{"id":227393,"date":"2026-03-13T05:34:42","date_gmt":"2026-03-13T12:34:42","guid":{"rendered":"https:\/\/www.mcafee.com\/blogs\/?p=227393"},"modified":"2026-03-12T14:03:01","modified_gmt":"2026-03-12T21:03:01","slug":"this-week-in-scams-pokemon-card-scams-email-extortion-ai-wedding-photo","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/security-news\/this-week-in-scams-pokemon-card-scams-email-extortion-ai-wedding-photo\/","title":{"rendered":"This Week in Scams: Pok\u00e9mon Card Cons, Email Extortion, and a Viral AI Wedding Photo"},"content":{"rendered":"<p><span data-contrast=\"auto\">This week in\u00a0scams, the Pok\u00e9mon Trainer pursuit to \u201ccatch \u2019em all\u201d is being hijacked by criminals posting fake trading card listings online; duping buyers, including young collectors, out of hundreds of dollars.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Meanwhile, threatening email extortion scams claiming your personal data has been stolen are flooding inboxes around the world. And a viral \u201cwedding photo\u201d of Tom Holland and Zendaya shows how AI-generated images can blur the line between real and fake online.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Here\u2019s\u00a0what to know.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"2\"><span data-contrast=\"none\">Pok\u00e9mon Card Scams\u00a0Surge\u00a0on Online Marketplaces<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">The booming market for collectible Pok\u00e9mon cards has become a new target for scammers.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">According to\u00a0<\/span><a href=\"https:\/\/sg.news.yahoo.com\/man-arrested-over-e-commerce-132400522.html\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">reporting from\u00a0<\/span><b><span data-contrast=\"none\">The Straits Times<\/span><\/b><\/a><span data-contrast=\"auto\">, Singapore police recently arrested a 25-year-old man suspected of running a series of e-commerce\u00a0scams\u00a0involving Pok\u00e9mon trading cards. Victims\u00a0reportedly lost\u00a0more than\u00a0<\/span><b><span data-contrast=\"auto\">$135,000<\/span><\/b><span data-contrast=\"auto\">\u00a0after paying for limited-edition cards that never arrived.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Authorities say the suspect allegedly advertised\u00a0<\/span><b><span data-contrast=\"auto\">pre-orders for rare cards<\/span><\/b><span data-contrast=\"auto\">\u00a0on the online marketplace Carousell. After receiving payment through bank transfers or digital payment apps, the seller either became unreachable or claimed there were delivery problems.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Police say at least\u00a0<\/span><b><span data-contrast=\"auto\">35 reports tied to the suspect have been filed since October 2025<\/span><\/b><span data-contrast=\"auto\">, and more broadly there have been\u00a0<\/span><b><span data-contrast=\"auto\">over 600 reported Pok\u00e9mon card e-commerce\u00a0scams\u00a0totaling\u00a0more than $1.1 million in losses<\/span><\/b><span data-contrast=\"auto\">\u00a0during that same period.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h4 aria-level=\"4\"><i><span data-contrast=\"none\">Why this matters:<\/span><\/i><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:80,&quot;335559739&quot;:40}\">\u00a0<\/span><\/h4>\n<p><span data-contrast=\"auto\">Collectibles create the perfect storm for online\u00a0scams. Limited releases, hype, and rising resale values make buyers feel pressure to act quickly before items \u201csell out.\u201d Scammers take advantage of that urgency.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h3 aria-level=\"3\"><span data-contrast=\"none\">How to Stay Safe When Buying Collectibles Online<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">If\u00a0you\u2019re\u00a0buying trading cards or other collectibles online:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<ul>\n<li><span data-contrast=\"auto\">Buy from\u00a0<\/span><b><span data-contrast=\"auto\">authorized retailers or well-established marketplaces<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">Avoid sellers who\u00a0require\u00a0<\/span><b><span data-contrast=\"auto\">direct bank transfers or payment apps upfront<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">Use platforms with\u00a0<\/span><b><span data-contrast=\"auto\">buyer protection or escrow payment systems<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">Be cautious of sellers who suddenly move the conversation to\u00a0<\/span><b><span data-contrast=\"auto\">WhatsApp, Telegram, or other messaging apps<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">When demand spikes for a product,\u00a0whether\u00a0it\u2019s\u00a0sneakers, concert tickets, or Pok\u00e9mon cards,\u00a0scams\u00a0usually follow.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"2\"><span data-contrast=\"none\">The \u201cYour Data Was Stolen\u201d Email Extortion Scam<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">Another\u00a0scam\u00a0spreading widely right now arrives in a much more intimidating format: a threatening email claiming hackers have stolen your personal data.