Scam Encyclopedia
Comprehensive guides covering 200+ scam types across 15 categories. Learn to recognize, avoid, and report every type of fraud.
199
Scam Types
15
Categories
12
Languages
24/7
Updated Daily
DNS Hijacking Scams: How Attackers Redirect Your Traffic
Attackers manipulate domain settings to redirect website visitors to fraudulent sites, stealing credentials and payment information.
Email Account Compromise (EAC): How Hackers Hijack Your Inbox
Cybercriminals gain unauthorized access to email accounts to steal data, impersonate victims, and defraud contacts for financial gain.
Man-in-the-Middle Attack: Complete Protection Guide
Cybercriminals intercept communications between you and legitimate services to steal credentials, financial data, and personal information.
Pharming (DNS Redirect) Scam: Complete Protection Guide
Pharming attacks redirect your web traffic to fraudulent sites without your knowledge, stealing credentials and financial data.
SIM Swapping Scams: Complete Protection Guide
Criminals hijack your phone number to steal money, cryptocurrency, and personal accounts by transferring your number to their device.
Spear Phishing Attacks: Targeted Email Fraud Explained
Highly personalized email attacks using researched information to trick specific individuals into revealing credentials or transferring funds.
Whaling Attacks: How Executives Lose Millions to Targeted Phishing
Sophisticated phishing attacks targeting C-suite executives and high-level decision-makers to steal credentials or authorize fraudulent wire transfers.
Browser-in-Browser Attack: The Invisible Phishing Threat
Sophisticated phishing technique that creates fake browser login windows to steal credentials from unsuspecting users.
Calendar Invite Phishing: How Scammers Exploit Your Schedule
Fraudsters send malicious calendar invitations containing phishing links or fake meeting requests to steal credentials and sensitive data.
Clone Phishing: When Legitimate Emails Turn Dangerous
Scammers duplicate legitimate emails from trusted sources, replacing links with malicious ones to steal credentials and financial data.
Credential Stuffing Attacks: How Hackers Exploit Your Passwords
Credential stuffing attacks exploit leaked passwords to break into your accounts. Learn how to identify and prevent this rapidly growing threat.
Evil Twin WiFi Attack: How Fake Hotspots Steal Your Data
Scammers create fake WiFi networks that mimic legitimate hotspots to intercept your passwords, financial data, and personal information.
OAuth Consent Phishing: Identity Theft Through App Permissions
Cybercriminals trick victims into granting malicious apps access to email, cloud storage, and corporate systems through legitimate OAuth screens.
Quishing (QR Code Phishing): A Complete Protection Guide
Scammers use fake QR codes to steal credentials, payment info, and personal data by redirecting victims to malicious websites.
Search Engine Phishing (SEO Poisoning): Complete Guide
Scammers manipulate search results to lure victims to fake websites that steal credentials, financial data, or install malware.
Session Hijacking Scams: Stealing Active Logins
Attackers intercept your active login sessions to access accounts without needing your password, often going undetected for days.
Smishing (SMS Phishing): Text Message Scams Explained
Fraudulent text messages designed to steal personal information, passwords, and financial data through deceptive links and urgent requests.
Vishing (Voice Phishing): Phone Scams That Steal Your Data
Fraudulent phone calls impersonating legitimate organizations to steal personal information, credentials, and money through social engineering.
Binary Options Fraud: High-Risk Investment Scams Explained
Fraudulent trading platforms promising quick profits through binary options while manipulating trades to steal investor deposits.
Boiler Room Scam: High-Pressure Investment Fraud
Aggressive cold-call operations using false promises of guaranteed returns to pressure victims into investing in fake securities, penny stocks, or forex schemes.
CFD Trading Fraud: Spot & Avoid Fake Investments
Scammers pose as legitimate CFD brokers to steal deposits through fake trading platforms offering unrealistic returns.
Fake Hedge Fund Scams: Complete Protection Guide
Fraudsters pose as legitimate hedge fund managers to steal investor capital through fabricated returns and exclusive investment opportunities.
Forex Trading Scam: How to Spot Fraudulent Currency Trading
Fraudulent forex platforms promise extraordinary returns on currency trading but are designed to steal your investment capital.
High-Yield Investment Program (HYIP) Scams Explained
Fraudulent investment schemes promising unrealistic returns of 1-5% daily or 50-300% annually that inevitably collapse as Ponzi schemes.