Last year, Americans lost over $12.5 billion to fraud, according to the FTC—a staggering 25% jump from the year before. But here’s what should really keep you up at night: 2026 is going to be worse.

🎙️ Related Podcast: US State Privacy Laws: Navigating the Expanding Consumer Rights Patchwork

Why? Because scammers now have access to the same powerful AI tools that legitimate businesses use. They can clone voices, generate realistic video, create entirely fictional identities, and deploy automated systems that work around the clock to steal your money.

The Global Anti-Scam Alliance surveyed 46,000 adults across 42 countries and found that 57% of people were targeted by scams in the past year—with nearly a quarter of them losing money. That’s not a small problem affecting a few careless people. That’s an epidemic.

But knowledge is power. Understanding how these new scams work is your first line of defense. Here are the four scam trends that will define 2026—and exactly what you can do to protect yourself and your loved ones.


1. AI Deepfake Scams: When You Can’t Trust Your Own Eyes

The threat: Criminals are using artificial intelligence to create fake video and audio that can perfectly imitate real people—including your family members, your boss, or anyone else whose voice or image they can find online.

The numbers are terrifying. Deepfake fraud caused over $200 million in losses in just the first quarter of 2025, and vishing (voice phishing) attacks surged by 442% as AI voice cloning became accessible to criminals. Security firm Gartner predicts that by the end of 2026, 30% of businesses will no longer trust video or voice verification alone because the fakes have become that convincing.

How It Works

It starts with data collection. Scammers scrape social media profiles for photos and videos. They download voicemails, TikToks, Instagram stories—anything with your voice or face. With just 3 seconds of audio, modern AI tools can create a convincing voice clone. A handful of photos is enough to generate realistic video.

Then comes the attack. The most common scenarios:

The “Grandparent Scam 2.0”: You receive a video call from what appears to be your grandson. He’s crying, says he’s been in an accident or arrested, and needs bail money immediately. The face looks right. The voice sounds right. But it’s entirely AI-generated.

The CEO Fraud Call: An employee gets a video call from their “boss” instructing them to wire money for an urgent deal. In one famous case, a Hong Kong finance worker transferred $25 million after a video conference with multiple AI-generated company executives.

Romance Scams with Video “Proof”: Scammers maintain long-distance relationships with victims, using AI-generated video calls to “prove” they’re real. They look exactly like their profile photos because the AI generates the video in real-time.

How to Protect Yourself

1. Establish a family code word. Pick a secret phrase that only your immediate family knows. If someone calls claiming to be a family member in distress, ask for the code word. No code word, no money—period.

2. Verify through a separate channel. If your “boss” calls asking for a wire transfer, hang up and call them back on their known phone number. If your “grandson” needs bail money, text or call their regular phone before doing anything.

3. Watch for glitches. AI-generated video still has tells: unnatural blinking, slight lip-sync issues, weird artifacts around the hairline or ears, hands that look blurry or distorted. Ask the caller to wave their hand in front of their face—AI often struggles with this.

4. Be suspicious of urgency. Scammers create artificial time pressure so you don’t have time to think or verify. Any request for immediate money—especially via wire transfer, gift cards, or cryptocurrency—is a massive red flag.

5. Keep your social media private. The less audio and video of you that’s publicly available, the harder it is for scammers to create a convincing deepfake. Review your privacy settings and consider who can really see your posts.


2. Synthetic Identity Fraud: The Invisible Crime That’s Costing Billions

The threat: Criminals are creating entirely fake people using a Frankenstein approach—combining stolen Social Security numbers with fabricated names, addresses, and other details to build synthetic identities that pass standard verification checks.

Synthetic identity fraud crossed the $35 billion mark in losses according to anti-fraud platform FiVerity, with incidents jumping 50% in just one year. The FTC received over 1.1 million identity theft reports in 2024 alone, and many of those stolen details are being used to build these hybrid identities.

Why It’s So Dangerous

Unlike traditional identity theft—where criminals use YOUR name and YOUR details, leaving a clear trail back to you—synthetic identity fraud creates people who don’t exist. This makes it incredibly hard to detect.

Here’s how it typically works:

  1. Scammers buy or steal Social Security numbers from data breaches. Children’s SSNs are particularly valuable because there’s no credit history to contradict the fake identity.2. They combine the real SSN with fake names, dates of birth, and addresses.3. They apply for credit, get rejected (as expected for a “new” person), but this creates a credit file.4. Over months or years, they build credit history with small accounts paid on time.5. Eventually, they “bust out”—maxing out all credit lines and disappearing with the money.

