Scam & Cybersecurity Glossary for Seniors
This glossary explains common terms used in online scams, cybersecurity, and fraud prevention — in plain English. If you’ve encountered an unfamiliar word on this site, in a news article, or from someone trying to help you stay safe online, you’ll find a clear explanation here. Bookmark this page as a reference.
Already been scammed? Time matters. Read our First 24 Hours Emergency Guide for the critical steps to take right now, or visit our Report a Scam page to find your state’s contacts.
A B C D E F G H I K L M O P R S T U V W
A
Account Takeover
When a scammer gains access to your online account — such as email, banking, or social media — by stealing your password or tricking you into sharing it. Once inside, they can steal money, lock you out, or impersonate you.
Adult Protective Services (APS)
A state-run agency that investigates reports of abuse, neglect, and financial exploitation of vulnerable adults, including seniors. Every state has an APS hotline. Find your state’s APS contact.
Advance Fee Scam
A scam where you’re asked to pay a small fee upfront to receive a larger sum — such as a prize, inheritance, or loan. The promised payout never arrives, and the scammer disappears with your money.
AG (Attorney General)
The chief legal officer of a state or the United States. Your state Attorney General’s office investigates consumer fraud, files lawsuits against scam operations, and accepts complaints from residents. If you’ve been scammed, filing a complaint with your state AG is one of the most important steps you can take. Find your state AG contact.
Antivirus Software
A program installed on your computer or phone that detects and removes malicious software (malware). Legitimate antivirus software comes from trusted companies — scammers sometimes create fake versions to trick you.
Area Code Scam
A phone scam where the caller uses a local-looking area code to make you more likely to answer. Modern technology lets scammers display any area code they choose, even if they’re calling from overseas.
Artificial Intelligence (AI)
Computer technology that can mimic human behavior — including writing text, generating realistic images, and cloning voices. Scammers now use AI to create more convincing fake messages, deepfake videos, and voice clones. Learn more about AI-powered scams.
Authorization Hold
A temporary freeze placed on funds in your bank account, often after a scammer tricks you into “verifying” a transaction. If a caller asks you to authorize a hold for security purposes, hang up — your bank will never ask this over the phone.
B
Baiting
A social engineering tactic where scammers leave something tempting — like a USB drive in a parking lot or a too-good-to-be-true online offer — hoping curiosity will lead you to click a link or plug in a device that installs malware.
Bank Impersonation Scam
When a scammer pretends to be from your bank, credit union, or payment service (like Zelle or Venmo), claiming there’s a problem with your account. They pressure you to “verify” information or transfer money to a “safe” account they control.
Bitcoin
See Cryptocurrency. Scammers often demand payment in Bitcoin because transactions are difficult to reverse and hard to trace.
Boiler Room
A fraudulent call center — often overseas — where rows of scammers make thousands of phone calls per day, reading from scripts designed to pressure victims into paying. Many tech support and government impersonation scams operate this way.
Bot
An automated computer program that performs tasks without human involvement. Scammers use bots to send millions of phishing emails, make robocalls, and create fake social media profiles used in romance scams.
Business Email Compromise (BEC)
A scam where criminals hack or impersonate a business email account to trick people into wiring money or sharing sensitive data. Seniors may be targeted through compromised emails from their financial advisor, attorney, or real estate agent.
C
Caller ID Spoofing
Technology that lets scammers fake the phone number shown on your caller ID. They can make it look like the call is coming from your bank, the IRS, Social Security, or even a neighbor’s number. Never trust caller ID alone.
Catfishing
Creating a fake online identity — often using stolen photos — to build a relationship with someone for the purpose of defrauding them. This is the foundation of most romance scams.
Charity Scam
A fake charity that solicits donations — often after natural disasters or during the holiday season. The money goes to scammers, not to any cause. Always verify a charity at charitynavigator.org before donating.
Click Fraud
When scammers trick you into clicking a link in an email, text, or pop-up that installs malware on your device or takes you to a fake website designed to steal your login credentials.
Credit Freeze
A free security measure you can place with each of the three credit bureaus (Equifax, Experian, TransUnion) to prevent anyone — including scammers — from opening new credit accounts in your name. You can lift it temporarily when needed.
Cryptocurrency
Digital currency like Bitcoin or Ethereum that exists only online. Scammers prefer cryptocurrency payments because transactions are nearly impossible to reverse. If anyone demands payment in cryptocurrency, it is almost certainly a scam.
