{"id":5734,"date":"2026-01-21T04:09:06","date_gmt":"2026-01-20T21:09:06","guid":{"rendered":"https:\/\/chongluadao.vn\/blog\/?p=5734"},"modified":"2026-01-21T04:09:35","modified_gmt":"2026-01-20T21:09:35","slug":"cac-thu-doan-lua-dao-nham-vao-nguoi-cao-tuoi","status":"publish","type":"post","link":"https:\/\/chongluadao.vn\/blog\/en\/2026\/01\/cac-thu-doan-lua-dao-nham-vao-nguoi-cao-tuoi\/","title":{"rendered":"Scams targeting the elderly."},"content":{"rendered":"<p>Currently, scammers are taking advantage of the elderly&#039;s anxiety about illness, their desire for extra income, and their kindness to carry out many sophisticated scams. In addition to online scams, direct scams at home by impersonating public employees and officials are also one of the most dangerous scams against the elderly.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Why are the elderly becoming targets of scams?<\/h2>\n\n\n\n<p>According to international cybersecurity agencies and organizations, the elderly are becoming a frequent target of high-tech fraud. This phenomenon does not stem from cognitive decline, but rather from disparities in access to information and unique psychosocial characteristics.<\/p>\n\n\n\n<p>Below is a detailed analysis of the main groups of causes:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Financial and lifestyle characteristics<\/h3>\n\n\n<style>.wp-block-kadence-iconlist.kt-svg-icon-list-items5734_0d142f-65:not(.this-stops-third-party-issues){margin-top:0px;margin-bottom:0px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items5734_0d142f-65 ul.kt-svg-icon-list:not(.this-prevents-issues):not(.this-stops-third-party-issues):not(.tijsloc){margin-top:0px;margin-right:0px;margin-bottom:var(--global-kb-spacing-sm, 1.5rem);margin-left:0px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items5734_0d142f-65 ul.kt-svg-icon-list{grid-row-gap:5px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items5734_0d142f-65 ul.kt-svg-icon-list .kt-svg-icon-list-item-wrap .kt-svg-icon-list-single{margin-right:10px;}.kt-svg-icon-list-items5734_0d142f-65 ul.kt-svg-icon-list .kt-svg-icon-list-level-0 .kt-svg-icon-list-single svg{font-size:20px;}<\/style>\n<div class=\"wp-block-kadence-iconlist kt-svg-icon-list-items kt-svg-icon-list-items5734_0d142f-65 kt-svg-icon-list-columns-1 alignnone kt-list-icon-aligntop\"><ul class=\"kt-svg-icon-list\"><style>.kt-svg-icon-list-item-5734_4ec469-4d .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-5734_4ec469-4d kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_arrowRightCircle kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><circle cx=\"12\" cy=\"12\" r=\"10\"\/><polyline points=\"12 16 16 12 12 8\"\/><line x1=\"8\" y1=\"12\" x2=\"16\" y2=\"12\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\"><strong>High liquidity<\/strong>Elderly people often possess surplus funds (pensions, retirement savings, gifts from children and grandchildren) in the form of cash or bank deposits. These are highly liquid assets, easily convertible or transferred, making them attractive economic targets for criminals.<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-5734_fbf649-03 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-5734_fbf649-03 kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_arrowRightCircle kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><circle cx=\"12\" cy=\"12\" r=\"10\"\/><polyline points=\"12 16 16 12 12 8\"\/><line x1=\"8\" y1=\"12\" x2=\"16\" y2=\"12\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\"><strong>Social isolation<\/strong>A large proportion of elderly people live alone or lack regular interaction with their children and grandchildren due to the fast-paced modern lifestyle. Loneliness creates a psychological need for conversation and sharing. Criminals exploit this vulnerability to approach and build false trust (social engineering) before committing fraud.