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">According to\u00a0<\/span><a href=\"https:\/\/www.foxnews.com\/tech\/aware-extortion-scam-emails-claiming-your-data-stolen\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">reporting from\u00a0<\/span><b><span data-contrast=\"none\">Fox News<\/span><\/b><\/a><span data-contrast=\"auto\">, many people are receiving messages that claim the sender has access to their passwords, files, or financial information. The message then demands\u00a0<\/span><b><span data-contrast=\"auto\">payment in Bitcoin<\/span><\/b><span data-contrast=\"auto\">\u00a0to prevent the data from being sold on the dark web.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">At first glance, these\u00a0emails can feel frightening. They often use dramatic language like:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<ul>\n<li><span data-contrast=\"auto\">\u201cI have your complete personal information\u201d<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">\u201cYour files and devices are compromised\u201d<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">\u201cPay within 48 hours or your data will be leaked\u201d<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">But in most cases,\u00a0there\u2019s\u00a0one major problem with the claim.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">There\u2019s\u00a0<\/span><b><span data-contrast=\"auto\">no proof<\/span><\/b><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Security experts note that these messages usually include\u00a0<\/span><b><span data-contrast=\"auto\">no screenshots, no passwords, and no evidence of a real breach<\/span><\/b><span data-contrast=\"auto\">. Instead, scammers send the same message to thousands of email addresses at once, hoping a small percentage of recipients will panic and pay.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Often, the scammers obtained your email address from\u00a0<\/span><b><span data-contrast=\"auto\">old data breach lists circulating online<\/span><\/b><span data-contrast=\"auto\">, which makes the message feel more believable.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h4 aria-level=\"3\"><span data-contrast=\"none\">What to Do If You Receive One of These Emails<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}\">\u00a0<\/span><\/h4>\n<p><span data-contrast=\"auto\">If you receive a threatening extortion email:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<ul>\n<li>Do not reply<\/li>\n<li>Do not send money<\/li>\n<li>Mark the message as spam or phishing<\/li>\n<li>Delete it<\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">Reporting the message helps email providers improve spam filters and prevent similar\u00a0scams\u00a0from reaching others.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The biggest tactic here is fear. Once you slow down and evaluate the message, the\u00a0scam\u00a0usually falls apart.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"2\"><span data-contrast=\"none\">That Viral Tom Holland and Zendaya \u201cWedding Photo\u201d?\u00a0AI<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">A viral image circulating on social media this week claimed to show\u00a0<\/span><b><span data-contrast=\"auto\">Tom Holland and Zendaya\u2019s wedding<\/span><\/b><span data-contrast=\"auto\">, sparking massive speculation online.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">But many viewers quickly suspected the image\u00a0wasn\u2019t\u00a0real.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">According to\u00a0<\/span><a href=\"https:\/\/www.yahoo.com\/entertainment\/celebrity\/articles\/tom-holland-zendaya-wedding-photo-090340609.html\"><span data-contrast=\"none\">reporting\u00a0on\u00a0<\/span><b><span data-contrast=\"none\">Yahoo Entertainment<\/span><\/b><\/a><span data-contrast=\"auto\">, the photo appeared to originate from a fan account on X (formerly Twitter) that claimed the image had been \u201cconfirmed\u201d by major outlets like Vogue and Cosmopolitan. However, no such confirmation existed, and soon the\u00a0official label was added marking the content as\u00a0<\/span><b><span data-contrast=\"auto\">AI-generated<\/span><\/b><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<figure id=\"attachment_227394\" aria-describedby=\"caption-attachment-227394\" style=\"width: 737px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wpa-warning wpa-suspicious-alt size-large wp-image-227394\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-12-at-12.20.29\u202fPM-737x1024.png\" alt=\"A screenshot of the viral AI-generated image.\" width=\"737\" height=\"1024\" data-warning=\"Suspicious alt text\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-12-at-12.20.29\u202fPM-737x1024.png 737w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-12-at-12.20.29\u202fPM-216x300.png 216w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-12-at-12.20.29\u202fPM-768x1066.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-12-at-12.20.29\u202fPM-1106x1536.png 1106w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-12-at-12.20.29\u202fPM-93x129.png 93w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-12-at-12.20.29\u202fPM.png 1148w\" sizes=\"auto, (max-width: 737px) 100vw, 737px\" \/><figcaption id=\"caption-attachment-227394\" class=\"wp-caption-text\">A screenshot of the viral AI-generated image.<\/figcaption><\/figure>\n<p><span data-contrast=\"auto\">Celebrity\u00a0rumors\u00a0already spread quickly online. Add generative AI to the mix, and fabricated images can travel even faster.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">While a fake celebrity wedding photo may seem harmless, the same technology can easily be used in more serious ways.