D
Dark Web
A hidden part of the internet not accessible through normal web browsers. Stolen personal information — including Social Security numbers, passwords, and financial data — is bought and sold on dark web marketplaces.
Data Breach
When hackers break into a company’s computer systems and steal customer information such as names, emails, passwords, Social Security numbers, or credit card details. If you’re notified of a breach, change your passwords immediately and monitor your accounts.
Deepfake
AI-generated fake audio or video that realistically mimics a real person’s voice or appearance. Scammers use deepfakes to impersonate grandchildren, celebrities, or government officials in phone and video calls. Learn about voice cloning scams.
Digital Wallet
An app on your phone that stores payment information (like Apple Pay, Google Pay, or Samsung Pay). While generally secure, scammers may try to trick you into adding their account to your wallet or sending them money through peer-to-peer payment apps.
E
Elder Abuse
Any form of mistreatment of an older person, including physical abuse, emotional abuse, neglect, and financial exploitation. Scam-related financial exploitation is one of the most common and fastest-growing forms of elder abuse in the United States.
Elder Fraud
Financial crimes specifically targeting people aged 60 and older. In 2025, the FBI reported over 147,000 elder fraud complaints totaling $4.9 billion in losses. View the national elder fraud data.
Email Spoofing
When a scammer forges the “From” address of an email to make it look like it came from someone you trust — your bank, a government agency, or a family member. Always verify unexpected requests through a separate, known contact method.
Encryption
Technology that scrambles data so only authorized people can read it. Look for the padlock icon and “https://” in your browser’s address bar — this means the website encrypts your information. However, scam websites can also use encryption, so a padlock alone doesn’t mean a site is safe.
Extortion Scam
A scam where criminals threaten to release embarrassing information, harm you, or take legal action unless you pay them. Common forms include sextortion emails and threats to share fabricated compromising images. Learn more about extortion scams.
F
FBI IC3
The FBI’s Internet Crime Complaint Center — the primary federal agency for reporting online fraud. Filing a report at ic3.gov feeds into national law enforcement databases and helps investigators track scam networks.
FEMA Scam
A scam where criminals impersonate the Federal Emergency Management Agency after a natural disaster, offering fake relief funds or demanding personal information to “process your claim.” FEMA never charges application fees or asks for banking information by phone.
Firewall
A security system — either software or hardware — that monitors and controls incoming and outgoing network traffic on your computer. A firewall helps block unauthorized access to your devices.
Fraud Alert
A free notice you can place on your credit report that tells lenders to verify your identity before opening new accounts. Unlike a credit freeze, a fraud alert still allows new credit but adds an extra verification step. It lasts one year and can be renewed.
FTC (Federal Trade Commission)
The federal agency responsible for protecting consumers from fraud and deceptive business practices. You can report scams at reportfraud.ftc.gov. FTC data helps law enforcement identify scam trends nationwide.
G
Gift Card Scam
Any scam that demands payment in retail gift cards (such as Google Play, iTunes, Amazon, or Target cards). This is one of the most reliable red flags of a scam — no legitimate business, government agency, or utility company accepts gift cards as payment.
Government Impersonation Scam
A scam where criminals pose as officials from the IRS, Social Security Administration, Medicare, or law enforcement to intimidate you into sending money or sharing personal information. The government will never call threatening arrest or demanding immediate payment. Learn more.
Grandparent Scam
An urgent phone call where the scammer pretends to be your grandchild (or their attorney or a police officer), claiming they’re in trouble — arrested, in an accident, or stranded — and need money immediately. AI voice cloning has made these calls disturbingly realistic. Learn about AI voice cloning in grandparent scams.
H
Hacking
Gaining unauthorized access to a computer, account, or network. Hackers may steal personal information, install malware, or take control of devices. Strong, unique passwords and two-factor authentication are your best defenses.
Hang Up and Call Back
The single most effective defense against phone scams. If someone calls claiming to be from your bank, the IRS, or any organization — hang up, look up the real number yourself, and call them directly. A legitimate caller will never object to this.
I
Identity Theft
When someone steals your personal information — such as your Social Security number, date of birth, or financial details — to commit fraud in your name. This can include opening credit cards, filing tax returns, or obtaining medical care using your identity.
Impersonation Scam
Any scam where the criminal pretends to be someone else — a government agent, bank representative, tech support worker, utility company, or even a family member. Impersonation is the foundation of most scams targeting seniors.
Internet Crime Complaint Center
See FBI IC3.
Investment Scam
A fraudulent scheme promising high returns with little or no risk. Investment scams are the #1 financial threat to seniors, costing older Americans $3.5 billion in 2025. Common types include cryptocurrency scams, Ponzi schemes, and fake trading platforms. Learn more.
