Warning - scam detected!

Got a scam warning from the Threat Protection Pro™ scam and fraud alert tool? Check what it means.

hero cybercrime unprotected criminals danger

What should I do after getting a scam warning?

If Threat Protection Pro™ alerted you about a scam website and you immediately closed the tab — you don’t have to do anything. Your data and devices should be safe. However, if you interacted with the website or just want to be extra safe, you can take certain actions:

01

Block the source

Whether you got the link to this website from a social media post, email, or a DM — immediately report and block the user who shared it.

02

Report the website

Help other internet users who may not have additional browsing protection and report the website. It’s a small step, but it can make the internet a safer place.

03

Protect your data

If you interacted with the content on the scam website or communicated with people running it, make sure your accounts, passwords, and financial details are safe.

How does Threat Protection Pro™ recognize scam websites?

Threat Protection Pro™ uses a large database of known scam sites, that our threat intelligence researchers regularly update.

In addition to using our internal ML based engine, our threat intelligence researchers regularly review public and private data and incorporate their findings into Threat Protection Pro™. When you visit a website, it analyzes that URL for signs of malicious activity. If it recognizes a potential risk, you’ll instantly see a warning message that it could be a fake or scam website.

Scams Threat Protection Pro™ blocked

16,452,501

December 2024

Most common types of scams on the internet

B2B scam

Business-to-business scammers pretend to be real businesses to trick other companies into paying for fake goods or services.

Chargeback recovery scam

Scammers pretend to help recover money lost through chargebacks. They ask for upfront payments or personal information and then disappear.

Crypto scam

Scammers trick people into investing in fake crypto or steal people’s crypto from digital wallets through phishing attacks or fake initial coin offerings.

Romance scam

Scammers create fake dating profiles, establish relationships with their victims, and start manipulating them. These criminals usually ask for money or gifts.

Job offer scam

Scammers post fake job offers, demand that the victims pay fees for training or equipment, and ask for sensitive information to verify employment or identity.

IT support scam

Scammers pretend to be IT support agents, claim that your device has a virus, and then charge for fake services or gain remote access to steal personal data.

Illegal goods and services scam

Scammers try to sell illegal goods or services, like counterfeit products, drugs, or hacked accounts. It could expose users to financial loss or even legal problems.

Intellectual property infringement scam

Scammers demand payment for alleged intellectual property violations on your part and often threaten legal action to coerce payment.

Investment scam

Scammers offer exciting new investment opportunities and promise high returns with low risk. People who fall for this scam often lose their investments and personal data.

Shopping scam

Scammers set up online shops with very low prices to attract buyers. As a result, shoppers may receive fake products, get nothing at all, or have their financial information stolen.

Recurring subscription scam

Victims sign up for services with hidden recurring fees, which are next to impossible to cancel. This scam often results in significant financial loss or even stolen credit card data.

Frequently asked questions