Skip to main content
Become a TechRadar Insider
- Join our community
7
Exclusive perks
24/7
Access Available
44K+
Active Members
Weekly newsletters
Get daily news, weekly deals and the week’s top tech stories
Commenting access
Join the conversation, share your thoughts and get expert advice
Member badges
Earn badges as you explore news, deals, reviews, guides and more
Exclusive deals
Save on gadgets, subscriptions and accessories with handpicked discounts
Become a TechRadar Insider
Sign up with your email below to instantly access member features, newsletters and exclusive Insider perks
By submitting your information you agree to the Terms & Conditions and Privacy Policy and are aged 16 or over.
FIND OUT ABOUT OUR MAGAZINE
Want to subscribe to the magazine? Click the button below to find out more information.
Find out more
Become a TechRadar Insider now

Sign up with your email below to instantly access member features, newsletters and exclusive Insider perks

By submitting your information you agree to the Terms & Conditions and Privacy Policy and are aged 16 or over.

Background
Welcome to Tech Radar club !
Hi ,

Your membership journey starts here.

Keep exploring and earning more as a member.

MY ACCOUNT

Badge picture
Earn your first badge
Read 1 story to unlock your first badge
Keep earning badges
Explore ways to get more involved as a member.
Latest in phones

Latest in phones

News, deals, reviews, guides and more on the newest smartphones

Start reading
Latest in computing

Latest in computing

News, deals, reviews, guides and more on the newest computing gadgets

Start reading

Your membership perks

Start exploring exclusive deals, expert advice and more

Explore now
Member Exclusives

Member Rewards

Unlock and manage exclusive Techradar member rewards.

See rewards

Sign Out
Tech Radar Tech Radar Pro Tech Radar Gaming
TechRadar TechRadar the business technology experts
SG EditionSingapore
DK EditionDanmark FI EditionSuomi NO EditionNorge SE EditionSverige UK EditionUK IT EditionItalia NL EditionNederland BE (NL) EditionBelgië (Nederlands) FR EditionFrance DE EditionDeutschland ES EditionEspaña
US EditionUS (English) CA EditionCanada MX EditionMéxico
AU EditionAustralia NZ EditionNew Zealand
RSS
Sign in
  • View Profile
  • Sign out
Don't miss these
Man holding a mobile phone with warning notification and spam message icon
Cyber Security A devious new Apple Pay scam is hitting millions – here’s how to stay safe
Security
Pro Why stolen credentials continue to work even where MFA is in place
A fish hook is lying across a computer keyboard, representing a phishing attack on a computer system
Security Watch out for suspicious Microsoft Azure Monitor alerts – it could be this shifty new callback phishing attack
Cyber-security
Security 'Cybercriminals are industrializing deception': new report reveals how major global cybercrime syndicates have infiltrated trusted domains with millions now at risk - here's what you need to know
NordVPN logo on top of a mountain range
VPN Services NordVPN’s new tool helps you spot online scams — and it’s free for everyone
A person doing taxes.
Security This tax-themed malvertising attack can blind security software before it arrives — and then unleashes ransomware
Claude Code for Enterprise and Team
Security Infostealers are being disguised as Claude Code, OpenClaw and other AI developer tools
Pirate skull cyber attack digital technology flag cyber on on computer CPU in background. Darknet and cybercrime banner cyberattack and espionage concept illustration.
Security This popular app builder is being abused to trick users - here's what we know
Android reboot interface
Security 'A sophisticated threat that is quietly reshaping the economics of digital fraud': How hackers are employing virtual cloud phones to power major scams
Businessman holding a magnifier and searching for a hacker within a business team.
Security US workers think they're pretty good at spotting phishing emails - but the reality is quite different
Malware attack virus alert , malicious software infection , cyber security awareness training to protect business
Security Watch out Microsoft Teams users - hackers are spreading a dangerous new phishing scam, here's what we know
Woman in shadow.
Security Cybercriminals using AI for fraud are making far more profit, Interpol claims
Image depicting hands typing on a keyboard, with phishing hooks holding files, passwords and credit cards.
Security TikTok for Business accounts targeted in phishing campaign — here's how to stay safe
WordPress logo on mobile
Security Hackers hijack WordPress sites to spread malware using fake CAPTCHA
hackers
Security 'What begins as a phone call from 'IT support' ends with a fully instrumented network compromise': This fake tech support scam tricks employees into infecting their own company devices
Trending
  • Best office chairs
  • Best 3D printers
  • Best antivirus
  • Best web hosting
  • Best website builder
  • Expert Insights
  1. Pro
  2. Security

The 10 most common cybersecurity scams uncovered

News
By Gabe Carey last updated 20 August 2021

If it's too good to be true, it probably isn't

When you purchase through links on our site, we may earn an affiliate commission. Here’s how it works.

