What the FTC Wants You to Know About Today’s Scams

Last month, during National Consumer Protection Week, the Federal Trade Commission (FTC) hosted a crucial webinar to brief the public on the evolving landscape of fraud. While the full, detailed report is available from the agency directly, the key takeaway is clear: scammers are refining their tactics, leveraging new technology and timeless psychological tricks to separate people from their money and personal information. For anyone who goes online, uses a phone, or manages finances, understanding these trends isn’t just useful—it’s a necessary part of modern self-defense.

Here’s a breakdown of the prominent scam patterns the FTC highlighted and, more importantly, what you can do about them.

The New Front Lines of Fraud

The webinar underscored that while the goals of fraudsters remain the same, their methods are becoming more sophisticated and targeted. Two major themes emerged:

  1. The Rise of Imposter Scams 2.0: Imposter scams—where someone pretends to be a trusted entity—remain the top reported category to the FTC. The new twist is the increasing use of technology to make the deception more convincing. This includes:

    • AI-Enhanced Phishing: Scammers are using generative AI to create flawless emails, text messages, and social media posts. Grammatical errors and awkward phrasing, once red flags, are disappearing.
    • Deepfake and Voice Cloning: There are growing concerns about the use of manipulated audio and video. A common tactic might involve a cloned voice of a family member in distress, urgently requesting money.
    • Business and Government Impersonation: Fraudsters are meticulously mimicking the logos, email headers, and language of real companies, utility providers, or even federal agencies like the FTC itself to demand payment or sensitive information.
  2. Exploitation of Current Events and Payment Systems: Scammers are agile, constantly tailoring their pitches to headlines. The FTC noted spikes in schemes related to:

    • Financial “Help” Offers: Fake loan modifications, debt relief programs, and investment “opportunities” targeting those feeling economic pressure.
    • Irresistible “Too-Good-To-Be-True” Deals: Especially on social media marketplaces, offering luxury goods, event tickets, or pets at steep discounts, only to disappear after payment via irreversible methods.
    • Pressure for Unconventional Payment: A major red flag is the insistence on payment via gift cards, wire transfers, peer-to-peer payment apps (like Venmo or Cash App for transactions with strangers), or cryptocurrency. These are preferred by criminals because they are difficult to trace and nearly impossible to reverse.

Practical Steps to Shield Yourself

Knowledge of these trends is only powerful if it changes behavior. Here are concrete actions you can take:

  • Slow Down and Verify. Scammers create urgency. If you get a pressing call, email, or text demanding immediate action or payment, pause. Hang up and contact the organization directly using a phone number or website you know is genuine—not the contact information provided in the suspicious message.
  • Be Skeptical of Unsolicited Contact. Whether it’s a “tech support” pop-up, a romance match that seems perfect, or a job offer you didn’t apply for, default to skepticism. Legitimate businesses and agencies do not typically initiate contact to demand payments or sensitive data out of the blue.
  • Secure Your Communication. Enable two-factor authentication (2FA) on important accounts, but be wary of codes you didn’t request. A scammer trying to breach your account may trigger a 2FA code; they will then call you pretending to “help” and ask you to read that code to them.
  • Think Hard About Payment Method. Treat any request for payment via gift cards, wire transfer, or cryptocurrency as a glaring warning sign. These are not normal payment methods for legitimate services or purchases from strangers.
  • Protect Your Personal Information. Be cautious about what you share on social media. Details like your mother’s maiden name, pet’s name, or birthdate can be used to answer security questions or build a profile for impersonation.

What to Do If You’re Targeted or Defrauded

If you suspect a scam or have already lost money, acting quickly matters.

  1. Report It. File a report with the FTC at ReportFraud.ftc.gov. This data is vital—it helps the FTC and law enforcement identify patterns, track scam operators, and build cases.
  2. Notify Relevant Companies. If the scam involved an impersonated business, a compromised bank account, or a gift card, contact the real company’s fraud department immediately.
  3. Secure Your Identity. If you shared personal information like your Social Security number, visit IdentityTheft.gov for a step-by-step recovery plan.
  4. Warn Your Network. Tell friends and family about the scam attempt. Sharing your experience can help protect others.

Staying Protected is an Ongoing Process

The FTC’s webinar reinforces that consumer protection is a shared responsibility. While agencies work to crack down on fraud, our best individual defense is a combination of healthy skepticism, verified information, and prompt reporting. Scams evolve, but the core principles of caution—slowing down, verifying identities, and guarding your data—remain constant. By staying informed about these latest trends, you empower yourself to navigate the digital world with greater confidence and security.

Sources & Further Reading:

  • The primary information is based on the FTC’s National Consumer Protection Week webinar held in March 2026.
  • For the latest data and to report fraud, always refer to the official Federal Trade Commission website: ftc.gov.