<\/span><\/li>\n<\/ul><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">Technological barriers<\/h3>\n\n\n<style>.wp-block-kadence-iconlist.kt-svg-icon-list-items5734_f7a0ec-a6:not(.this-stops-third-party-issues){margin-top:0px;margin-bottom:0px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items5734_f7a0ec-a6 ul.kt-svg-icon-list:not(.this-prevents-issues):not(.this-stops-third-party-issues):not(.tijsloc){margin-top:0px;margin-right:0px;margin-bottom:var(--global-kb-spacing-sm, 1.5rem);margin-left:0px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items5734_f7a0ec-a6 ul.kt-svg-icon-list{grid-row-gap:5px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items5734_f7a0ec-a6 ul.kt-svg-icon-list .kt-svg-icon-list-item-wrap .kt-svg-icon-list-single{margin-right:10px;}.kt-svg-icon-list-items5734_f7a0ec-a6 ul.kt-svg-icon-list .kt-svg-icon-list-level-0 .kt-svg-icon-list-single svg{font-size:20px;}<\/style>\n<div class=\"wp-block-kadence-iconlist kt-svg-icon-list-items kt-svg-icon-list-items5734_f7a0ec-a6 kt-svg-icon-list-columns-1 alignnone kt-list-icon-aligntop\"><ul class=\"kt-svg-icon-list\"><style>.kt-svg-icon-list-item-5734_99c7cc-7c .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-5734_99c7cc-7c kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_arrowRightCircle kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><circle cx=\"12\" cy=\"12\" r=\"10\"\/><polyline points=\"12 16 16 12 12 8\"\/><line x1=\"8\" y1=\"12\" x2=\"16\" y2=\"12\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\"><strong>Digital skills gap<\/strong>Elderly people often have difficulty accessing and understanding new concepts such as Smart Banking, OTP codes, biometrics, or identifying fake websites\/applications.<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-5734_58da36-1f .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-5734_58da36-1f kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_arrowRightCircle kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><circle cx=\"12\" cy=\"12\" r=\"10\"\/><polyline points=\"12 16 16 12 12 8\"\/><line x1=\"8\" y1=\"12\" x2=\"16\" y2=\"12\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\"><strong>Limited ability to verify information.<\/strong>Unlike younger generations who are accustomed to cross-checking information, older adults tend to automatically trust information that appears on electronic devices or from people who claim to be &quot;authorities.&quot;.<\/span><\/li>\n<\/ul><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">Behavioral and psychological barriers<\/h3>\n\n\n<style>.wp-block-kadence-iconlist.kt-svg-icon-list-items5734_07a638-1d:not(.this-stops-third-party-issues){margin-top:0px;margin-bottom:0px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items5734_07a638-1d ul.kt-svg-icon-list:not(.this-prevents-issues):not(.this-stops-third-party-issues):not(.tijsloc){margin-top:0px;margin-right:0px;margin-bottom:var(--global-kb-spacing-sm, 1.5rem);margin-left:0px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items5734_07a638-1d ul.kt-svg-icon-list{grid-row-gap:5px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items5734_07a638-1d ul.kt-svg-icon-list .kt-svg-icon-list-item-wrap .kt-svg-icon-list-single{margin-right:10px;}.kt-svg-icon-list-items5734_07a638-1d ul.kt-svg-icon-list .kt-svg-icon-list-level-0 .kt-svg-icon-list-single svg{font-size:20px;}<\/style>\n<div class=\"wp-block-kadence-iconlist kt-svg-icon-list-items kt-svg-icon-list-items5734_07a638-1d kt-svg-icon-list-columns-1 alignnone kt-list-icon-aligntop\"><ul class=\"kt-svg-icon-list\"><style>.kt-svg-icon-list-item-5734_2145b3-11 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-5734_2145b3-11 kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_arrowRightCircle kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><circle cx=\"12\" cy=\"12\" r=\"10\"\/><polyline points=\"12 16 16 12 12 8\"\/><line x1=\"8\" y1=\"12\" x2=\"16\" y2=\"12\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\"><strong>The psychology of &quot;fear of trouble&quot; and &quot;fear of being judged&quot;\u201c<\/strong>:<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-5734_f7c324-94 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-5734_f7c324-94 kt-svg-icon-list-level-2\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_check kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><polyline points=\"20 6 9 17 4 12\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">Before being scammed: Victims often try to solve problems online themselves instead of asking their children or grandchildren for advice, due to a fear of being seen as outdated, senile, or bothering their relatives.