Introduction
Scams have gotten smarter. Your calm habits can beat them.
You're not imagining it — and you're not behind. If you've noticed that scam calls sound more convincing lately, that fake emails look eerily real, you're right. Something has changed, and it has a name.
In recent years, a technology called artificial intelligence (AI) has given scammers powerful new tools. AI is software that can learn patterns and then generate realistic text, images, and even voices. A fraudster used to need sharp social skills and a lot of time. Now, with AI, that same person can clone a family member's voice from a short video clip. They can write a flawless email that looks exactly like one from your bank. They can produce a convincing photo of someone who doesn't exist.
That's the unsettling part. Here's the reassuring part: you do not need to understand how AI works to protect yourself from it. You just need a handful of simple, repeatable habits — and this book will teach them to you, one calm step at a time.
What this book will do for you
This is not a computer science textbook. It's not a catalogue of scary headlines. Think of this book as a home safety plan for your digital life. The same way you might keep a smoke detector on the ceiling, a list of emergency numbers on the fridge, and a habit of locking the door at night, this book gives you everyday protections you can set up once and rely on from then on:
- A simple "pause and check" routine you can use before responding to any suspicious call, text, or email
- Ready-to-use scripts — actual words you can say out loud — when a caller pressures you to act fast
- One universal verification checklist that works across phone calls, text messages, emails, and social media
- A step-by-step recovery plan if something does go wrong — because mistakes happen, and they're fixable
- A 15-minute monthly tune-up to keep your defences current
By the time you reach the last page, you'll be able to say: "I can pause pressure, verify safely, and decide confidently."
Who this book is for
This book is for you if you use a smartphone, tablet, or computer for everyday things — phone calls, texts, email, maybe some social media — and you'd like to keep doing all of that without constantly worrying about fraud. You don't need to be "good with technology." You don't need to know what a "phishing attack" is yet (though you will by Chapter 2, painlessly). You don't need a family member sitting next to you.
In fact, one of the most important goals of this book is to help you stay independent. You deserve to handle your own calls, check your own email, and browse social media on your own terms — with confidence, not fear. Nothing in these pages will make you more dependent on anyone else. The opposite, actually: every chapter is designed so you are the one in control.
What this book is not
A few promises about what you will not find here:
- No scare tactics. Every chapter focuses on what to do, not what to dread.
- No jargon dumps. When a technical term is unavoidable, you'll get a plain-English definition right there — in the same sentence.
- No skipped steps. If the instruction says "call your bank," you'll also see what to say when they answer.
- No device-specific instructions that expire next month. The habits in this book work whether you're on an iPhone, Android, tablet, or computer.
What is AI, in plain English?
Artificial intelligence is software that can learn patterns from huge amounts of data and then generate new content — text, images, audio, even video — that looks and sounds like a real person created it. Scammers now use AI to create fake voices and fake emails that are much harder to spot than the old-fashioned kind. That's the only reason AI appears in this book: so you understand what makes today's scams more convincing — and how to catch them anyway.
How this book is organised
The book has five parts, and they build on each other like layers of protection around your home. Each layer adds safety. Together, they form a complete plan.
- Part 1: Calm control — A 10-second pause that stops you from reacting under pressure, and a personal red-flag checklist you can tape next to your phone.
- Part 2: Verify every time — A family verification rule and short scripts to end suspicious calls safely.
- Part 3: Handle the big three channels — One checklist applied to phone calls, texts and emails, and social media.
- Part 4: Lock the doors — About 20 minutes to secure your three most important accounts.
- Part 5: If something goes wrong — A step-by-step plan for the first minutes after a scam attempt, and a monthly routine to keep everything current.
You don't have to read front-to-back. If something has already happened — right now, today — go straight to Chapter 10: "Do This First." It's designed to work on its own, even if you haven't read a single other page.
Stop the Rush
The full guide gives you the pause card, the verification scripts, the one-page incident plan, and the 15-minute monthly routine — everything you need to stay in control of your digital life.
From €3.99 · $3.45
Get the full guideAvailable on Amazon Kindle, Apple Books & Google Play