funds from suspicious checks or deposits
- Save all communications and transaction details
- Report the fraud at reportfraud.ftc.gov
- Review accounts for unauthorized activity and update security settings
Quick reporting increases the chance of limiting losses.
Common examples of payment & financial fraud
Gift Card Scam
Scammers demand payment using gift cards because they are hard to trace and difficult to recover once used.
Check Scam
Victims receive fake checks and are instructed to deposit them, then send part of the funds elsewhere before the check is discovered to be fraudulent.
Business Email Compromise (BEC)
Attackers gain access to or spoof business email accounts to redirect legitimate payments to fraudulent accounts.
Overpayment Scam
A scammer sends excess funds (usually via check) and asks the victim to refund part of the payment before it bounces.
Invoice Fraud
Fake or altered invoices are sent to trick businesses or individuals into paying the wrong account.
Phishing & Delivery Methods
What they are
Phishing and delivery‑method scams describe how scammers contact and deceive victims, rather than a specific scam itself. These methods are used to deliver many other scams—including impersonation, financial fraud, and identity theft—by tricking people into clicking links, sharing information, or making payments.
The message may look legitimate, but the goal is always the same: steal money, credentials, or personal data.
Phishing succeeds by creating urgency and trust. Slow down, verify messages independently, and never click or respond until you’re sure the communication is legitimate.
Red flags to watch for
Be cautious of any message or interaction that includes:
- Unexpected emails, texts, or calls asking you to act quickly
- Links or QR codes urging immediate action
- Requests for login credentials, verification codes, or payment
- Messages containing spelling, grammar, or formatting errors
- Generic greetings instead of your real name
- Threats of account suspension, legal action, or lost access
If you didn’t initiate the contact, treat it with skepticism.
What to do next (if you are a victim)
If you suspect you clicked, replied, or shared information:
- Stop interacting immediately
- Do not click on additional links or provide more details
- Change passwords for affected accounts
- Enable multi‑factor authentication
- Run antivirus or security scans on your device
- Contact financial institutions if money or credentials were shared
- Report the incident at reportfraud.ftc.gov
Fast action can prevent further damage.
Common phishing & delivery methods
Phishing (Email)
Fraudulent emails designed to look like legitimate organizations, often containing malicious links or attachments.
Smishing (Text Messages)
Scam messages sent via SMS that claim issues with deliveries, accounts, or payments.
Vishing (Phone Calls)
Scammers call pretending to be banks, government agencies, or tech support to pressure victims into sharing information.
QR Code Scam
Malicious QR codes redirect victims to fake websites designed to steal credentials or payment details.
Fake Account Alerts
Messages warn of suspicious activity and urge you to click immediately to “secure” an account.
Malicious Attachments
Emails include attachments disguised as invoices, receipts, or documents that install malware.
Online & Social Media Scams
What they are
Online and social media scams exploit platforms people already trust, such as social networks, marketplaces, dating apps, and messaging services. Scammers create fake profiles, listings, or conversations to build trust before stealing money, personal information, or account access.
These scams often feel personal, making them harder to recognize and easier to fall for.
Online scams succeed by building trust quickly and avoiding verification. Always keep transactions on the platform, verify identities independently, and walk away from pressure or secrecy.
Red flags to watch for
Be cautious if you notice any of the following:
- Newly created or incomplete profiles
- Requests to move conversations off the platform quickly
- Deals that seem too good to be true
- Refusal to meet in person or use secure payment options
- Pressure to send money, deposits, or personal information
- Emotional manipulation, flattery, or urgent personal stories
Trust your instincts—if something feels off, pause and verify.
What to do next (if you are a victim)
If you believe you’ve been scammed online or through social media:
- Stop communicating with the scammer immediately
- Do not send additional money or information
- Report the account or listing to the platform
- Contact your bank or payment provider if money was sent
- Change passwords for affected accounts
- Save messages, screenshots, and transaction records
- Report the scam at reportfraud.ftc.gov
Prompt action can help prevent further losses and protect others.
Common online & social media scams
Facebook Marketplace Scam
Fake buyers or sellers use counterfeit listings, payment tricks, or fake shipping confirmations to steal money.
Romance Scam
Scammers form online relationships, then create emotional or financial emergencies to request money.
Catfishing
Fraudsters use fake identities or stolen photos to manipulate victims, often leading to romance or financial scams.
Fake Giveaway or Prize Scam
Victims are told they’ve won a prize but must pay fees or provide personal information to claim it.
Investment or Crypto Scam
Scammers promote fake investment opportunities, often through social media messages or groups, promising high returns with little risk.
Fake Job Scam
Fraudulent job postings ask for upfront fees, personal information, or banking details under the guise of employment.
Identity Theft
What it is
Identity theft occurs when someone steals your personal information—such as your Social Security number, bank details, login credentials, or credit card information—and uses it without your permission. Criminals may open accounts, make purchases, file tax returns, or commit other fraud in your name.
Identity theft is often the end goal of many other scams, including phishing, impersonation, and online scams.
Identity theft can happen quietly and escalate quickly. Protecting your personal information, verifying requests, and responding fast to warning signs are your best defenses.
Red flags to watch for
You may be experiencing identity theft if you notice:
- Unrecognized charges or withdrawals
- Bills or collection notices for accounts you didn’t open
- Credit report inquiries you don’t recognize
- Missing mail or sudden changes to account information
- Alerts about password resets you didn’t request
- Government notices about taxes, benefits, or employment you didn’t file
Even small, unexplained changes can signal a larger problem.