Some day your prince will come…

Some day your prince will come…

In the beginning there was the internet, and shortly after that came the internet scammers. Online scams include everything from the now-legendary Nigerian prince meme to the less-well-known but infinitely more devious fake shopping websites.

If you were curious about the origins of these deceitful hoaxes, we’ve got you covered. On the other hand, should you be worried about the repercussions of falling victim to one of these fraudulent schemes, we’ll also touch on that. 

Online scams are typically malware disguised as rewards or charitable gestures. After all, what is the Nigerian prince scam other than an attempt to get you to care about getting someone else out of a rut, and providing you with a huge payout for doing so?

All the examples below are designed to prick our consciences, or play on our greed or vanity in one way or another. Some of these cyber-scams are actually pretty ingenious, but ultimately malicious – others are just plain malicious.

  • Be more secure online with the best password manager.
Page 1 of 11
Page 1 of 11
1. Phishing

1. Phishing

You may not recognize it by name – 65% of US and 72% of UK respondents in a Wombat Security report certainly didn’t – but a phishing scam is nothing to take lightly. Phishing is a play on 'fishing' for a good reason – it’s an attempt by criminals to lure you into giving them personal information by appearing to be a legitimate company.

Most phishing scams are found on social networks or delivered via email to multiple users. Those who are unwise enough hand over their personal information, such as account IDs and passwords, can then fall victim to identity theft.

The first known instance of phishing was recorded on January 2, 1996. It was contained within the Windows application known as AOHell, a multifaceted program frequently used for stealing AOL passwords. Today, phishing emails often purport to be from the tech support branch of companies such as Microsoft and Apple. 

Page 2 of 11
Page 2 of 11
2. The Nigerian 419

2. The Nigerian 419

The aforementioned Nigerian prince scam is the most notorious of all phishing scams. It’s made its way into pop culture like no other internet scam, being referenced on TV shows and in the worst kind of internet memes from the mid-2000s that used the Impact font, and which we thought were funny for some reason. 

Officially dubbed 'Nigerian 419', this scam traces back all the way to the 19th century, when it was said that a 'Spanish prisoner' needed money. This morphed into a postal scam in the late 1970s and early 1980s, during the nefarious years of the Second Nigerian Republic.

In the late 1990s the now-ubiquitous Nigerian prince started asking email recipients to transfer funds to their bank, in return for which they'd be rewarded with a far greater sum of money at an unspecified date in the future. The exact nature of the scam varies, but the results are consistent: over $1.5 billion has been lost around the world to a scam that we now make a mockery of.

Page 3 of 11
Page 3 of 11
3. Greetings card scams

3. Greetings card scams

These days, you’ll more than likely see them from a hacked account on Facebook. However, it used to be that greetings card scams were universally distributed over email. They use pathos by pretending to be a friend or relative, yet in reality they’re coming from a scammer. 

It’s not clear where they came from originally, but you’ll want to probably want to peruse some of the best antivirus around if you click any of the links found in a greeting card scam.

Page 4 of 11
Page 4 of 11
4. Lottery scams

4. Lottery scams

Remember when you last bought a lottery ticket? No? Well, the lottery scam isn’t going to work very well on you then. 

This variation on the ‘advance-fee fraud’, wherein an email tells you that you’ve won the lottery, but you have to first have to pay a small fee in order to collect your earnings, seems completely unbelievable, even by email scam standards. And yet, people have fallen for it, leaving them needing to win a real lottery to make up their losses.

Page 5 of 11
Page 5 of 11
5. Guaranteed loan/credit card

5. Guaranteed loan/credit card

This is a scam that shamelessly preys on poor people, which makes it particularly unpleasant. It takes the form of an email or on-site advert that tells you that you’ve been pre-approved for a credit card or a loan that you haven’t applied for, in an effort to trick you into handing over bank details or other personal information. 