The Victim Problem

Here’s the twist: if your SSN is used but paired with a different name, you might never know until you apply for a mortgage and discover mysterious accounts you’ve never heard of. Children often don’t find out until they turn 18 and apply for their first credit card.

How to Protect Yourself

1. Freeze your credit—and your children’s. Contact all three bureaus (Equifax, Experian, TransUnion) and request a credit freeze. This prevents anyone from opening new accounts in your name. For children, you’ll need to create a credit file first (they don’t automatically have one), then freeze it.

2. Monitor your Social Security statement. Create an account at ssa.gov to check your earnings history. If there’s income you never earned, someone may be working under your SSN.

3. Use an identity monitoring service. Services like Credit Karma (free) or paid options can alert you to new accounts or inquiries on your credit file. The key is catching unauthorized activity quickly.

4. Be careful with your SSN. Question any request for your full Social Security number. Often, businesses only need the last four digits—if they need the full number, ask why and how they’ll protect it.

5. Review your free annual credit reports. Go to AnnualCreditReport.com (the only federally authorized source) and check all three bureau reports for accounts you don’t recognize.

6. If your child receives mail from credit card companies or debt collectors, investigate immediately. Children shouldn’t have any credit activity—this is a major warning sign.


3. Subscription Traps: Easy to Start, Impossible to Cancel

The threat: You sign up for a “free trial” or low-cost introductory offer, and before you know it, you’re being charged monthly fees you never agreed to—and canceling requires jumping through endless hoops designed to exhaust you into giving up.

This isn’t just a consumer annoyance—it’s a $2.8 billion annual drain on American households, and it’s getting worse. The FTC has documented extensive use of “dark patterns”—manipulative design techniques specifically engineered to trick you into subscriptions and prevent you from leaving.

The Playbook

Bait and Switch Enrollment: You click “Continue” during checkout, thinking you’re completing a one-time purchase, and inadvertently enroll in a subscription. Amazon paid a $2.5 billion settlement in 2025 after the FTC proved their Prime sign-up was deliberately confusing, with internal tests showing customers were accidentally enrolling.

Hidden Early Termination Fees: The “free trial” looks risk-free, but buried in the fine print is a hefty cancellation fee if you don’t cancel at exactly the right time.

The Cancellation Labyrinth: You signed up with one click, but canceling requires:

  • Finding a hidden “Cancel” button- Navigating through multiple pages of “Are you sure?” screens- Being offered discount after discount- Calling a phone number that puts you on hold for 45 minutes- Talking to a “retention specialist” trained to change your mind

The FTC sued ABCmouse for forcing customers through a “difficult-to-find, lengthy, and confusing cancellation path” that deliberately redirected people away from actually canceling. Uber was sued for charging customers before their free trials ended.

The FTC’s Click-to-Cancel Rule

The good news: The FTC tried to pass a “Click-to-Cancel” rule requiring businesses to make cancellation as easy as sign-up. The bad news: As of late 2025, this rule has been blocked and isn’t in effect. You’re on your own.

How to Protect Yourself

1. Use virtual credit card numbers. Many banks and services like Privacy.com let you create virtual card numbers with spending limits. Sign up for that “free trial” with a virtual card that has a $0 limit after the trial—the subscription can’t charge what doesn’t exist.

2. Set calendar reminders. When you sign up for any trial, immediately set a reminder for 2-3 days before it ends. Don’t rely on your memory—companies are counting on you to forget.

3. Read the cancellation policy before signing up. Search “[company name] cancel subscription” before you commit. If the internet is full of angry customers describing impossible cancellation experiences, that’s your warning.

4. Document everything. Screenshot your cancellation confirmation, save the email, record the date and time. If they keep charging you, this documentation is crucial for disputes.

5. Monitor your credit card statements. Set up alerts for any charges. Small, recurring charges often fly under the radar—scammers count on you not noticing $9.99/month among all your other transactions.

6. Use your bank’s dispute process. If you’ve clearly canceled and are still being charged, dispute the charges with your credit card company. Include your documentation showing the cancellation.

7. Report to the FTC. File a complaint at ReportFraud.ftc.gov. Even if it doesn’t get your money back immediately, these reports help build cases against repeat offenders.


4. Smart Home Hijacking: When Your Devices Turn Against You

The threat: The same smart devices that make your life more convenient—Ring doorbells, Alexa assistants, smart thermostats, WiFi baby monitors—can become surveillance tools or attack vectors when hackers take control.

