Scam Encyclopedia
Comprehensive guides covering 200+ scam types across 15 categories. Learn to recognize, avoid, and report every type of fraud.
201
Scam Types
15
Categories
12
Languages
24/7
Updated Daily
Browser-in-Browser Attack: The Invisible Phishing Threat
Sophisticated phishing technique that creates fake browser login windows to steal credentials from unsuspecting users.
Clone Phishing: When Legitimate Emails Turn Dangerous
Scammers duplicate legitimate emails from trusted sources, replacing links with malicious ones to steal credentials and financial data.
Credential Stuffing Attacks: How Hackers Exploit Your Passwords
Credential stuffing attacks exploit leaked passwords to break into your accounts. Learn how to identify and prevent this rapidly growing threat.
Evil Twin WiFi Attack: How Fake Hotspots Steal Your Data
Scammers create fake WiFi networks that mimic legitimate hotspots to intercept your passwords, financial data, and personal information.
OAuth Consent Phishing: Identity Theft Through App Permissions
Cybercriminals trick victims into granting malicious apps access to email, cloud storage, and corporate systems through legitimate OAuth screens.
Quishing (QR Code Phishing): A Complete Protection Guide
Scammers use fake QR codes to steal credentials, payment info, and personal data by redirecting victims to malicious websites.
Search Engine Phishing (SEO Poisoning): Complete Guide
Scammers manipulate search results to lure victims to fake websites that steal credentials, financial data, or install malware.
Session Hijacking Scams: Stealing Active Logins
Attackers intercept your active login sessions to access accounts without needing your password, often going undetected for days.
Smishing (SMS Phishing): Text Message Scams Explained
Fraudulent text messages designed to steal personal information, passwords, and financial data through deceptive links and urgent requests.
Vishing (Voice Phishing): Phone Scams That Steal Your Data
Fraudulent phone calls impersonating legitimate organizations to steal personal information, credentials, and money through social engineering.