Skip to main content
Tech Radar Tech Radar Pro Tech Radar Gaming
TechRadar TechRadar the business technology experts
Asia
flag of Singapore
Singapore
Europe
flag of Danmark
Danmark
flag of Suomi
Suomi
flag of Norge
Norge
flag of Sverige
Sverige
flag of UK
UK
flag of Italia
Italia
flag of Nederland
Nederland
flag of België (Nederlands)
België (Nederlands)
flag of France
France
flag of Deutschland
Deutschland
flag of España
España
North America
flag of US (English)
US (English)
flag of Canada
Canada
flag of México
México
Australasia
flag of Australia
Australia
flag of New Zealand
New Zealand
RSS
Sign in
  • View Profile
  • Sign out
Trending
  • Best web hosting
  • Best office chairs
  • Best website builder
  • Best antivirus
  • Expert Insights
Don't miss these
A white woman with long brown hair in a ponytail looks down at her computer in a distressed manner. She is holding her forehead with one hand and a credit card with the other
Cyber Crime 5 new frightening cyber scams to look out for in 2025
Scam alert
Security No, those amazing deals on Facebook aren't real - it's a scam, and here's how to spot it
Caution sign data unlocking hackers. Malicious software, virus and cybercrime, System warning hacked alert, cyberattack on online network, data breach, risk of website
Pro Beyond romance fraud: The rising threat of social media scams
TikTok Ban
Security Fake TikTok shops found spreading malware to unsuspecting victims - here's how to stay safe
A hand holding a phone that's scanning a QR code on a screen
Cyber Crime QR codes are being weaponized in new quishing attacks, and most people don’t realize – here's how to stay safe
Fraude en ligne phishing
Security Hook, line and sinker: how to detect and protect your business from phishing attacks
mazon logo on the facade of one of their corporate office buildings located in Silicon Valley, San Francisco bay area
Security Hunting for early Prime Day deals? Beware, scammers have set up thousands of fake Amazon sites - here's what to look out for
Cartoon Phishing
Security Is crime turning digital? Almost all Brits believe cybercrime is more of a risk - here's how to stay safe
Amazon Prime Day credit
Pro Amazon Prime customers warned scammers are after their login info - 200 million users possibly at risk
http url
Security Tech support scammers are forcing their fake phone numbers into real webpages
Cybersecurity ensures data protection on internet. Data encryption, firewall, encrypted network, VPN, secure access and authentication defend against malware, hacking, cyber crime and digital threat
Pro I’m a published cybersecurity expert: Here are five absurd cybersecurity myths that could end your business
A person holding a phone looking at a scam text with warning signs around
Pro Amazon warns millions of users about fake membership subscription emails - here's how to stay safe ahead of Prime Day
Users display warnings about the use of artificial intelligence (AI), access to malicious software or threats to online hackers. computer cyber security Warning concept or tech scam.
Cyber Crime 5 worrying ways AI is being used by cybercriminals to target millions of victims
Fake Pharmacy
Security Millions at risk as global network of over 5,000 fake pharmacy websites uncovered by security researchers — here's how to stay safe
A fish hook is lying across a computer keyboard, representing a phishing attack on a computer system
Security Malicious URLs and phishing scams remain a constant threat for businesses - here's what can be done
  1. Pro
  2. Security

The 10 most common cybersecurity scams uncovered

News
By Gabe Carey last updated 20 August 2021

If it's too good to be true, it probably isn't

When you purchase through links on our site, we may earn an affiliate commission. Here’s how it works.

Some day your prince will come…

Some day your prince will come…

In the beginning there was the internet, and shortly after that came the internet scammers. Online scams include everything from the now-legendary Nigerian prince meme to the less-well-known but infinitely more devious fake shopping websites.

If you were curious about the origins of these deceitful hoaxes, we’ve got you covered. On the other hand, should you be worried about the repercussions of falling victim to one of these fraudulent schemes, we’ll also touch on that. 

Online scams are typically malware disguised as rewards or charitable gestures. After all, what is the Nigerian prince scam other than an attempt to get you to care about getting someone else out of a rut, and providing you with a huge payout for doing so?

All the examples below are designed to prick our consciences, or play on our greed or vanity in one way or another. Some of these cyber-scams are actually pretty ingenious, but ultimately malicious – others are just plain malicious.

  • Be more secure online with the best password manager.
Page 1 of 11
Page 1 of 11
1. Phishing

1. Phishing

You may not recognize it by name – 65% of US and 72% of UK respondents in a Wombat Security report certainly didn’t – but a phishing scam is nothing to take lightly. Phishing is a play on 'fishing' for a good reason – it’s an attempt by criminals to lure you into giving them personal information by appearing to be a legitimate company.

Most phishing scams are found on social networks or delivered via email to multiple users. Those who are unwise enough hand over their personal information, such as account IDs and passwords, can then fall victim to identity theft.