IRS Scam
A specific type of government impersonation scam where criminals pose as IRS agents, threatening arrest or legal action unless you pay an alleged tax debt immediately. The IRS always contacts taxpayers by mail first — never by phone demanding immediate payment.
K
Keylogger
A type of malware secretly installed on your computer that records every keystroke you type — including passwords, credit card numbers, and personal messages. Keyloggers are often installed through phishing links or fake software downloads.
L
Lottery Scam
A scam informing you that you’ve won a lottery, sweepstakes, or prize — but must pay taxes, fees, or processing charges to collect it. If you didn’t enter a contest, you didn’t win. Legitimate lotteries never require upfront payment. Learn more.
Love Bombing
A manipulation tactic used in romance scams where the scammer overwhelms the victim with excessive affection, compliments, and attention to build emotional dependency quickly. Once the bond is formed, they begin asking for money.
M
Malware
Short for “malicious software” — any program designed to harm your computer, steal your data, or give criminals remote access to your device. Includes viruses, spyware, ransomware, and keyloggers. Malware often arrives through phishing emails or fake downloads.
Medicare Scam
A scam targeting seniors enrolled in Medicare, where criminals pose as Medicare representatives to steal your Medicare ID number, personal information, or money. Common tactics include fake “new card” calls and fraudulent billing for services never provided.
Money Mule
A person who transfers stolen money on behalf of criminals — sometimes without realizing it. Scammers recruit money mules through fake job offers (“payment processor” or “financial agent” roles) or romance scams. Being a money mule is a federal crime, even if you didn’t know the money was stolen.
Multi-Factor Authentication (MFA)
See Two-Factor Authentication.
O
One-Time Password (OTP)
A temporary code sent to your phone or email as part of two-factor authentication. Legitimate companies will never call you to ask for this code. If someone contacts you asking for a code that was just sent to your phone, it is a scam — they are trying to break into your account.
Overpayment Scam
A scam common on online marketplaces where a buyer “accidentally” sends you too much money and asks you to refund the difference. The original payment turns out to be fraudulent, leaving you out the money you sent back.
P
Password Manager
A secure app that stores and generates strong, unique passwords for all your online accounts. Instead of remembering dozens of passwords, you only need to remember one master password. Recommended options include Bitwarden, 1Password, and the built-in managers in Apple and Google devices.
Phishing
A scam where criminals send fake emails, text messages, or websites that look like they’re from a trusted source — your bank, Amazon, Netflix, or the government — to trick you into clicking a link, downloading malware, or entering your login credentials on a fake website.
Pig Butchering
A long-term investment scam where the scammer builds a relationship with the victim over weeks or months (the “fattening” phase), then convinces them to invest in a fake cryptocurrency or trading platform. Victims often see fake “profits” on screen before being asked to invest more. When they try to withdraw, the money and scammer vanish.
Ponzi Scheme
A fraudulent investment operation where returns paid to earlier investors come from new investors’ money — not from actual profits. The scheme inevitably collapses when new recruitment slows, leaving most investors with devastating losses.
Pop-Up Scam
A fake warning that suddenly appears on your computer screen, claiming your device is infected with a virus and telling you to call a phone number for help. The number connects to a scammer who will try to charge you for fake repairs or gain remote access to your computer. Learn more about tech support scams.
Pretexting
A social engineering technique where a scammer invents a believable story (a “pretext”) to gain your trust and extract information. For example, calling as a “bank fraud investigator” who needs to “verify your account” to stop suspicious activity.
R
Ransomware
Malware that locks your computer or encrypts your files, then demands payment (a “ransom”) to restore access. Victims are typically told to pay in cryptocurrency. Law enforcement advises against paying, as there’s no guarantee your files will be restored.
Recovery Scam
A scam that targets people who have already been scammed once. The criminal poses as a lawyer, government agent, or recovery specialist who claims they can get your stolen money back — for an upfront fee. This is always a scam. No legitimate recovery service charges fees in advance.
Remote Access
Software that allows someone to control your computer from another location. Scammers — especially in tech support scams — will ask you to install programs like AnyDesk, TeamViewer, or UltraViewer so they can “fix” your computer. Never give remote access to someone who contacts you unsolicited.
Robocall
An automated phone call that delivers a pre-recorded message. While some robocalls are legitimate (pharmacy reminders, appointment confirmations), millions of illegal robocalls are made daily to deliver scam pitches. If you receive an unexpected robocall asking you to press a number or call back, hang up.
