{"id":54050,"date":"2023-10-09T20:55:26","date_gmt":"2023-10-09T20:55:26","guid":{"rendered":"http:\/\/92021e2b-1e4f-41fd-819f-8e121198c8b2"},"modified":"2023-10-09T20:55:26","modified_gmt":"2023-10-09T20:55:26","slug":"the-3-biggest-social-media-scams-americans-are-falling-for","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/the-3-biggest-social-media-scams-americans-are-falling-for\/","title":{"rendered":"The 3 biggest social media scams Americans are falling for"},"content":{"rendered":"<figure class=\"c-shortcodeImage u-clearfix c-shortcodeImage-large\">\n<div class=\"c-shortcodeImage_imageContainer\">\n<div class=\"c-shortcodeImage_image\"><picture class=\"c-cmsImage c-cmsImage_loaded\"><source media=\"(max-width: 767px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/3ee0f8b9cf97f8f7008f014dc9bef333590eeb51\/2023\/10\/09\/91a72452-95c9-4274-9873-c090340a1e5b\/gettyimages-860264044.jpg?auto=webp&amp;width=768\" alt=\"person using laptop in creepy lighting\"><source media=\"(max-width: 1023px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/4ee5be5c60bbf32a4c3ae6fa59dc7be32b9b837f\/2023\/10\/09\/91a72452-95c9-4274-9873-c090340a1e5b\/gettyimages-860264044.jpg?auto=webp&amp;width=1024\" alt=\"person using laptop in creepy lighting\"><source media=\"(max-width: 1440px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/5be27f74fece9540b2b4a644b5a0033f54f450b5\/2023\/10\/09\/91a72452-95c9-4274-9873-c090340a1e5b\/gettyimages-860264044.jpg?auto=webp&amp;width=1280\" alt=\"person using laptop in creepy lighting\"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/a\/img\/resize\/5be27f74fece9540b2b4a644b5a0033f54f450b5\/2023\/10\/09\/91a72452-95c9-4274-9873-c090340a1e5b\/gettyimages-860264044.jpg?auto=webp&amp;width=1280\" alt=\"person using laptop in creepy lighting\" width=\"1280\" height=\"859.5929957406531\" fetchpriority=\"low\"><\/picture><\/div>\n<p> <!----><\/div>\n<p> <!----><figcaption> <span class=\"c-shortcodeImage_credit g-outer-spacing-top-xsmall u-block\">Bill Hinton\/Getty Images<\/span><\/figcaption><\/figure>\n<p>According to the US Federal Trade Commission (FTC), Americans lost $2.7 billion to social media scams, more than website, <a href=\"https:\/\/www.zdnet.com\/article\/scammers-are-using-ai-to-impersonate-your-loved-ones-heres-what-to-watch-for\/\" rel=\"follow\">phone call<\/a>, email, text, or pop-up ad scams. <a href=\"https:\/\/www.ftc.gov\/news-events\/data-visualizations\/data-spotlight\/2023\/10\/social-media-golden-goose-scammers\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" class=\"c-regularLink\">In a new report<\/a>, the FTC details how scammers target people on social media and what kind of scams result in the most significant financial losses.<\/p>\n<p><strong>Also:&nbsp;<\/strong><a href=\"https:\/\/www.zdnet.com\/article\/is-temu-legit-what-to-know-about-this-wildly-popular-shopping-app\/\" rel=\"follow\"><strong>Is Temu legit? What to know before you place an order<\/strong><\/a><\/p>\n<p>The FTC states that from January 2023 to June 2023, social media users were victims of fraudulent online shopping purchases (44%), fake investment opportunities (20%), and romance scams (6%).<\/p>\n<p>However, fake investment opportunities accounted for 53% of the $658 million lost by Americans to scams from January to June. Younger people are more likely to be victims of social media scams, as 47% of 18 to 19-year-olds were scammed on social media.<\/p>\n<p><!----><\/p>\n<p>Here&#8217;s what you need to know to avoid social media scams.<\/p>\n<h2>Fraudulent online shopping purchases<\/h2>\n<p>Scammers are successful at targeting people on social media with retail scams. Usually, people buy items that are never delivered, and the FTC says clothing items and electronics are high on the list of no-shows.<\/p>\n<p>The average person loses about $100 to retail scams. Of the people who reported which social media site they were scammed on, 60% occurred on Facebook, while 24% occurred on Instagram.&nbsp;<\/p>\n<p><strong>Also: <a href=\"https:\/\/www.zdnet.com\/article\/how-to-use-nortons-free-ai-powered-scam-detector\/\" rel=\"follow\">How to use Norton&#8217;s free AI-powered scam detector<\/a><\/strong><\/p>\n<p>These kinds of scams often originate from Instagram and Facebook ads. To avoid these scams, the FTC suggests you search the company&#8217;s name plus &#8220;complaint&#8221; or &#8220;scam&#8221; to see other people&#8217;s experiences.&nbsp;<\/p>\n<p>If you&#8217;re worried you sent money to a scammer, the FTC offers <a href=\"https:\/\/consumer.ftc.gov\/articles\/online-shopping#pay\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" class=\"c-regularLink\">tips<\/a> to help you try to recover your money and better protect yourself next time.