<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-5734_d5f5d5-4f .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-5734_d5f5d5-4f kt-svg-icon-list-level-2\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_check kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><polyline points=\"20 6 9 17 4 12\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">After being scammed: Feelings of guilt and shame cause victims to conceal the incident and not report it to the police. This leads to a &quot;criminal dark zone&quot; \u2013 where criminals continue to operate undetected.<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-5734_13e68a-c7 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-5734_13e68a-c7 kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_arrowRightCircle kt-svg-icon-list-single\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><circle cx=\"12\" cy=\"12\" r=\"10\"\/><polyline points=\"12 16 16 12 12 8\"\/><line x1=\"8\" y1=\"12\" x2=\"16\" y2=\"12\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\"><strong>Psychology of obedience to authority<\/strong>The older generation often has a high degree of respect and fear for law enforcement agencies (police, courts, prosecutors). Scenarios involving impersonating authorities and threatening arrest exploit this psychological vulnerability, causing panic and immediate loss of judgment.<\/span><\/li>\n<\/ul><\/div>\n\n\n<style>.kb-image5734_c885fd-df.kb-image-is-ratio-size, .kb-image5734_c885fd-df .kb-image-is-ratio-size{max-width:763px;width:100%;}.wp-block-kadence-column > .kt-inside-inner-col > .kb-image5734_c885fd-df.kb-image-is-ratio-size, .wp-block-kadence-column > .kt-inside-inner-col > .kb-image5734_c885fd-df .kb-image-is-ratio-size{align-self:unset;}.kb-image5734_c885fd-df figure{max-width:763px;}.kb-image5734_c885fd-df .image-is-svg, .kb-image5734_c885fd-df .image-is-svg img{width:100%;}.kb-image5734_c885fd-df .kb-image-has-overlay:after{opacity:0.3;}<\/style>\n<div class=\"wp-block-kadence-image kb-image5734_c885fd-df\"><figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"2752\" height=\"1536\" src=\"https:\/\/chongluadao.vn\/blog\/wp-content\/uploads\/2026\/01\/Hinh-1-Nguyen-nhan-khien-NCT-thanh-muc-tieu-lua-dao-1.png\" alt=\"T\u1ea1i sao ng\u01b0\u1eddi cao tu\u1ed5i l\u1ea1i l\u00e0 m\u1ee5c ti\u00eau c\u1ee7a l\u1eeba \u0111\u1ea3o tr\u1ef1c tuy\u1ebfn\" class=\"kb-img wp-image-5736\"\/><\/figure><\/div>\n\n\n\n<p>The reality is that the vulnerability of the elderly to scams is not an unchangeable fate. The notion that the elderly &quot;cannot access technology&quot; or &quot;lack the ability to defend themselves&quot; are prejudices that need to be dispelled in public awareness campaigns.<\/p>\n\n\n\n<p>Elderly people possess inherent life experience and caution. If equipped with the right knowledge, they are fully capable of protecting their own property and personal information.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a>Common scams targeting the elderly.<\/a><\/h2>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading5734_af1983-7d, .wp-block-kadence-advancedheading.kt-adv-heading5734_af1983-7d[data-kb-block=\"kb-adv-heading5734_af1983-7d\"]{font-size:var(--global-kb-font-size-md, 1.25rem);font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading5734_af1983-7d mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading5734_af1983-7d[data-kb-block=\"kb-adv-heading5734_af1983-7d\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading5734_af1983-7d img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading5734_af1983-7d[data-kb-block=\"kb-adv-heading5734_af1983-7d\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading5734_af1983-7d wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading5734_af1983-7d\"><a href=\"https:\/\/chongluadao.vn\/blog\/en\/vishing-nham-vao-nguoi-gia\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>1. Voice Phishing\/Vishing<\/strong><\/a><\/p>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading5734_c3f81f-83, .wp-block-kadence-advancedheading.kt-adv-heading5734_c3f81f-83[data-kb-block=\"kb-adv-heading5734_c3f81f-83\"]{font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading5734_c3f81f-83 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading5734_c3f81f-83[data-kb-block=\"kb-adv-heading5734_c3f81f-83\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading5734_c3f81f-83 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading5734_c3f81f-83[data-kb-block=\"kb-adv-heading5734_c3f81f-83\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading5734_c3f81f-83 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading5734_c3f81f-83\">This is the most direct and common form of psychological attack. Scammers use VoIP (Voice over Internet Protocol) services to spoof phone numbers, combined with social engineering techniques to create &quot;shock calls&quot; that cause victims to panic and lose their rational control.