__________________________________________________________________________

Tax Planning & Preparation

Financial Services & Wealth Strategies

Estate Planning & Trust Administration
__________________________________________________________________________

Money Read Time: 2 min

Glossary of Scam Terms

Text against a black background. Text: In a world where almost everyone has smartphones, it shouldn’t be surprising that they have become a target for crooks and scammers. These scams occur over phone calls, SMS texts, messaging apps, and social media, and are often adapted from classic scams dating back decades. Here are a few of the most prevalent scams.Text against a black background. Text: In a world where almost everyone has smartphones, it shouldn’t be surprising that they have become a target for crooks and scammers. These scams occur over phone calls, SMS texts, messaging apps, and social media, and are often adapted from classic scams dating back decades. Here are a few of the most prevalent scams.Text next to a rotary telephone. Text: Callback Scams: A voicemail message from an unfamiliar number threatens legal action. Don’t call unfamiliar numbers back.Text next to a rotary telephone. Text: Callback Scams: A voicemail message from an unfamiliar number threatens legal action. Don’t call unfamiliar numbers back.Text next to a masked man wearing an “IRS” emblem. Text: IRS Call Scam: Scammers can pose as IRS agents demanding money or personal information. These criminals may “spoof” an actual IRS number. Remember: The IRS will never call you without sending you a letter beforehand.Text next to a masked man wearing an “IRS” emblem. Text: IRS Call Scam: Scammers can pose as IRS agents demanding money or personal information. These criminals may “spoof” an actual IRS number. Remember: The IRS will never call you without sending you a letter beforehand.Text next to envelopes dangling from strings. Text: Phishing: Phishing is an attempt to “hook” potential victims by throwing out random emails containing malicious software, links, or attachments. The “sender” may pose as a government agency or even a family member seeking emergency funds.Text next to envelopes dangling from strings. Text: Phishing: Phishing is an attempt to “hook” potential victims by throwing out random emails containing malicious software, links, or attachments. The “sender” may pose as a government agency or even a family member seeking emergency funds.Text next to a laptop displaying a heart symbol. Text: “Pig-butchering”: This is a scam that exploits a person’s romantic or financial vulnerability. A relationship is solicited online that builds slowly over time, eventually pressuring the victim into fake investment opportunities.Text next to a laptop displaying a heart symbol. Text: “Pig-butchering”: This is a scam that exploits a person’s romantic or financial vulnerability. A relationship is solicited online that builds slowly over time, eventually pressuring the victim into fake investment opportunities.Text next to a human hand holding a credit card next to a desktop computer. Text: Recovery Scams: In a recovery scam, a person who has already fallen prey to a scam is targeted again with offers to help them recover the money they lost. In these cases, the original scammers are simply coming back for a second helping.Text next to a human hand holding a credit card next to a desktop computer. Text: Recovery Scams: In a recovery scam, a person who has already fallen prey to a scam is targeted again with offers to help them recover the money they lost. In these cases, the original scammers are simply coming back for a second helping.Text next to a smartphone displaying a fake toll road fee request. Text: Smishing: An abbreviation for “SMS Phishing,” smishing is a scam that involves engaging a victim via text messages. The toll road scam is one example.Text next to a smartphone displaying a fake toll road fee request. Text: Smishing: An abbreviation for “SMS Phishing,” smishing is a scam that involves engaging a victim via text messages. The toll road scam is one example.Text next to a silhouetted figure speaking into a phone. Text: Spoofing: This scam involves using false caller ID information to make a target more likely to answer when the scammer calls. Common spoofs include local numbers, businesses, and government agencies.Text next to a silhouetted figure speaking into a phone. Text: Spoofing: This scam involves using false caller ID information to make a target more likely to answer when the scammer calls. Common spoofs include local numbers, businesses, and government agencies.Text next to a blaring bullhorn. Text: Voicemail Hacking: Hackers guess simpler or default passwords and set up new voicemail greetings on your phone to accept collect calls. From there, they use the phone to make international calls.Text next to a blaring bullhorn. Text: Voicemail Hacking: Hackers guess simpler or default passwords and set up new voicemail greetings on your phone to accept collect calls. From there, they use the phone to make international calls.Sources. 1. FCC.gov, March 19, 2025. 2. The Economist, February 6, 2025. 3. CNBC, March 13, 2025.Sources. 1. FCC.gov, March 19, 2025. 2. The Economist, February 6, 2025. 3. CNBC, March 13, 2025.
 

Related Content

Investing with Your Heart

Investing with Your Heart

For some, the social impact of investing is just as important as the return, perhaps more important.

Year-End Charitable Gifting and You

Year-End Charitable Gifting and You

This article may help you maximize the benefits of your donation for your chosen charity.

A Decision Not Made Is Still a Decision

A Decision Not Made Is Still a Decision

Investors who put off important investment decisions may face potential consequences to their future financial security.

Check the background of your financial professional on FINRA's BrokerCheck.

The content is developed from sources believed to be providing accurate information. The information in this material is not intended as tax or legal advice. Please consult legal or tax professionals for specific information regarding your individual situation. Some of this material was developed and produced by FMG Suite to provide information on a topic that may be of interest. FMG Suite is not affiliated with the named representative, broker - dealer, state - or SEC - registered investment advisory firm. The opinions expressed and material provided are for general information, and should not be considered a solicitation for the purchase or sale of any security.

Avantax is a distinct community within Cetera Wealth Services LLC. Securities offered through Cetera Wealth Services, LLC (doing insurance business in CA as CFGAN Insurance Agency LLC), member FINRA/SIPC. Advisory Services offered through Cetera Investment Advisers LLC, a registered investment adviser. Cetera is under separate ownership from any other named entity.

This site is published for residents of the United States only. Financial Professionals of Cetera Wealth Services, LLC may only conduct business with residents of the states and/or jurisdictions in which they are properly registered. Not all of the products and services referenced on this site may be available in every state and through every advisor listed. For additional information please contact the advisor(s) listed on the site, visit the Cetera Wealth Services, LLC site at https://ceterawealthservices.com

Individuals affiliated with this broker/dealer firm are either Registered Representatives who offer only brokerage services and receive transaction-based compensation (commissions), Investment Adviser Representatives who offer only investment advisory services and receive fees based on assets, or both Registered Representatives and Investment Adviser Representatives, who can offer both types of services.

Important Information and Form CRS | Business Continuity