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">AI-generated visuals are already being used to create:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<ul>\n<li><span data-contrast=\"auto\">Fake celebrity endorsements<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">Fabricated news events<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">Scam\u00a0ads featuring public figures<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">Fraudulent investment promotions<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">The line between real and synthetic content is getting harder to spot.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h4 aria-level=\"3\"><span data-contrast=\"none\">How to Spot Potential AI Images<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}\">\u00a0<\/span><\/h4>\n<p><span data-contrast=\"auto\">If a viral image seems surprising or dramatic:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<ul>\n<li><span data-contrast=\"auto\">Check whether\u00a0<\/span><b><span data-contrast=\"auto\">credible news outlets or verified accounts<\/span><\/b><span data-contrast=\"auto\">\u00a0are reporting it<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">Look for\u00a0<\/span><b><span data-contrast=\"auto\">visual inconsistencies<\/span><\/b><span data-contrast=\"auto\">\u00a0in hands, text, or background details<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">Reverse\u00a0image\u00a0search the photo to see where it first appeared<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">Verify through\u00a0<\/span><b><span data-contrast=\"auto\">official sources before sharing<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">When something looks shocking online,\u00a0that\u2019s\u00a0often exactly why it spreads.\u00a0<\/span><a href=\"https:\/\/www.mcafee.com\/en-us\/scam-detector\/\"><span data-contrast=\"none\">McAfee\u2019s built-in Scam Detector<\/span><\/a><span data-contrast=\"auto\">\u00a0can help you spot AI-generated audio and video.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"2\"><span data-contrast=\"none\">McAfee\u2019s Safety Tips This Week<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:160,&quot;335559739&quot;:80}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">A few simple habits can help reduce your risk across all three of these scenarios:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<ul>\n<li><span data-contrast=\"auto\">Be cautious when buying\u00a0<\/span><b><span data-contrast=\"auto\">high-demand collectibles online<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">Never send money in response to\u00a0<\/span><b><span data-contrast=\"auto\">threatening\u00a0emails<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">Treat viral images and breaking celebrity news with healthy\u00a0skepticism<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">Use strong, unique passwords and enable\u00a0<\/span><b><span data-contrast=\"auto\">two-factor authentication<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<li><span data-contrast=\"auto\">Verify surprising claims through trusted sources before reacting<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">Scams today don\u2019t always look like scams. They often look like exciting deals, urgent warnings, or AI depictions of people you trust.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The best\u00a0defense\u00a0is slowing down before clicking, paying, or sharing.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h3 aria-level=\"2\"><span data-contrast=\"none\">We\u2019ll\u00a0Be Back Next Week<\/span><span data-ccp-props=\"{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:160,&quot;335559739&quot;:80}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">From collectible card fraud to email extortion campaigns and AI-generated viral content, the tactics scammers use may change, but the strategy is the same: manipulate emotion and urgency.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Stay\u00a0skeptical, verify before you trust, and\u00a0we\u2019ll\u00a0be back next week with another breakdown of the\u00a0scams\u00a0making headlines,\u00a0and what they mean for your security.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This week in\u00a0scams, the Pok\u00e9mon Trainer pursuit to \u201ccatch \u2019em all\u201d is being hijacked by criminals posting fake trading card&#8230;<\/p>\n","protected":false},"author":1440,"featured_media":194468,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10667,10661,13,1838],"tags":[],"coauthors":[16632],"class_list":["post-227393","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security-news","category-internet-security","category-privacy-identity-protection","category-mobile-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>This Week in Scams: Pok\u00e9mon Card Cons, Email Extortion, and a Viral AI Wedding Photo | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Pok\u00e9mon card scams, threatening email extortion, and a viral AI-generated celebrity wedding photo. Here\u2019s what these stories reveal about today\u2019s online scams.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"This Week in Scams: Pok\u00e9mon Card Cons, Email Extortion, and a Viral AI Wedding Photo | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Pok\u00e9mon card scams, threatening email extortion, and a viral AI-generated celebrity wedding photo. Here\u2019s what these stories reveal about today\u2019s online scams.