Drummond Financial Solutions

(330) 877-2923

Money Read Time: 2 min

Glossary of Scam Terms

Text against a black background. Text: In a world where almost everyone has smartphones, it shouldn’t be surprising that they have become a target for crooks and scammers. These scams occur over phone calls, SMS texts, messaging apps, and social media, and are often adapted from classic scams dating back decades. Here are a few of the most prevalent scams.Text against a black background. Text: In a world where almost everyone has smartphones, it shouldn’t be surprising that they have become a target for crooks and scammers. These scams occur over phone calls, SMS texts, messaging apps, and social media, and are often adapted from classic scams dating back decades. Here are a few of the most prevalent scams.Text next to a rotary telephone. Text: Callback Scams: A voicemail message from an unfamiliar number threatens legal action. Don’t call unfamiliar numbers back.Text next to a rotary telephone. Text: Callback Scams: A voicemail message from an unfamiliar number threatens legal action. Don’t call unfamiliar numbers back.Text next to a masked man wearing an “IRS” emblem. Text: IRS Call Scam: Scammers can pose as IRS agents demanding money or personal information. These criminals may “spoof” an actual IRS number. Remember: The IRS will never call you without sending you a letter beforehand.Text next to a masked man wearing an “IRS” emblem. Text: IRS Call Scam: Scammers can pose as IRS agents demanding money or personal information. These criminals may “spoof” an actual IRS number. Remember: The IRS will never call you without sending you a letter beforehand.Text next to envelopes dangling from strings. Text: Phishing: Phishing is an attempt to “hook” potential victims by throwing out random emails containing malicious software, links, or attachments. The “sender” may pose as a government agency or even a family member seeking emergency funds.Text next to envelopes dangling from strings. Text: Phishing: Phishing is an attempt to “hook” potential victims by throwing out random emails containing malicious software, links, or attachments. The “sender” may pose as a government agency or even a family member seeking emergency funds.Text next to a laptop displaying a heart symbol. Text: “Pig-butchering”: This is a scam that exploits a person’s romantic or financial vulnerability. A relationship is solicited online that builds slowly over time, eventually pressuring the victim into fake investment opportunities.Text next to a laptop displaying a heart symbol. Text: “Pig-butchering”: This is a scam that exploits a person’s romantic or financial vulnerability. A relationship is solicited online that builds slowly over time, eventually pressuring the victim into fake investment opportunities.Text next to a human hand holding a credit card next to a desktop computer. Text: Recovery Scams: In a recovery scam, a person who has already fallen prey to a scam is targeted again with offers to help them recover the money they lost. In these cases, the original scammers are simply coming back for a second helping.Text next to a human hand holding a credit card next to a desktop computer. Text: Recovery Scams: In a recovery scam, a person who has already fallen prey to a scam is targeted again with offers to help them recover the money they lost. In these cases, the original scammers are simply coming back for a second helping.Text next to a smartphone displaying a fake toll road fee request. Text: Smishing: An abbreviation for “SMS Phishing,” smishing is a scam that involves engaging a victim via text messages. The toll road scam is one example.Text next to a smartphone displaying a fake toll road fee request. Text: Smishing: An abbreviation for “SMS Phishing,” smishing is a scam that involves engaging a victim via text messages. The toll road scam is one example.Text next to a silhouetted figure speaking into a phone. Text: Spoofing: This scam involves using false caller ID information to make a target more likely to answer when the scammer calls. Common spoofs include local numbers, businesses, and government agencies.Text next to a silhouetted figure speaking into a phone. Text: Spoofing: This scam involves using false caller ID information to make a target more likely to answer when the scammer calls. Common spoofs include local numbers, businesses, and government agencies.Text next to a blaring bullhorn. Text: Voicemail Hacking: Hackers guess simpler or default passwords and set up new voicemail greetings on your phone to accept collect calls. From there, they use the phone to make international calls.Text next to a blaring bullhorn. Text: Voicemail Hacking: Hackers guess simpler or default passwords and set up new voicemail greetings on your phone to accept collect calls. From there, they use the phone to make international calls.Sources. 1. FCC.gov, March 19, 2025. 2. The Economist, February 6, 2025. 3. CNBC, March 13, 2025.Sources. 1. FCC.gov, March 19, 2025. 2. The Economist, February 6, 2025. 3. CNBC, March 13, 2025.
 

Related Content

Investments

Investments

You’ve made investments your whole life. Work with us to help make the most of them.

Traditional vs. Roth IRA

Traditional vs. Roth IRA

One or the other? Perhaps both traditional and Roth IRAs can play a part in your retirement plans.

Filing Final Tax Returns for the Deceased

Filing Final Tax Returns for the Deceased

The federal government requires deceased individuals to file a final income tax return.

 

Have A Question About This Topic?







Thank you! Oops!

Estimating the Cost of College

This worksheet can help you estimate the costs of a four-year college program.

Roth IRA for Kids

Learn about the benefits and requirements of opening a Roth IRA for kids.

Women and Financial Strategies

Most women don’t shy away from the day-to-day financial decisions, but some may be leaving their future to chance.

View all articles

Capital Gains Tax Estimator

Use this calculator to estimate your capital gains tax.

What Is My Risk Tolerance?

This questionnaire will help determine your tolerance for investment risk.

Paying Off a Credit Card

Enter various payment options and determine how long it may take to pay off a credit card.

View all calculators

16 Wall Street Cliches in 60 Seconds

Pundits say a lot of things about the markets. Let's see if you can keep up.

Dog Bites and Homeowners Insurance

Reviewing coverage options is just one thing responsible pet parents can do to help look out for their dogs.

Bull and Bear Go To Market

Learn about the difference between bulls and bears—markets, that is!

View all videos