Understand the scam pattern
Clear breakdowns of how each scam starts, escalates, and pushes urgency.
- Common impersonation flows
- Short practical examples
- Severity + prevalence labels
Scam Prevention University teaches you how to recognize, avoid, and report common scams targeting Israeli consumers.
15+
Documented scam scenarios
10
Core attack channels
24/7
Always-available guidance
Phishing Scam
Fraudsters impersonate trusted entities via email, SMS or websites to steal personal data (passwords, credit card numbers).
Tech Support Scam
Scammers pose as technical support (e.g. Microsoft or service providers) to trick victims into giving remote computer access or paying for fake help.
Romance Scam
Scammers create fake romantic relationships online to emotionally manipulate victims into sending money or sensitive information.
Fake Investment & Crypto Scam
Scammers lure victims into fake trading platforms or "guaranteed returns" crypto investments.
Trust Markers
A structured learning flow: one clear track for each stage from awareness to response.
Clear breakdowns of how each scam starts, escalates, and pushes urgency.
Detect risky behavior before sharing personal details or sending money.
Follow a short incident response plan that limits damage and restores control.
Rapid Response
Attack Channels
Fraud behaves differently in SMS, phone calls, and social channels. Learn channel-specific patterns and red flags.
Learn about different types of scams
Fraudsters impersonate trusted entities via email, SMS or websites to steal personal data (passwords, credit card numbers).
Scammers pose as technical support (e.g. Microsoft or service providers) to trick victims into giving remote computer access or paying for fake help.
Scammers create fake romantic relationships online to emotionally manipulate victims into sending money or sensitive information.
Scammers lure victims into fake trading platforms or "guaranteed returns" crypto investments.
Fraudulent e-commerce sites sell products that never arrive or are counterfeit.
Scammers claim you won a prize and demand fees or personal info.
Recently reported scam patterns
Fraudsters impersonate trusted entities via email, SMS or websites to steal personal data (passwords, credit card numbers).
2026-02-10
Scammers pose as technical support (e.g. Microsoft or service providers) to trick victims into giving remote computer access or paying for fake help.
2026-02-10
Scammers create fake romantic relationships online to emotionally manipulate victims into sending money or sensitive information.
2026-02-10
Use the playbooks to spot fraud in real time and protect your family, team, and accounts with confidence.