Romance Scam
A fraud where a criminal creates a fake identity on dating sites or social media to build a romantic relationship, then exploits that emotional connection to steal money. Victims lost $584 million in 2025. Warning signs include refusing to video chat and asking for money. Learn more.
R.O.S.E. (Resistance to Online Scams and Exploitation)
A nonprofit advocacy organization founded by Brian Watson dedicated to educating and protecting older adults from online scams and digital exploitation. R.O.S.E. provides educational workshops, community outreach programs, and resources to help seniors and their families recognize fraud before it happens. Visit roseadvocacy.org.
S
SIM Swap
A scam where criminals convince your phone carrier to transfer your phone number to a SIM card they control. Once they have your number, they can receive your text messages — including two-factor authentication codes — and break into your bank and email accounts.
Skimming
The use of a hidden device attached to an ATM, gas pump, or card reader to secretly copy your credit or debit card information. Always check card readers for loose or unusual attachments before inserting your card.
Smishing
Phishing via SMS text message. Scammers send texts posing as your bank, a delivery service (USPS, FedEx), or the IRS, with a link to a fake website designed to steal your login credentials. “Smishing” combines “SMS” and “phishing.”
Social Engineering
The art of manipulating people into giving up confidential information or taking actions that compromise their security. Rather than hacking computers, social engineers hack people — using fear, urgency, trust, and authority to trick victims. Nearly all scams targeting seniors use social engineering.
Social Security Scam
A scam where criminals impersonate the Social Security Administration, claiming your Social Security number has been “suspended” or “compromised” and demanding payment or personal information to fix it. The SSA will never call threatening to suspend your number or demanding immediate payment.
Spoofing
Disguising a communication to make it appear to come from a trusted source. This includes email spoofing (fake sender address), caller ID spoofing (fake phone number), and website spoofing (fake website that looks identical to a real one).
Spyware
Malware that secretly monitors your computer activity — tracking websites you visit, recording keystrokes, and capturing passwords — then sends that information to the criminal who installed it. Spyware is often bundled with free software downloads.
Stop Elderly Scams
A nonprofit organization founded by Terri Proctor focused on preventing financial fraud against older adults through education, community outreach, and advocacy. Stop Elderly Scams provides presentations, training materials, and resources to help seniors, caregivers, and families recognize and avoid scams. Visit stopelderlyscams.com.
Sweepstakes Scam
See Lottery Scam. You are told you’ve won a contest and must pay fees or taxes to claim the prize. You cannot win a contest you never entered.
T
Tech Support Scam
A scam where criminals pose as technical support from Microsoft, Apple, or your internet provider, claiming your computer has a virus or security problem. They demand payment for fake repairs and may request remote access to your device. In 2025, tech support scams cost seniors over $1 billion. Learn more.
Two-Factor Authentication (2FA)
A security feature that requires two forms of verification to log in — typically your password plus a temporary code sent to your phone. Enabling 2FA on your email, banking, and social media accounts is one of the most effective ways to prevent account takeover. Also called Multi-Factor Authentication (MFA).
U
Utility Scam
A scam where someone calls or visits claiming to be from your electric, gas, or water company, threatening to shut off your service unless you make an immediate payment — often by gift card or wire transfer. Your real utility company will always send written notices before disconnection and will never demand gift card payments.
V
VPN (Virtual Private Network)
Software that encrypts your internet connection and hides your online activity from snoopers. A VPN is especially important when using public Wi-Fi (at libraries, coffee shops, airports) to prevent criminals from intercepting your data.
Vishing
Phishing by voice — a phone-based scam where criminals call pretending to be from a bank, government agency, or company to trick you into revealing personal or financial information. “Vishing” combines “voice” and “phishing.”
W
Wire Transfer Fraud
Any scam that tricks you into sending money via wire transfer (Western Union, MoneyGram) or bank wire. Wire transfers are a favorite of scammers because they are fast, difficult to reverse, and often impossible to trace once the money leaves the country.
Protect Yourself: 2 Rules That Stop Most Scams
- Never send money to someone you haven’t met in person — no matter how convincing the story.
- Hang up and call back — if someone calls claiming to be from your bank, the government, or tech support, hang up and call the real number yourself.
Want to learn more? Our free Online Training Modules walk you through each major scam type with real examples, quizzes, and a certificate of completion. Or explore scam data and resources for your state on our National Hub Page.
This glossary contains 77 terms and is regularly updated as new scam tactics emerge. Last updated: April 2026.