The first known instance of phishing was recorded on January 2, 1996. It was contained within the Windows application known as AOHell, a multifaceted program frequently used for stealing AOL passwords. Today, phishing emails often purport to be from the tech support branch of companies such as Microsoft and Apple. 

Page 2 of 11
Page 2 of 11
2. The Nigerian 419

2. The Nigerian 419

The aforementioned Nigerian prince scam is the most notorious of all phishing scams. It’s made its way into pop culture like no other internet scam, being referenced on TV shows and in the worst kind of internet memes from the mid-2000s that used the Impact font, and which we thought were funny for some reason. 

Officially dubbed 'Nigerian 419', this scam traces back all the way to the 19th century, when it was said that a 'Spanish prisoner' needed money. This morphed into a postal scam in the late 1970s and early 1980s, during the nefarious years of the Second Nigerian Republic.

In the late 1990s the now-ubiquitous Nigerian prince started asking email recipients to transfer funds to their bank, in return for which they'd be rewarded with a far greater sum of money at an unspecified date in the future. The exact nature of the scam varies, but the results are consistent: over $1.5 billion has been lost around the world to a scam that we now make a mockery of.

Page 3 of 11
Page 3 of 11
3. Greetings card scams

3. Greetings card scams

These days, you’ll more than likely see them from a hacked account on Facebook. However, it used to be that greetings card scams were universally distributed over email. They use pathos by pretending to be a friend or relative, yet in reality they’re coming from a scammer. 

It’s not clear where they came from originally, but you’ll want to probably want to peruse some of the best antivirus around if you click any of the links found in a greeting card scam.

Page 4 of 11
Page 4 of 11
4. Lottery scams

4. Lottery scams

Remember when you last bought a lottery ticket? No? Well, the lottery scam isn’t going to work very well on you then. 

This variation on the ‘advance-fee fraud’, wherein an email tells you that you’ve won the lottery, but you have to first have to pay a small fee in order to collect your earnings, seems completely unbelievable, even by email scam standards. And yet, people have fallen for it, leaving them needing to win a real lottery to make up their losses.

Page 5 of 11
Page 5 of 11
5. Guaranteed loan/credit card

5. Guaranteed loan/credit card

This is a scam that shamelessly preys on poor people, which makes it particularly unpleasant. It takes the form of an email or on-site advert that tells you that you’ve been pre-approved for a credit card or a loan that you haven’t applied for, in an effort to trick you into handing over bank details or other personal information. 

Since there’s no way a genuine financial institution would hand you a credit card without taking a look at your credit history, if you get one of these you can safely assume it’s fake news.

Page 6 of 11
Page 6 of 11
6. Fake antivirus software

6. Fake antivirus software

There’s something particularly brazen about this one – someone sends you a message while you’re online telling you that your computer is infected with a virus, and that you’re in dire need of an antivirus in order to clean up your system… in order to actually infect your computer with a virus.

The key thing here is not to click on the message – and, of course, to make sure that you have (real) antivirus software installed to thwart such attacks.

Page 7 of 11
Page 7 of 11
7. Travel scams

7. Travel scams

As much as we appreciate how difficult it can be to turn down a free vacation, hear us out: 100% of these offers have a catch. Normally, that catch is a trojan is planted on your computer, or your identity is stolen if you provide the necessary information. 

These travel scams usually arrive via email, and caution you that they’re limited-time offers you can’t miss out on. However, if you click on any of the links such emails inevitably include you’ll realize that you not only have to stump up some cash to acquire the offer, but you’ll also have to pay hidden fees on top.

Page 8 of 11
Page 8 of 11
8. Facebook impersonation

8. Facebook impersonation

It’s not uncommon to see people you know get their user accounts ‘hacked’ on Facebook. Oftentimes you’ll receive a message purporting to be from a friend saying something like ‘Did you see this video of you?’ with a link that you’re invited to click. After that, you’ll probably have to ‘sign-in’ to see the video, which, we can assure you, you definitely weren’t in.

To make sure your Facebook account doesn’t get hijacked you’ll want to enable two-step authentication, number 12 on our advanced Facebook privacy and security tips list.

Page 9 of 11
Page 9 of 11
9. Job offer scams

9. Job offer scams

Chances are that you’re not going to receive a job offer for a position that you didn’t apply for. So, if you receive such an offer, you’ll want take it with a few grains of salt. In most cases, these scams will be attempted by phone, or on LinkedIn to make them vaguely believable. 

When you’ve been hooked, the scammer will try to reel you in by asking for funds in order to take your ‘application’ to the next step – at this point you should tell them that you quit.

Page 10 of 11
Page 10 of 11
10. Fake shopping websites

10. Fake shopping websites

Fake shopping sites aren’t as common as some of the other examples we’ve listed here, but they can be a pain for website administrators who don’t have sophisticated security measures safeguarding their content. 

That’s because, while these sites act as actual retailers, offering normally expensive merchandise for a remarkably low cost, they also overtake vulnerable domains to do so. This makes for a double-whammy in terms of scamming people. 