What to do next (if you are a victim)
If you suspect identity theft, act quickly:
- Place a fraud alert or credit freeze with the major credit bureaus
- Review your credit reports for unauthorized activity
- Change passwords for affected accounts and enable multi‑factor authentication
- Contact banks, lenders, or companies involved
- File an identity theft report at identitytheft.gov
- Monitor accounts regularly for new or recurring fraud
Early action can reduce long‑term damage.
Common types of identity theft
Financial Identity Theft
Criminals use stolen information to open credit cards, loans, or bank accounts.
Account Takeover
Scammers gain access to existing accounts (email, banking, social media) and lock out the legitimate owner.
Tax Identity Theft
Fraudsters file tax returns using stolen information to claim refunds.
Medical Identity Theft
Someone uses another person’s identity to receive medical services or submit insurance claims.
Employment Identity Theft
A stolen identity is used to gain employment or pass background checks.
Synthetic Identity Theft
Criminals combine real and fake information to create a new identity for fraud.
How identity theft usually starts
Identity theft commonly begins through:
- Phishing, smishing, or vishing attacks
- Impersonation scams
- Data breaches
- Fake websites or malicious links
- Social media oversharing
This is why identity theft often connects directly to other scam categories.
Product & Health Scams
What they are
Product and health scams involve fake, misleading, or unproven products that claim to improve health, appearance, or well being. Scammers often exploit people’s desire to lose weight, cure illness, slow aging, or solve a health problem quickly.
These scams frequently use false testimonials, before‑and‑after photos, and exaggerated claims to create trust and urgency.
Legitimate health products don’t promise instant cures or guaranteed results. Take time to research products, verify claims, and avoid pressure to buy quickly.
Red flags to watch for
Be cautious if you encounter:
- Claims of quick or guaranteed results
- “Miracle,” “breakthrough,” or “secret” formulas
- Products claiming to cure multiple unrelated conditions
- Testimonials instead of scientific evidence
- Pressure to purchase immediately or “limited supply” messaging
- Lack of ingredient transparency or verifiable company details
- Requests for payment through unusual or non‑refundable methods
If it sounds too good to be true, it usually is.
What to do next (if you are a victim)
If you believe you purchased a fraudulent product:
- Stop using the product immediately
- Contact your bank or payment provider to dispute the charge
- Keep receipts, emails, advertisements, and packaging
- Report the scam at reportfraud.ftc.gov
- Monitor for follow‑up scams, such as fake refunds or up-sells
- Consult a healthcare professional if you experience side effects
Reporting helps protect others from being harmed.
Common product & health scams
Weight Loss Scams
Products promise rapid weight loss without diet or exercise, often marketed through social media ads or influencers.
Fake Supplements
Unregulated pills or powders claim to boost immunity, cure disease, or improve mental performance without evidence.
Anti‑Aging Scams
Creams, serums, or devices claim to reverse aging or eliminate wrinkles permanently.
Detox & Cleanse Scams
Products claim to eliminate toxins or “reset” the body using teas, drinks, or patches.
Medical Device Scams
Fake devices promise pain relief, healing, or health improvements without clinical support.
Subscription Traps
Low‑cost trial offers turn into expensive recurring charges that are difficult to cancel.
Why these scams are effective
Product and health scams often succeed because they:
- Target emotions like hope, fear, or self‑improvement
- Use professional‑looking branding and fake reviews
- Leverage influencers, ads, and testimonials instead of facts
Scam Awareness for Seniors
Why seniors are often targeted
Scammers frequently target older adults because they are perceived as more trusting, financially stable, and less familiar with rapidly changing technology. Many scams also exploit politeness, authority, and family concern, which can make them especially convincing.
Anyone can be scammed—but awareness is the strongest defense.
Scammers count on fear, urgency, and isolation. Slowing down, verifying requests, and involving trusted people are the most effective ways for seniors to stay safe.
Common scams that target seniors
Impersonation Scams
Scammers pretend to be banks, government agencies, tech support, charities, or trusted companies to pressure seniors into sending money or sharing information.
Grandparent Scam
Fraudsters pose as a grandchild—or someone calling on their behalf—claiming an emergency and asking for money immediately.
Tech Support & “Computer Hacked” Scams
Victims are told their computer has a virus or has been hacked and are pressured to allow remote access or pay for fake repairs.
Gift Card Scams
Scammers demand payment using gift cards, claiming it’s the only acceptable method.
Phishing & Phone Scams
Emails, texts, or calls claim account problems, missed payments, or legal trouble to trick seniors into clicking links or giving information.
Charity Scams
Fake charities solicit donations, especially after natural disasters or during holiday seasons.
Red flags to watch for
Seniors should pause and verify anytime they encounter:
- Urgent threats or pressure to act immediately
- Requests for secrecy (“Don’t tell your family”)
- Payment requests using gift cards, wire transfers, or cryptocurrency
- Unsolicited calls claiming to be from banks or government offices
- Requests for passwords, codes, or remote computer access
- Callers who resist verification or become aggressive when questioned
Legitimate organizations do not operate this way.
What to do if you think a scam is happening
If something feels wrong:
- Stop and take your time — scammers rely on urgency
- Do not send money or information
- Hang up, delete the message, or close the browser
- Verify independently by calling a trusted number or family member
- Talk to someone you trust before taking action
There is no shame in asking for help.
What to do if you are a victim
If a scam has already occurred:
- Stop contact immediately with the scammer
- Contact your bank or credit card company right away
- Change passwords and enable multi‑factor authentication
- Report the scam at reportfraud.ftc.gov
- Tell family members or caregivers so they can help monitor accounts
Fast action can limit financial and identity damage.
Tips for staying safe
- Let unknown calls go to voicemail
- Never feel rushed into financial decisions
- Keep personal information private
- Use call‑blocking and spam‑filtering tools
- Have a trusted person to verify suspicious requests
