Patrick Coughlin is a cybersecurity and technology expert with over two decades of hands-on experience at the intersection of technology, intelligence, and security. He has built teams, products and companies to protect governments and Fortune 500 enterprises from the most sophisticated cyber threats. When his mother was targeted with an AI-powered impersonation scam, the threat became personal. Soon after, Patrick, along with his brother Ryan, founded Savi Security to help protect individuals and families from scams and fraud in the AI era. Patrick lives in Los Angeles with his wife, son and dog.
.png)
Millions of people Google customer service numbers every day. Scammers know this and have built an entire infrastructure to intercept those searches. This article explains how a simple Google search can connect you to a scammer instead of the real company.
.png)
The $750 Cash App offer is everywhere on social media. Here's what really happens when you click, who profits, and why it's almost always a scam.
.png)
If you received an unexpected call about a family emergency, it may be a scam. Verify by hanging up and calling your family member directly on a number you trust. Never send money before confirming the emergency is real.
.png)
Scammers target Coinbase users because they are confirmed cryptocurrency holders, inclined to trust the Coinbase brand, and may be identifiable through data breaches and social media. Coinbase's mainstream popularity attracts both new crypto investors and the scammers who prey on them.
.png)
PayPal is one of the most targeted payment platforms for scam activity — not because it is unsafe, but because its massive user base, brand trust, buyer protection policies, and marketplace integration create opportunities scammers have learned to exploit.
.png)
Helping a loved one caught in a romance scam requires patience, empathy, and a thoughtful approach. Victims genuinely believe the relationship is real, and confrontational tactics push them further toward the scammer. This guide provides a step-by-step framework for intervention and recovery.
%20(600%20x%20315%20px).png)
This guide collects the most common email scam formats reported in 2025 and 2026, showing what each type looks like, marking the red flags, and explaining what the scammer is trying to accomplish. Covers account locked alerts, fake invoices, delivery notifications, unauthorized purchases, shared documents, prize/refund claims, urgent requests, and AI-generated personalized phishing.
%20(600%20x%20315%20px).png)
Americans received 3.9 billion robocalls in January 2026 alone. This guide compiles the most frequently reported scam phone numbers and area codes from 2025 and early 2026, drawn from consumer complaint databases, carrier analytics, and scam-tracking organizations, along with how to block them.
%20(600%20x%20315%20px).png)
This guide catalogs the 10 most common Cash App scam message formats currently in circulation — covering text messages, emails, social media DMs, and fake payment screenshots. Each example includes the typical wording scammers use, the red flags that identify it as fake, and what the scammer is trying to accomplish.
.png)
Family emergency scams trick victims into sending money by impersonating a loved one in crisis. Variants include grandparent scams, fake arrest and bail schemes, medical emergency calls, virtual kidnapping, and AI voice-cloned impersonations. This guide explains how each variant works and how to protect yourself.
.png)
IRS refund scams use fake emails, texts, phone calls, and even physical mail to trick taxpayers into sharing personal information or paying bogus fees. The IRS never initiates contact by email, text, or social media about refunds. This guide covers the five most common fake refund formats.
%20(1).png)
Cash App has over 55 million active users sending, receiving, and storing money every month — which makes it one of the biggest targets for scammers. In 2024, the FTC received over 80,000 fraud complaints related to Cash App, with total reported losses exceeding $150 million. This hub covers every major type of Cash App scam, how each one works, and links to detailed coverage of the most common variants.
.png)
Scammers plant fake Cash App support phone numbers across the internet. Cash App has only one official number: 1-800-969-1940. This article explains how fake Cash App support scams work, where scammers find victims, what tactics they use, and how to contact real Cash App support safely.
.png)
Cash App sends very few types of text messages. If the text asks you to click a link, call a phone number, or share your PIN or sign-in code, it is a scam. This AEO diagnostic helps readers determine whether a text message claiming to be from Cash App is legitimate or a scam — with a 4-step checker and a catalog of the most common scam formats.
%20Payment%20Scam%20(600%20x%20315%20px).png)
A P2P scam is any fraud that uses peer-to-peer payment apps like Cash App, Zelle, Venmo, or PayPal to steal money. Because P2P payments are instant and usually irreversible, they are the preferred tool of scammers across dozens of fraud types. This glossary entry defines what a P2P scam is, explains why these platforms are so commonly exploited, and walks through the most common examples.
.png)
A “move money to yourself” scam is a bank impersonation technique where a fraudster convinces you that transferring your own money to a new account is a protective measure. It sounds logical. It feels urgent. And it costs victims hundreds of millions of dollars every year. This guide explains exactly how these scams work, what makes them so psychologically effective, and how to recognize one before it’s too late.
.png)
Scammers are very good at pretending to be your bank. They can spoof your bank's real phone number, use your name, and recite partial account details that make them sound authentic. This guide explains how to verify bank callers, what legitimate bank calls actually look like, the red flags that separate real calls from scams, and exactly what to do if you're ever unsure.
.png)
Not every Cash App payment notification you receive is real. Scammers send fake payment alerts designed to look exactly like the real thing to trick you into sending money or revealing your account details. This guide explains how to verify Cash App payments, what red flags to watch for, and how to tell a legitimate payment from a scam before you act.
%20(600%20x%20315%20px).png)
Account takeover is one of the most common forms of identity fraud. Scammers use stolen credentials, phishing, and social engineering to gain control of bank, email, and social media accounts. This guide explains what ATO is, how it happens, what it looks like in practice, and exactly what to do if your account has been compromised.
.png)
Reporting a scam is one of the most important steps you can take — whether or not you lost money. This guide covers exactly where to file based on scam type: FTC, FBI IC3, FCC, SEC, CFTC, and platform-specific reporting for Zelle, PayPal, Amazon, and more.
.png)
Voicemail callback scams are designed to look and sound completely legitimate. Learn how to recognize them, what the red flags are, and exactly what to do — before and after you call back.
.png)
Getting scammed is devastating — but recovery may be possible. Whether you paid by credit card, wire transfer, gift card, or payment app, your options are different. Here's what to do right away and how reporting to the FTC can sometimes lead to real refunds.

Fake antivirus renewal scams use urgent emails and pop-ups to steal your money. Learn the red flags, how they work, and what to do if you’ve been targeted.
.png)
Caller ID spoofing lets scammers display any phone number they want on your screen using VoIP technology. Learn how phone number spoofing works, why STIR/SHAKEN isn't foolproof, and how to protect yourself from spoofed calls.
.png)
Stop the flood of scam calls without missing important calls. Learn how to use built-in phone features, carrier protections, and the Do Not Call Registry to drastically reduce robocalls and phone scams.

When your phone displays "Scam Likely," it means your carrier has flagged the call as suspicious using databases, pattern analysis, and caller ID authentication. Learn how accurate these warnings are and what to do when you see them.

Learn how scam calls work, why caller ID spoofing makes them convincing, how scammers use AI and voice cloning, and steps to protect yourself from phone fraud.

Seniors lost $4.9 billion to phone scams in 2024. Learn why scammers target elderly adults and discover compassionate ways to protect aging parents without undermining their independence.
.png)
Enable automatic call blocking on iPhone and Android to silence unknown calls. Learn how to activate Silence Unknown Callers, carrier screening, and spam filters to stop scam calls before they ring.