The New Scams on the Block: What the FTC Wants You to Watch For

Each year, scams cost Americans billions of dollars and countless hours of stress. The schemes are always changing, adapting to new technologies and current events. That’s why the recent National Consumer Protection Week is so important—it’s a focused effort to arm the public with the latest knowledge. As part of this, the Federal Trade Commission (FTC) held a webinar highlighting the most prevalent and effective scam trends they’re seeing right now. For anyone who banks online, shops on their phone, or simply has an email address, understanding these trends is your first line of defense.

The Current Scam Landscape: A Quick Snapshot

So, what exactly are the bad actors up to? Based on the FTC’s presentation, the scams aren’t necessarily brand-new concepts, but they’ve been refined and are spreading through new channels. The core goal remains the same: to trick you into handing over money or sensitive personal information through pressure, deception, or fear.

Here are a few of the standout trends they highlighted:

  • The “Emergency” or “Grandparent” Scam, Supercharged: This old scam has gotten a modern, more convincing makeover. Instead of just a panicked phone call from a “grandchild,” scammers now use information gleaned from social media to make the story specific and believable. They may even use AI voice-cloning technology to mimic a loved one’s voice in a distress call, making the plea for immediate wire transfers or gift card payments feel terrifyingly real.

  • Phishing Gets More Personal (and More Official-Looking): Generic “You’ve won a prize!” emails are still around, but the more dangerous phishing attempts now look like they’re from your bank, a government agency like the Social Security Administration, or a familiar company like Amazon or Microsoft. They create a sense of urgency—an unauthorized charge, a suspended account, a missed jury duty summons—and push you to click a link to “verify” information, which instead steals your login credentials.

  • Tech Support Fraud Evolves: Scammers are moving beyond pop-up warnings on your browser. They’re buying online ads that look like legitimate customer support links for major software companies. If you call the number, a “technician” gains remote access to your computer, shows you fabricated “errors” in your system files, and convinces you to pay hundreds for unnecessary “repairs” or “lifetime security subscriptions.”

  • Romance Scams Shift to Investment Ploys: On dating apps and social media, scammers build a relationship over weeks or months (a process called “pig butchering”). Once trust is established, they casually mention an incredible investment opportunity in cryptocurrency or foreign exchange. They guide you to set up an account on a fake, professional-looking trading platform. You may see “gains” initially, but when you try to withdraw your money, it—and the person—vanish.

Why This Knowledge is Your Best Defense

Knowing these trends matters because scams are effective psychological attacks. They exploit our best instincts: the desire to help family, the fear of legal trouble, the worry over financial security, and the hope for love or wealth. The FTC’s data shows these aren’t rare events; millions of people report encounters every year, and many more likely go unreported out of embarrassment.

The common thread in all these scams is pressure and secrecy. The scammer will insist you act immediately, often demanding payment through hard-to-trace methods like wire transfers, gift cards, or cryptocurrency. They will also often tell you not to tell anyone—like your bank or a family member—under the guise of “confidentiality” or to “avoid complicating” the fake situation.

Practical Steps to Protect Yourself Today

You don’t need to be a cybersecurity expert to drastically reduce your risk. Here are actionable steps you can take, informed by the FTC’s guidance:

  1. Slow Down and Verify. Any message, call, or email that demands immediate action is a huge red flag. Hang up or close the message. Independently look up the official customer service number or website for the organization (don’t use contact details provided in the suspicious message) and call them directly to ask if the issue is real.

  2. Know the Preferred Payment Methods of Scammers. Legitimate businesses and government agencies will never demand payment via gift cards (like iTunes or Google Play), wire transfers (via Western Union or MoneyGram), or cryptocurrency. If someone insists on these, it is a scam. Full stop.

  3. Secure Your Personal Information. Be cautious about what you share on social media. Details about your family, job, hobbies, and travel plans are fodder for scammers to personalize their attacks. Use strong, unique passwords and enable multi-factor authentication on all important accounts.

  4. Talk About It. Break the cycle of secrecy. If you’re unsure about a strange request, talk to a friend or family member. Scams rely on isolation. Discussing these common tactics with older relatives can also help protect them.

If You Suspect a Scam or Have Been Targeted

Your actions can help protect others:

  • Report it. File a report with the FTC at ReportFraud.ftc.gov. This gives law enforcement the critical data they need to track patterns and take action.
  • Contact your financial institution. If you gave out bank information or made a payment, call your bank, credit card company, or wire transfer service immediately. They may be able to stop a transaction or secure your account.
  • Secure your devices. If you gave a scammer remote access to your computer or downloaded software at their request, run a full security scan with reputable antivirus software. Consider seeking help from a trusted professional to ensure your system is clean.

Staying safe is an ongoing process. Treat the FTC’s warnings not as a cause for alarm, but as a practical update—like checking the weather before you head out. By recognizing the patterns of modern scams, you can confidently navigate the digital world and shut down fraudsters before they get started.

Sources & Further Reading: