Skip to main content

2026 Scam Alert: New Fraud Tactics Targeting Seniors

AI voice clones, deepfakes, search-ad hijacking, brand impersonation, and multi-channel phishing. Real stats and case studies. How to protect yourself.

For your information

These guides are for educational purposes only. Technology changes quickly — we can't guarantee every step will work on every device. We recommend backing up your data before making changes.

AI and new tech are making scams harder to spot

Deepfake scams have surged 700% over the last three years. Scammers now use AI to clone voices, fake videos, and create convincing messages. Generative AI is predicted to drive U.S. fraud losses to $40 billion (per Deloitte and industry reports). Here's what to watch for and how to stay safe.

AI voice cloning

Scammers can use a short clip of someone’s voice to create a fake call that sounds like a grandchild or family member asking for money.

What to do:

  • Hang up and call the person back on a number you know.
  • Ask a question only the real person would know.
  • Never send money based on an urgent phone call alone.

Deepfakes and fake videos

AI can create fake videos of people saying things they never said. Criminals use deepfaked executives on Zoom calls and spoofed video conferences to trick victims into transferring money or sharing credentials. If you see a video that seems off, verify through another channel before believing or acting on it.

Evolved tech support scams: search-ad hijacking

Scammers no longer rely only on cold calls. They now intercept legitimate help searches online. When someone Googles a tech problem (like "printer not working"), scammers appear in sponsored search results or fake chat windows pretending to be official support.

One victim lost $1,215 after a scammer posed as Google support in a help chat, gained remote access to their computer, and used scare tactics to sell unnecessary "protection."

Key tactics to watch for:

  • Fake tech support numbers in sponsored ads
  • Alarming pop-ups claiming virus infections
  • Remote access requests followed by malware installation
  • Upselling expensive "protection" packages

Be skeptical of sponsored search results when looking for tech support. Go directly to the company’s official website instead.

Brand impersonation scams

Scammers weaponize trusted brand relationships at scale. They create nearly perfect replicas of legitimate company communications—complete with logos, tone, and urgency—to trick you into clicking malicious links or sharing credentials.

These messages often promise refunds, warn of account breaches, or offer exclusive deals. Microsoft impersonation is particularly common: fake emails use urgent deadline threats and fake legal language to rush victims into clicking dangerous links.

What to do:

  • Never use contact info from a suspicious message—look up the real company website yourself.
  • Legitimate companies don’t demand immediate action.
  • If something feels off, call the company using a number from your statement or the back of your card.

Phishing via text, voice, and social media

Phishing has evolved beyond email. About 20% of Americans receive at least one scam text daily, and the average person gets 41 spam texts per month. Scammers use SMS (smishing), voice calls (vishing), and social media messages to exploit urgency, fear, and trust.

Common themes:

  • Fake package delivery notifications
  • Expired rewards points or loyalty programs
  • Account security warnings
  • Urgent payment requests

The same rule applies everywhere: don’t click links or share personal info. Verify through official channels you look up yourself.

Other 2026 tactics

  • Fake AI “support” — Scammers pose as tech support offering to “fix” AI tools. Real companies don’t call you first.
  • Investment scams — Promises of huge returns using AI or crypto. If it sounds too good, it usually is.
  • Romance scams — Fake profiles and AI-generated photos. Never send money to someone you haven’t met in person.
  • Political donation scams — Scammers impersonate politicians or campaigns to solicit fraudulent donations, using the same urgency and emotional manipulation as legitimate campaigns. These work because they induce panic that bypasses critical thinking. Verify any donation request through the campaign's official website.

How to protect yourself

  • Never grant remote access unless you initiated contact with a verified company.
  • Verify through official channels—don't use contact info from suspicious messages.
  • Slow down. Legitimate companies don't demand immediate action.
  • Use credit cards for payments (better fraud protection than debit or gift cards).
  • Be skeptical of sponsored search results when looking for tech support.
  • Report scams to your bank, the FTC, and BBB Scam Tracker.