<\/p>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading5734_07f984-1d, .wp-block-kadence-advancedheading.kt-adv-heading5734_07f984-1d[data-kb-block=\"kb-adv-heading5734_07f984-1d\"]{font-size:var(--global-kb-font-size-md, 1.25rem);font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading5734_07f984-1d mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading5734_07f984-1d[data-kb-block=\"kb-adv-heading5734_07f984-1d\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading5734_07f984-1d img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading5734_07f984-1d[data-kb-block=\"kb-adv-heading5734_07f984-1d\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading5734_07f984-1d wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading5734_07f984-1d\"><a href=\"https:\/\/chongluadao.vn\/blog\/en\/luadaosms\/\" data-type=\"link\" data-id=\"https:\/\/chongluadao.vn\/blog\/luadaosms\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>2. Scams via text messages, social media, and malicious links.<\/strong><\/a><\/p>\n\n\n\n<p>This is a scam that takes advantage of the elderly&#039;s lack of knowledge about cybersecurity and simple internet usage habits. The scammers attack through daily communication channels such as SMS, Zalo, Facebook Messenger.<\/p>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading5734_5ccae2-5d, .wp-block-kadence-advancedheading.kt-adv-heading5734_5ccae2-5d[data-kb-block=\"kb-adv-heading5734_5ccae2-5d\"]{font-size:var(--global-kb-font-size-md, 1.25rem);font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading5734_5ccae2-5d mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading5734_5ccae2-5d[data-kb-block=\"kb-adv-heading5734_5ccae2-5d\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading5734_5ccae2-5d img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading5734_5ccae2-5d[data-kb-block=\"kb-adv-heading5734_5ccae2-5d\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading5734_5ccae2-5d wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading5734_5ccae2-5d\"><a href=\"https:\/\/chongluadao.vn\/blog\/en\/luadaotainha\/\" target=\"_blank\" data-type=\"link\" data-id=\"https:\/\/chongluadao.vn\/blog\/luadaotainha\" rel=\"noreferrer noopener\"><strong>3. Direct fraud at the place of residence (Impersonating a public service worker\/official)<\/strong><\/a><\/p>\n\n\n\n<p>Unlike online fraud, this form carries double risks: loss of property and direct threat to the security and physical safety of the elderly in their own homes.<\/p>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading5734_896331-4f, .wp-block-kadence-advancedheading.kt-adv-heading5734_896331-4f[data-kb-block=\"kb-adv-heading5734_896331-4f\"]{font-size:var(--global-kb-font-size-md, 1.25rem);font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading5734_896331-4f mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading5734_896331-4f[data-kb-block=\"kb-adv-heading5734_896331-4f\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading5734_896331-4f img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading5734_896331-4f[data-kb-block=\"kb-adv-heading5734_896331-4f\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading5734_896331-4f wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading5734_896331-4f\"><a href=\"https:\/\/chongluadao.vn\/blog\/en\/luadaodautu\/\" target=\"_blank\" data-type=\"link\" data-id=\"https:\/\/chongluadao.vn\/blog\/luadaodautu\" rel=\"noreferrer noopener\"><strong>4. Financial, investment, and health scams (Multi-level marketing schemes)<\/strong><\/a><\/p>\n\n\n\n<p>These tactics target the two biggest psychological vulnerabilities of the elderly: the fear of illness and the desire for additional income to avoid depending on their children and grandchildren.