About Resources Blog Free quiz → Get the bundle — $67
Why Overconfidence Is the Most Exploited Bias in Fraud Psychology
Research consistently shows that people who believe they could never be scammed are at elevated risk. Overconfidence lowers the guard that would otherwise protect them — and scammers know it. Here is what the behavioral science actually says.
Read →
AI Voice Cloning Scams: What They Are, How They Work, and How to Stop Them
Three seconds of audio from a social media video is enough to clone someone’s voice with 95% accuracy. We break down how voice cloning scams operate, what the documented cases look like, and the one defence that works.
Read →
The Sunk Cost Trap: Why Victims Keep Paying After the First Loss
The most devastating scam losses do not happen in the first payment. They happen in the second, third, and fourth — as victims try to recover what they have already lost. This is the sunk cost fallacy weaponized, and it is by design.
Read →
Inside a Pig Butchering Scam: A Timeline of How They Build Trust Before the Ask
Pig butchering scams are the most psychologically sophisticated fraud in active use. They invest weeks or months in relationship-building before introducing an investment opportunity. We trace the full timeline of a documented case.
Read →
Credit Freeze: The One Free Action That Stops Most Identity Theft Cold
Freezing your credit at all three bureaus is free, reversible, and takes 15 minutes. It is also the single most effective defence against identity theft. Here is exactly how to do it — and why most people never do.
Read →
The Silence That Protects Scammers: Why Victims Don’t Report — and What Happens When They Do
Most scams go unreported because of embarrassment. That silence protects the scammer, not the victim — and leaves others exposed to the same tactics. We look at what the research says about disclosure, recovery, and the role of shame in fraud outcomes.
Read →
How to Spot a Phishing Email in 10 Seconds (With Real Examples)
Phishing emails have become nearly indistinguishable from legitimate communications. But there are still tells — and most of them are not where people look. We break down the anatomy of a phishing email using real documented examples.
Read →

New research and pattern analysis added regularly.

Start with the free quiz to find out where you currently stand — then come back as the threat landscape evolves.

Take the free quiz →