Defend Yourself Online: 20+ Free Easy-to-Use Tools to Detect Scams, AI Content, and Security Threats

For many who don't work in IT or cybersecurity, knowing how to protect yourself online can be challenging. Here are a handful of the many free, easy-to-use cybersecurity tools that professionals use to protect themselves and their workplaces online.

Tools to bookmark:

One crucial security awareness lesson

Safe Browsing Tools

  • virustotal.com – VirusTotal is a staple in every Information Security (InfoSec) professional's toolkit. You can upload suspicious files and check URLs (including short URLs, IP addresses, domains, or file hashes) to validate their legitimacy. It analyzes your submissions through nearly 100 security vendors and provides easy-to-understand results.

  • urlscan.io – Similar to VirusTotal, URLScan.io provides a quick view of URLs and includes additional features worth exploring.

  • transparencyreport.google.com/safe-browsing/search – Google's Safe Browsing provides super-fast and straightforward feedback on a website's safety.

Scam Checkers

  • scamadviser.com – Scam Advisor provides information on websites, phone numbers, cryptocurrencies, and Bank Account Numbers (IBAN).

  • scamwatch.gov.au – The Australian government has launched a site to protect its citizens from scams. Other governments should take note. Well done, Australia!

Expand Short URLs

Hacked Password and Email Validator

  • haveibeenpwned.com – Have I Been Pwned, has been around for some years now. Cybersecurity professionals frequently use it to check if emails or passwords have been compromised.

QR Code Validator

Phishing Verifier

  • phishtank.com – PhishTank, join the fight against phishing. This site is dedicated to combating online phishing scams. You can submit and track suspected phishing attempts, as well as validate other submissions.

Password Strength Checker

  • delinea.com/resources/password-strength-checker – Delinea (formerly Thycotic) is a password strength checker tool. Until passwords are completely phased out, Delinea offers an excellent resource for assessing password strength. While many tools do not accept passphrases, you can still create complex passwords that are easier to remember.

A passphrase is similar to a password but generally longer and designed to be memorable, allowing for spaces between words.

For example, consider Shakespeare's phrase:

All the world's a stage

This is 23 characters long and easy to remember. To create a secure password, you can adapt the phrase like this:

All-th3-world^s-a-st@ge

It's still 23 characters, meets complexity requirements, and according to Delinea, it would take 78 septillion years to crack.

AI Detection

Cybercriminals are capitalizing on the immense potential of AI. AI is ever-changing, as it rapidly evolves, new tools will undoubtedly emerge. Regardless of your interest in AI, its pervasive nature affects us all, making it crucial to stay informed. Keep these links handy; this list will undoubtedly change and grow over time.

NOTE: Most of these are available for free use, with an optional upgrade to a paid service.

CopyLeaks – copyleaks.com/plagiarism-checker – AI checks for plagiarism

SightEngine – sightengine.com/detect-ai-generated-images – Generated AI image detection

Scribbr – scribbr.com/ai-detector – Generated AI detection

Grammarly – grammarly.com/ai-detector – Generated AI detection

GPTZero – gptzero.me – Generated AI detection

ZeroGPT – zerogpt.com – Generated AI detection

Sapling – sapling.ai/ai-content-detector – Generated AI detection

One crucial security awareness lesson

Aside from having a good antivirus, if I could distill cybersecurity awareness training into a single piece of advice, it would be this: Social engineering attacks are common; they exploit your emotions to create a false sense of urgency. Be mindful of your feelings when interacting with unfamiliar individuals. Most commonly, bad actors use a sense of urgency to prompt you to act quickly. However, some attacks employ a psychological long game, building trust over many months while gathering information before making their move.

Social media enables people to connect and develop virtual relationships over time, some of which can become quite strong and enduring. However, some bad actors understand this dynamic and target individuals to establish long-term virtual relationships, thereby building trust and making their scams more effective. The psychological tactics, subtlety, and patience employed by these individuals are as astonishing as they are horrifying. Because of this reality, it's imperative to remember that unless you have met them and have known them for years, you don't really know them. When they ask you for something, whether it's money or a meeting, be cautious.    

I know an intelligent person who fell victim to a scam. They had built a friendship with the scammer over the course of a year and a half. This person believed they had gotten to know their virtual friend quite well, and when that friend fell on hard times and asked for help, they agreed to assist, only to end up losing many thousands of dollars. As soon as the scammer received the money they were after, they vanished without a trace. Scammers often keep profiles on their victims, take notes, and remember what was said, all to appear as convincing as possible.

In today's world, it is necessary to be vigilant and verify everything.  

About Me

I help fast-growing companies architect secure, scalable environments that align with business strategy. Whether you're preparing for acquisition, expanding into new markets, or just tired of hoping nothing goes wrong, I can help you build it right.

Let’s talk,

Kurt Smith

CISSP, GSEC

LinkedIn | Contact

Next
Next

Cybersecurity for CEOs: What You Don’t Know Can Destroy Value