<\/p>\n<h2>Fake investment opportunities<\/h2>\n<p>More than half of all money lost to social media scams from January to June went to fraudulent investing opportunities. Most investment scammers build up their social media accounts to seem like they&#8217;re wealthy and can offer sound financial advice.&nbsp;<\/p>\n<p><strong>Also:<\/strong><a href=\"https:\/\/www.zdnet.com\/article\/this-ai-generated-crypto-invoice-scam-almost-got-me-and-im-a-security-pro\/\" rel=\"follow\"><strong> This AI-generated crypto invoice scam almost got me, and I&#8217;m a security pro<\/strong><\/a><\/p>\n<p>These kinds of scammers usually offer courses or classes that promise to help others quickly get rich with huge returns. On average, victims lost $3,000 to fake investment scams.<\/p>\n<p>People reported fraudulent investment opportunities on Instagram (30%), Facebook (26%), WhatsApp (13%), and Telegram (9%).<\/p>\n<h2>Romance scams<\/h2>\n<p>Romance scams have been an avenue for scammers for decades. They usually contact people with a friend request and aim to build a relationship with the victim. The FTC says romance scammers quickly start love-bombing their victims by showering them with compliments and affection early on.<\/p>\n<p>However, scammers don&#8217;t do these acts with kindness in mind but to take money from a victim. Soon after they hook their victims, romance scammers will request money with a high sense of urgency.&nbsp;<\/p>\n<p><strong>Also: <a href=\"https:\/\/www.zdnet.com\/article\/what-is-phishing-how-to-protect-yourself-from-scam-emails-and-more\/\" rel=\"follow\">What is phishing? Everything you need to know to protect yourself from scammers<\/a><\/strong><\/p>\n<p>Romance scammers will avoid meeting in person or video calling and will tell their victims to send money via wire transfer, gift cards, and money transfer apps. These methods of sending money give scammers money quickly and make it hard for victims to get their money back.<\/p>\n<p>If you think a romance scammer has scammed you, the FTC has a <a href=\"https:\/\/consumer.ftc.gov\/articles\/what-know-about-romance-scams#lies\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" class=\"c-regularLink\">guide<\/a> to help you report this fraud and avoid it in the future.&nbsp;<\/p>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/the-3-biggest-social-media-scams-americans-are-falling-for\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The US Federal Trade Commission published a report that outlines which tactics scammers are using and which social media sites are the most rampant with scams.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-54050","post","type-post","status-publish","format-standard","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The 3 biggest social media scams Americans are falling for 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/the-3-biggest-social-media-scams-americans-are-falling-for\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The 3 biggest social media scams Americans are falling for 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/the-3-biggest-social-media-scams-americans-are-falling-for\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-10-09T20:55:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.zdnet.com\/a\/img\/resize\/5be27f74fece9540b2b4a644b5a0033f54f450b5\/2023\/10\/09\/91a72452-95c9-4274-9873-c090340a1e5b\/gettyimages-860264044.jpg?auto=webp&amp;width=1280\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-3-biggest-social-media-scams-americans-are-falling-for\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-3-biggest-social-media-scams-americans-are-falling-for\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"The 3 biggest social media scams Americans are falling for\",\"datePublished\":\"2023-10-09T20:55:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-3-biggest-social-media-scams-americans-are-falling-for\\\/\"},\"wordCount\":568,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-3-biggest-social-media-scams-americans-are-falling-for\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/5be27f74fece9540b2b4a644b5a0033f54f450b5\\\/2023\\\/10\\\/09\\\/91a72452-95c9-4274-9873-c090340a1e5b\\\/gettyimages-860264044.jpg?auto=webp&amp;width=1280\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-3-biggest-social-media-scams-americans-are-falling-for\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-3-biggest-social-media-scams-americans-are-falling-for\\\/\",\"name\":\"The 3 biggest social media scams Americans are falling for 