Since there’s no way a genuine financial institution would hand you a credit card without taking a look at your credit history, if you get one of these you can safely assume it’s fake news.

Page 6 of 11
Page 6 of 11
6. Fake antivirus software

6. Fake antivirus software

There’s something particularly brazen about this one – someone sends you a message while you’re online telling you that your computer is infected with a virus, and that you’re in dire need of an antivirus in order to clean up your system… in order to actually infect your computer with a virus.

The key thing here is not to click on the message – and, of course, to make sure that you have (real) antivirus software installed to thwart such attacks.

Page 7 of 11
Page 7 of 11
7. Travel scams

7. Travel scams

As much as we appreciate how difficult it can be to turn down a free vacation, hear us out: 100% of these offers have a catch. Normally, that catch is a trojan is planted on your computer, or your identity is stolen if you provide the necessary information. 

These travel scams usually arrive via email, and caution you that they’re limited-time offers you can’t miss out on. However, if you click on any of the links such emails inevitably include you’ll realize that you not only have to stump up some cash to acquire the offer, but you’ll also have to pay hidden fees on top.

Page 8 of 11
Page 8 of 11
8. Facebook impersonation

8. Facebook impersonation

It’s not uncommon to see people you know get their user accounts ‘hacked’ on Facebook. Oftentimes you’ll receive a message purporting to be from a friend saying something like ‘Did you see this video of you?’ with a link that you’re invited to click. After that, you’ll probably have to ‘sign-in’ to see the video, which, we can assure you, you definitely weren’t in.

To make sure your Facebook account doesn’t get hijacked you’ll want to enable two-step authentication, number 12 on our advanced Facebook privacy and security tips list.

Page 9 of 11
Page 9 of 11
9. Job offer scams

9. Job offer scams

Chances are that you’re not going to receive a job offer for a position that you didn’t apply for. So, if you receive such an offer, you’ll want take it with a few grains of salt. In most cases, these scams will be attempted by phone, or on LinkedIn to make them vaguely believable. 

When you’ve been hooked, the scammer will try to reel you in by asking for funds in order to take your ‘application’ to the next step – at this point you should tell them that you quit.

Page 10 of 11
Page 10 of 11
10. Fake shopping websites

10. Fake shopping websites

Fake shopping sites aren’t as common as some of the other examples we’ve listed here, but they can be a pain for website administrators who don’t have sophisticated security measures safeguarding their content. 

That’s because, while these sites act as actual retailers, offering normally expensive merchandise for a remarkably low cost, they also overtake vulnerable domains to do so. This makes for a double-whammy in terms of scamming people. 

To identify these threats, all you need is an eye for spotting malicious links, and a general idea of how much products are worth (although we know how tempting a $70 pair of Yeezys can be). 

Page 11 of 11
Page 11 of 11
Gabe Carey
Gabe Carey
Social Links Navigation
Gabe has been writing about video games and technology since he was 16 years old. Currently serving as a Contributing Editor & Producer for TechRadar, where he keeps articles fresh and up to date on the reg, you may recognize his byline from Digital Trends, TechSpot and Kotaku UK. He can't tell if his adoration of Sonic the Hedgehog is genuine or ironic anymore.
  • Facebook
  • X
  • Whatsapp
  • Reddit
  • Pinterest
  • Flipboard
  • Threads
  • Email
Share this article
Join the conversation
Follow us
Add us as a preferred source on Google
Tech Radar
Get daily insight, inspiration and deals in your inbox

Sign up for breaking news, reviews, opinion, top tech deals, and more.


By submitting your information you agree to the Terms & Conditions and Privacy Policy and are aged 16 or over.

You are now subscribed

Your newsletter sign-up was successful


Join the club

Get full access to premium articles, exclusive features and a growing list of member rewards.


An account already exists for this email address, please log in.
Subscribe to our newsletter

Securing your digital lifestyle doesn’t have to be a tedious or expensive process. You can achieve that in the next 60 seconds by downloading a trial of CyberGhost VPN here, risk-free.