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/security-news\/this-week-in-scams-pokemon-card-scams-email-extortion-ai-wedding-photo\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2026-03-13T12:34:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/04\/300x200_Blog_061424-2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Brooke Seipel\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Brooke Seipel\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/security-news\/this-week-in-scams-pokemon-card-scams-email-extortion-ai-wedding-photo\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/security-news\/this-week-in-scams-pokemon-card-scams-email-extortion-ai-wedding-photo\/\"},\"author\":{\"name\":\"Brooke Seipel\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/e0177129df164a74082f47397af3e729\"},\"headline\":\"This Week in Scams: Pok\u00e9mon Card Cons, Email Extortion, and a Viral AI Wedding Photo\",\"datePublished\":\"2026-03-13T12:34:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/security-news\/this-week-in-scams-pokemon-card-scams-email-extortion-ai-wedding-photo\/\"},\"wordCount\":1015,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/security-news\/this-week-in-scams-pokemon-card-scams-email-extortion-ai-wedding-photo\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/04\/300x200_Blog_061424-2.png\",\"articleSection\":[\"Security News\",\"Internet Security\",\"Privacy &amp; Identity Protection\",\"Mobile Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/security-news\/this-week-in-scams-pokemon-card-scams-email-extortion-ai-wedding-photo\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/security-news\/this-week-in-scams-pokemon-card-scams-email-extortion-ai-wedding-photo\/\",\"name\":\"This Week in Scams: Pok\u00e9mon Card Cons, Email Extortion, and a Viral AI Wedding Photo | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/security-news\/this-week-in-scams-pokemon-card-scams-email-extortion-ai-wedding-photo\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/security-news\/this-week-in-scams-pokemon-card-scams-email-extortion-ai-wedding-photo\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/04\/300x200_Blog_061424-2.png\",\"datePublished\":\"2026-03-13T12:34:42+00:00\",\"description\":\"Pok\u00e9mon card scams, threatening email extortion, and a viral AI-generated celebrity wedding photo. Here\u2019s what these stories reveal about today\u2019s online scams.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/security-news\/this-week-in-scams-pokemon-card-scams-email-extortion-ai-wedding-photo\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/security-news\/this-week-in-scams-pokemon-card-scams-email-extortion-ai-wedding-photo\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/security-news\/this-week-in-scams-pokemon-card-scams-email-extortion-ai-wedding-photo\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/04\/300x200_Blog_061424-2.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/04\/300x200_Blog_061424-2.png\",\"width\":300,\"height\":200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/security-news\/this-week-in-scams-pokemon-card-scams-email-extortion-ai-wedding-photo\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security News\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/security-news\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"This Week in Scams: Pok\u00e9mon Card Cons, Email Extortion, and a Viral AI Wedding Photo\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/e0177129df164a74082f47397af3e729\",\"name\":\"Brooke Seipel\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/ac03c1083bbdcd2cbb0675dc29c62cbe\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/01\/1693283531327-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/01\/1693283531327-96x96.jpg\",\"caption\":\"Brooke Seipel\"},\"description\":\"Brooke Seipel is the Content Editor in Chief at McAfee, where she leads the company's content strategy with a focus on cybersecurity education. With a decade of experience in audience development and digital content, Brooke has a strong understanding of online audiences, emerging trends, and the evolving cyber landscape. Before joining McAfee, Brooke led audience teams and served as both a reporter and editor at numerous award-winning publications including Fortune, The Hill, International Business Times, New Republic, and The OC Register. Brooke is dedicated to providing insightful, actionable content that empowers readers to make informed decisions about their digital safety. When she's not immersed in the world of cybersecurity, you can find her scrolling social media endlessly, soaking up the latest trends, and also volunteering as a naturalist.\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/brooke-seipel\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"This Week in Scams: Pok\u00e9mon Card Cons, Email Extortion, and a Viral AI Wedding Photo | McAfee Blog","description":"Pok\u00e9mon card scams, threatening email extortion, and a viral AI-generated celebrity wedding photo. Here\u2019s what these stories reveal about today\u2019s online scams.