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-3-biggest-social-media-scams-americans-are-falling-for\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-3-biggest-social-media-scams-americans-are-falling-for\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/5be27f74fece9540b2b4a644b5a0033f54f450b5\\\/2023\\\/10\\\/09\\\/91a72452-95c9-4274-9873-c090340a1e5b\\\/gettyimages-860264044.jpg?auto=webp&amp;width=1280\",\"datePublished\":\"2023-10-09T20:55:26+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-3-biggest-social-media-scams-americans-are-falling-for\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-3-biggest-social-media-scams-americans-are-falling-for\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-3-biggest-social-media-scams-americans-are-falling-for\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/5be27f74fece9540b2b4a644b5a0033f54f450b5\\\/2023\\\/10\\\/09\\\/91a72452-95c9-4274-9873-c090340a1e5b\\\/gettyimages-860264044.jpg?auto=webp&amp;width=1280\",\"contentUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/5be27f74fece9540b2b4a644b5a0033f54f450b5\\\/2023\\\/10\\\/09\\\/91a72452-95c9-4274-9873-c090340a1e5b\\\/gettyimages-860264044.jpg?auto=webp&amp;width=1280\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-3-biggest-social-media-scams-americans-are-falling-for\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The 3 biggest social media scams Americans are falling for\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The 3 biggest social media scams Americans are falling for 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/the-3-biggest-social-media-scams-americans-are-falling-for\/","og_locale":"en_US","og_type":"article","og_title":"The 3 biggest social media scams Americans are falling for 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/the-3-biggest-social-media-scams-americans-are-falling-for\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-10-09T20:55:26+00:00","og_image":[{"url":"https:\/\/www.zdnet.com\/a\/img\/resize\/5be27f74fece9540b2b4a644b5a0033f54f450b5\/2023\/10\/09\/91a72452-95c9-4274-9873-c090340a1e5b\/gettyimages-860264044.jpg?auto=webp&amp;width=1280","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/the-3-biggest-social-media-scams-americans-are-falling-for\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/the-3-biggest-social-media-scams-americans-are-falling-for\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"The 3 biggest social media scams Americans are falling for","datePublished":"2023-10-09T20:55:26+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/the-3-biggest-social-media-scams-americans-are-falling-for\/"},"wordCount":568,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/the-3-biggest-social-media-scams-americans-are-falling-for\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/5be27f74fece9540b2b4a644b5a0033f54f450b5\/2023\/10\/09\/91a72452-95c9-4274-9873-c090340a1e5b\/gettyimages-860264044.jpg?auto=webp&amp;width=1280","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/the-3-biggest-social-media-scams-americans-are-falling-for\/","url":"https:\/\/www.threatshub.org\/blog\/the-3-biggest-social-media-scams-americans-are-falling-for\/","name":"The 3 biggest social media scams Americans are falling for 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/the-3-biggest-social-media-scams-americans-are-falling-for\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/the-3-biggest-social-media-scams-americans-are-falling-for\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/5be27f74fece9540b2b4a644b5a0033f54f450b5\/2023\/10\/09\/91a72452-95c9-4274-9873-c090340a1e5b\/gettyimages-860264044.jpg?auto=webp&amp;width=1280","datePublished":"2023-10-09T20:55:26+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/the-3-biggest-social-media-scams-americans-are-falling-for\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/the-3-biggest-social-media-scams-americans-are-falling-for\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/the-3-biggest-social-media-scams-americans-are-falling-for\/#primaryimage","url":"https:\/\/www.zdnet.com\/a\/img\/resize\/5be27f74fece9540b2b4a644b5a0033f54f450b5\/2023\/10\/09\/91a72452-95c9-4274-9873-c090340a1e5b\/gettyimages-860264044.jpg?auto=webp&amp;width=1280","contentUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/5be27f74fece9540b2b4a644b5a0033f54f450b5\/2023\/10\/09\/91a72452-95c9-4274-9873-c090340a1e5b\/gettyimages-860264044.jpg?auto=webp&amp;width=1280"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/the-3-biggest-social-media-scams-americans-are-falling-for\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"The 3 biggest social media scams Americans are falling for"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/54050","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=54050"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/54050\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=54050"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=54050"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=54050"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}