Americans own an average of 22 connected devices per household. Each one is a potential entry point for criminals who can listen to your conversations, watch you through your cameras, learn when you’re away from home, and even lock you out of your own devices.

Real Incidents That Should Scare You

Camera Takeovers: Hackers have gained access to Ring cameras and used the speakers to harass families, including terrifying incidents where strangers spoke to children through their bedroom cameras. One widely reported case involved a hacker telling an 8-year-old girl that he was Santa Claus.

Voice Assistant Exploitation: Security researchers have demonstrated attacks where specially crafted audio—even audio played from a YouTube video at low volume near your device—can trigger Alexa or Google Assistant to make purchases, unlock doors, or reveal personal information.

Thermostat Ransomware: In some cases, hackers have locked smart thermostats at extreme temperatures (either freezing cold or dangerously hot) and demanded payment to restore control.

The Ring “Breach” Panic of 2025: In May 2025, Ring users across the country reported seeing unknown devices logged into their accounts with login dates they didn’t recognize. Social media exploded with “RING HACKED” warnings. While Ring ultimately attributed this to a backend bug rather than an actual breach, it highlighted how vulnerable these systems can feel—and how many people use weak passwords that would make real breaches easy.

The Core Problem

Most smart home devices are designed for convenience first, security second. They often ship with weak default passwords, lack encryption, receive infrequent security updates, and connect to your entire home network. One compromised smart lightbulb could potentially give hackers access to everything on your WiFi.

How to Protect Yourself

1. Change every default password. When you set up any smart device, the first thing you should do is change the default password to something strong and unique. Use a password manager to keep track.

2. Enable two-factor authentication (2FA) everywhere. For Ring, Nest, Alexa accounts—anywhere it’s offered—turn on 2FA. This means even if someone gets your password, they still can’t log in without access to your phone.

3. Create a separate network for IoT devices. Many routers allow you to set up a “guest network.” Put all your smart home devices on this network, isolated from your computers and phones that contain sensitive data. If a smart device is compromised, the attacker can’t easily jump to your laptop.

4. Keep firmware updated. Enable automatic updates where possible, or set a monthly reminder to check for updates. Outdated firmware often contains known vulnerabilities that hackers actively exploit.

5. Audit your connected devices. Periodically check what devices are logged into your accounts. For Ring, go to Control Center > Authorized Client Devices. For Google Home, check your Google account security settings. Remove anything you don’t recognize.

6. Disable features you don’t use. If you never use voice purchasing through Alexa, disable it. If you don’t need remote access to your thermostat, turn it off. Every feature is a potential attack surface.

7. Cover cameras when not in use. Yes, it’s low-tech, but a physical cover over your camera lens guarantees no one is watching—no software hack can see through tape.

8. Upgrade your router’s security. Make sure your router uses WPA3 encryption (or at least WPA2). Change the router’s admin password from the default. Consider a router with built-in security features that can detect suspicious traffic.

9. Be cautious with cheap, unknown brands. That $15 smart plug from an unknown manufacturer might not receive security updates—or might already contain malware. Stick with reputable brands that have security reputations to protect.


The Bottom Line: Stay Skeptical, Stay Safe

Here’s the uncomfortable truth: scammers are getting smarter, faster, and more sophisticated. The same AI that powers helpful chatbots now powers scam calls indistinguishable from real family members. The same data analytics that personalizes your shopping experience helps criminals build detailed profiles of potential victims.

But you’re not helpless. Every scam—no matter how high-tech—still relies on one thing: getting YOU to take action. To wire money. To click a link. To share information. To ignore that nagging feeling that something isn’t right.

Your best defense is healthy skepticism:

  • Verify before you trust- Question urgency- Confirm through separate channels- If something feels off, it probably is

And perhaps most importantly: talk about scams openly. The reason grandparent scams work is because families don’t discuss them. The reason subscription traps persist is because people are embarrassed to admit they fell for one. The more we share these stories, the harder it becomes for scammers to operate in the shadows.

If you’ve been targeted—whether you lost money or not—report it. Tell the FTC at ReportFraud.ftc.gov. Tell the AARP Fraud Watch Network Helpline at 877-908-3360. Tell your friends and family. Every report helps build the picture that leads to shutting these operations down.

2026 will be a challenging year for consumers. But armed with knowledge and a healthy dose of skepticism, you can make sure you’re not one of the billions of dollars in losses. Stay vigilant, stay informed, and stay safe.


Have you encountered any of these scams? Share your experience in the comments to help warn others. For real-time scam alerts and protection tips, follow Scam Watch HQ on social media and sign up for our newsletter.