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"This Week in Scams: Pok\u00e9mon Card Cons, Email Extortion, and a Viral AI Wedding Photo | McAfee Blog","og_description":"Pok\u00e9mon card scams, threatening email extortion, and a viral AI-generated celebrity wedding photo. Here\u2019s what these stories reveal about today\u2019s online scams.","og_url":"https:\/\/www.mcafee.com\/blogs\/security-news\/this-week-in-scams-pokemon-card-scams-email-extortion-ai-wedding-photo\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2026-03-13T12:34:42+00:00","og_image":[{"width":300,"height":200,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/04\/300x200_Blog_061424-2.png","type":"image\/png"}],"author":"Brooke Seipel","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"Brooke Seipel","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/security-news\/this-week-in-scams-pokemon-card-scams-email-extortion-ai-wedding-photo\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/security-news\/this-week-in-scams-pokemon-card-scams-email-extortion-ai-wedding-photo\/"},"author":{"name":"Brooke Seipel","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/e0177129df164a74082f47397af3e729"},"headline":"This Week in Scams: Pok\u00e9mon Card Cons, Email Extortion, and a Viral AI Wedding Photo","datePublished":"2026-03-13T12:34:42+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/security-news\/this-week-in-scams-pokemon-card-scams-email-extortion-ai-wedding-photo\/"},"wordCount":1015,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/security-news\/this-week-in-scams-pokemon-card-scams-email-extortion-ai-wedding-photo\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/04\/300x200_Blog_061424-2.png","articleSection":["Security News","Internet Security","Privacy &amp; Identity Protection","Mobile Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/security-news\/this-week-in-scams-pokemon-card-scams-email-extortion-ai-wedding-photo\/","url":"https:\/\/www.mcafee.com\/blogs\/security-news\/this-week-in-scams-pokemon-card-scams-email-extortion-ai-wedding-photo\/","name":"This Week in Scams: Pok\u00e9mon Card Cons, Email Extortion, and a Viral AI Wedding Photo | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/security-news\/this-week-in-scams-pokemon-card-scams-email-extortion-ai-wedding-photo\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/security-news\/this-week-in-scams-pokemon-card-scams-email-extortion-ai-wedding-photo\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/04\/300x200_Blog_061424-2.png","datePublished":"2026-03-13T12:34:42+00:00","description":"Pok\u00e9mon card scams, threatening email extortion, and a viral AI-generated celebrity wedding photo. Here\u2019s what these stories reveal about today\u2019s online scams.","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/security-news\/this-week-in-scams-pokemon-card-scams-email-extortion-ai-wedding-photo\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/security-news\/this-week-in-scams-pokemon-card-scams-email-extortion-ai-wedding-photo\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/security-news\/this-week-in-scams-pokemon-card-scams-email-extortion-ai-wedding-photo\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/04\/300x200_Blog_061424-2.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/04\/300x200_Blog_061424-2.png","width":300,"height":200},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/security-news\/this-week-in-scams-pokemon-card-scams-email-extortion-ai-wedding-photo\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Security News","item":"https:\/\/www.mcafee.com\/blogs\/security-news\/"},{"@type":"ListItem","position":3,"name":"This Week in Scams: Pok\u00e9mon Card Cons, Email Extortion, and a Viral AI Wedding Photo"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/e0177129df164a74082f47397af3e729","name":"Brooke Seipel","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/ac03c1083bbdcd2cbb0675dc29c62cbe","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/01\/1693283531327-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/01\/1693283531327-96x96.jpg","caption":"Brooke Seipel"},"description":"Brooke Seipel is the Content Editor in Chief at McAfee, where she leads the company's content strategy with a focus on cybersecurity education. With a decade of experience in audience development and digital content, Brooke has a strong understanding of online audiences, emerging trends, and the evolving cyber landscape. Before joining McAfee, Brooke led audience teams and served as both a reporter and editor at numerous award-winning publications including Fortune, The Hill, International Business Times, New Republic, and The OC Register. Brooke is dedicated to providing insightful, actionable content that empowers readers to make informed decisions about their digital safety. When she's not immersed in the world of cybersecurity, you can find her scrolling social media endlessly, soaking up the latest trends, and also volunteering as a naturalist.","url":"https:\/\/www.mcafee.com\/blogs\/author\/brooke-seipel\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/227393","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/1440"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=227393"}],"version-history":[{"count":3,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/227393\/revisions"}],"predecessor-version":[{"id":227411,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/227393\/revisions\/227411"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/194468"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=227393"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=227393"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=227393"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=227393"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}