To identify these threats, all you need is an eye for spotting malicious links, and a general idea of how much products are worth (although we know how tempting a $70 pair of Yeezys can be). 

Page 11 of 11
Page 11 of 11
Gabe Carey
Gabe Carey
Social Links Navigation
Gabe has been writing about video games and technology since he was 16 years old. Currently serving as a Contributing Editor & Producer for TechRadar, where he keeps articles fresh and up to date on the reg, you may recognize his byline from Digital Trends, TechSpot and Kotaku UK. He can't tell if his adoration of Sonic the Hedgehog is genuine or ironic anymore.

Securing your digital lifestyle doesn’t have to be a tedious or expensive process. You can achieve that in the next 60 seconds by downloading a trial of CyberGhost VPN here, risk-free.

You may like
  • A white woman with long brown hair in a ponytail looks down at her computer in a distressed manner. She is holding her forehead with one hand and a credit card with the other 5 new frightening cyber scams to look out for in 2025
  • Scam alert No, those amazing deals on Facebook aren't real - it's a scam, and here's how to spot it
  • Caution sign data unlocking hackers. Malicious software, virus and cybercrime, System warning hacked alert, cyberattack on online network, data breach, risk of website Beyond romance fraud: The rising threat of social media scams
Read more
A white woman with long brown hair in a ponytail looks down at her computer in a distressed manner. She is holding her forehead with one hand and a credit card with the other
5 new frightening cyber scams to look out for in 2025
Scam alert
No, those amazing deals on Facebook aren't real - it's a scam, and here's how to spot it
Caution sign data unlocking hackers. Malicious software, virus and cybercrime, System warning hacked alert, cyberattack on online network, data breach, risk of website
Beyond romance fraud: The rising threat of social media scams
TikTok Ban
Fake TikTok shops found spreading malware to unsuspecting victims - here's how to stay safe
A hand holding a phone that's scanning a QR code on a screen
QR codes are being weaponized in new quishing attacks, and most people don’t realize – here's how to stay safe
Fraude en ligne phishing
Hook, line and sinker: how to detect and protect your business from phishing attacks
Latest in Security
Doctor working on laptop
Major healthcare service breach exposes data on over 600,000 people - names, SSNs, and more stolen, here's what we know
An abstract image of a lock against a digital background, denoting cybersecurity.
NPM packages from Nx targeted in latest worrying software supply chain attack
Cloud, networking and internet
Microsoft flags dangerous cybercriminals ransacking organizations - and then letting you know about it via Teams
China
Google warns of Chinese state actor hack in real-time following alerts
A circle of laptops connected to a cloud symbol.
Tencent Cloud sites breached to expose valuable data - here's what we know
Hacker with malware code in computer screen. Cybersecurity, privacy or cyber attack. Programmer or fraud criminal writing virus software. Online firewall and privacy crime. Web data engineer
The first AI-powered ransomware has been spotted - and here's why we should all be worried
Latest in News
Clair Obscur: Expedition 33
'This is not the end of the Clair Obscur franchise' – Expedition 33 director says there are more stories to tell
Resident Evil Requiem
Resident Evil Requiem director explains why the game has a third-person mode, and it's mainly for players who couldn't handle first-person in Resident Evil 7 – 'I want to make sure that people can enjoy this game'
An American flag flying outside the US Capitol building against a blue sky
Chinese nationals will no longer be allowed to manage Pentagon cloud services
Key art for Skate: A stylized colorful image featuring skaters skating under a busy city bridge. Skyscrapers are seen in the background
Skate Early Access release date and how to access
Bertha sits at a dinner table looking at something offscreen
2 new rivalries could emerge in The Gilded Age season 4, and that means Bertha is in trouble
The AI-powered Writing Help feature in WhatsApp.
WhatsApp’s new AI-powered writing helper could help you avert another awkward conversation disaster
LATEST ARTICLES
  1. 1
    “An enormous surveillance potential” – experts have serious concerns about Russia's new WhatsApp rival
  2. 2
    The LG C4 OLED is our best-rated TV for most people, and it's $1,400 off for Labor Day
  3. 3
    ChatGPT is getting better at knowing when you need real human support – and I think it's about time
  4. 4
    Major healthcare service breach exposes data on over 600,000 people - names, SSNs, and more stolen, here's what we know
  5. 5
    Skate Early Access release date – how to access, what's included, and everything you need to know

TechRadar is part of Future US Inc, an international media group and leading digital publisher. Visit our corporate site.

  • About Us
  • Contact Future's experts
  • Contact Us
  • Terms and conditions
  • Privacy policy
  • Cookies policy
  • Advertise with us
  • Web notifications
  • Accessibility Statement
  • Careers

© Future US, Inc. Full 7th Floor, 130 West 42nd Street, New York, NY 10036.

Please login or signup to comment

Please wait...