Read more
Close up of a business person using a smartphone.
Security Scam season is here, keep yourself safe with these tips
 
 
Credit Card Shopping
Security Looking for a holiday bargain? Don't get caught out — experts warn of dark web travel agencies using stolen credit cards to buy hotels, flights, and more
 
 
how to prevent phishing attacks
Security Who are the most spoofed brands in phishing scams? Let's be honest, you can probably guess most of them - but there are a few surprises
 
 
Cyber-security
Security 'Cybercriminals are industrializing deception': new report reveals how major global cybercrime syndicates have infiltrated trusted domains with millions now at risk - here's what you need to know
 
 
Hacker raise hands up to control computer coding, 3D rendering.
VPN Privacy & Security Ever heard of 'quishing'? NordVPN warns the future of scams lies in QR codes – and shares some tips on how to stay safe
 
 
christmas shopping online
VPN Services I asked Norton VPN experts for tips on staying safe over Christmas — here's what they said
 
 
Latest in Security
Image depicting hands typing on a keyboard, with phishing hooks holding files, passwords and credit cards.
Security TikTok for Business accounts targeted in phishing campaign — here's how to stay safe
 
 
A hand holding a phone showing the Lloyds bank app
Security Lloyds admits nearly half a million banking customers affected by account glitch exposing transaction data
 
 
Pirate skull cyber attack digital technology flag cyber on on computer CPU in background. Darknet and cybercrime banner cyberattack and espionage concept illustration.
Security This popular app builder is being abused to trick users - here's what we know
 
 
Business man using mobile phone and laptop with global network and technology icons on virtual screen
Security Huge numbers of web stores are facing attack from this dangerous new malware
 
 
Cyber-security
Security 'Cybercriminals are industrializing deception': new report reveals how major global cybercrime syndicates have infiltrated trusted domains with millions now at risk - here's what you need to know
 
 
Khvicha Kvaratskhelia of SSC Napoli and Jurrien Timber of AFC Ajax Battles for the ball
Security Ajax suffers major own goal as data breach hits personal info of 300,000 fans
 
 
Latest in News
Apple age verification in the UK for iOS 26.4
iPhone Having iOS 26.4 age verification woes? You're not alone — try these fixes
 
 
Dispatch
Gaming One of my favorite games of 2025 is finally coming to Xbox this summer — Dispatch
 
 
The Mac Pro's wheels next to a Mac Pro computer on a wooden table
Computing The Mac Pro is dead — as its $700 wheels are voted Apple's 'worst' product ever
 
 
Image depicting hands typing on a keyboard, with phishing hooks holding files, passwords and credit cards.
Security TikTok for Business accounts targeted in phishing campaign — here's how to stay safe
 
 
A young woman is working on a laptop in a relaxed office space.
Windows Big changes are coming to Windows 11 fast, as execs turn over a new leaf
 
 
surfshark vpn
VPN Privacy & Security How a TechRadar investigation pushed Surfshark to overhaul its data collection
 
 
LATEST ARTICLES
  1. 1
    The small business toolkit: 21 essential office upgrades for business owners and professionals
  2. 2
    'Congress is way behind where it should be in understanding the nature of this revolution and its impacts': New bill from Bernie Sanders and AOC wants to try and pause US data center construction
  3. 3
    Dell 15 laptop for students and home workers is under $500 right now
  4. 4
    The AI photo-editing tools that are actually useful
  5. 5
    Having iOS 26.4 age verification woes? You're not alone — try these fixes

Useful links

  • Best VPN
  • Best Free VPN
  • Best Web Hosting Service
  • Best Website Builder
  • Best Laptops
  • Best Gaming Laptops
  • Best Gaming PC
  • Best PC Gaming Chair
  • Best Phone
  • Best TV
  • Best Oled TVs
  • Best Smartwatch
  • Best Turntables
  • Best Noise Cancelling Headphones
  • Best Wireless Earbuds
  • Best Office Chairs
  • Best Camera
  • Best Dash Cam
  • Best Drones
  • Best Robot Vacuums

TechRadar is part of Future US Inc, an international media group and leading digital publisher. Visit our corporate site.

Add as a preferred source on Google Add as a preferred source on Google
  • About Us
  • Contact Future's experts
  • Contact Us
  • Terms and conditions
  • Privacy policy
  • Cookies policy
  • Advertise with us
  • Web notifications
  • Accessibility Statement
  • Careers

© Future US, Inc. Full 7th Floor, 130 West 42nd Street, New York, NY 10036.

Please login or signup to comment

Please wait...