<\/p>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading5734_2bc7de-df, .wp-block-kadence-advancedheading.kt-adv-heading5734_2bc7de-df[data-kb-block=\"kb-adv-heading5734_2bc7de-df\"]{font-size:var(--global-kb-font-size-md, 1.25rem);font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading5734_2bc7de-df mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading5734_2bc7de-df[data-kb-block=\"kb-adv-heading5734_2bc7de-df\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading5734_2bc7de-df img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading5734_2bc7de-df[data-kb-block=\"kb-adv-heading5734_2bc7de-df\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading5734_2bc7de-df wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading5734_2bc7de-df\"><a href=\"https:\/\/chongluadao.vn\/blog\/en\/luadaotuthien\/\" target=\"_blank\" data-type=\"link\" data-id=\"https:\/\/chongluadao.vn\/blog\/luadaotuthien\" rel=\"noreferrer noopener\"><strong>5. Fraud under the guise of charity, religion, and social welfare.<\/strong><\/a><\/p>\n\n\n\n<p>This tactic is particularly insidious because it exploits the benevolent nature, the desire to accumulate merit, and the empathy of the elderly. The perpetrators turn the victims&#039; kindness into a tool for their own gain.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Preventing fraud against the elderly.<\/h2>\n\n\n\n<p>To build a strong psychological &quot;firewall&quot; for the elderly, international cybersecurity and banking experts have compiled a simple but effective set of action guidelines: <a href=\"https:\/\/chongluadao.vn\/blog\/en\/quytac5khong3nen\/\" target=\"_blank\" data-type=\"link\" data-id=\"https:\/\/chongluadao.vn\/blog\/quytac5khong3nen\" rel=\"noreferrer noopener\"><strong>The &quot;5 Don&#039;ts - 3 Dos&quot; Code of Conduct\u201c<\/strong><\/a>. This serves as a guide to help elderly people remain calm and handle any doubtful situation correctly.<\/p>\n\n\n<style>.kb-image5734_ea4c21-90.kb-image-is-ratio-size, .kb-image5734_ea4c21-90 .kb-image-is-ratio-size{max-width:766px;width:100%;}.wp-block-kadence-column > .kt-inside-inner-col > .kb-image5734_ea4c21-90.kb-image-is-ratio-size, .wp-block-kadence-column > .kt-inside-inner-col > .kb-image5734_ea4c21-90 .kb-image-is-ratio-size{align-self:unset;}.kb-image5734_ea4c21-90 figure{max-width:766px;}.kb-image5734_ea4c21-90 .image-is-svg, .kb-image5734_ea4c21-90 .image-is-svg img{width:100%;}.kb-image5734_ea4c21-90 .kb-image-has-overlay:after{opacity:0.3;}<\/style>\n<div class=\"wp-block-kadence-image kb-image5734_ea4c21-90\"><figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"2752\" height=\"1536\" src=\"https:\/\/chongluadao.vn\/blog\/wp-content\/uploads\/2026\/01\/Hinh-7-Cam-nang-CLD-5-khong-3-nen.png\" alt=\"\" class=\"kb-img wp-image-5737\"\/><\/figure><\/div>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading5734_5cb810-8f, .wp-block-kadence-advancedheading.kt-adv-heading5734_5cb810-8f[data-kb-block=\"kb-adv-heading5734_5cb810-8f\"]{font-size:var(--global-kb-font-size-md, 1.25rem);font-style:normal;color:#ff0000;}.wp-block-kadence-advancedheading.kt-adv-heading5734_5cb810-8f mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading5734_5cb810-8f[data-kb-block=\"kb-adv-heading5734_5cb810-8f\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading5734_5cb810-8f img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading5734_5cb810-8f[data-kb-block=\"kb-adv-heading5734_5cb810-8f\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading5734_5cb810-8f wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading5734_5cb810-8f\"><strong>The &quot;5 Don&#039;ts&quot; Rule: A set of forbidden practices to protect information and asset security.<\/strong><\/p>\n\n\n<style>.wp-block-kadence-iconlist.kt-svg-icon-list-items5734_566231-70:not(.this-stops-third-party-issues){margin-top:0px;margin-bottom:0px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items5734_566231-70 ul.kt-svg-icon-list:not(.this-prevents-issues):not(.this-stops-third-party-issues):not(.tijsloc){margin-top:0px;margin-right:0px;margin-bottom:var(--global-kb-spacing-sm, 1.5rem);margin-left:0px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items5734_566231-70 ul.kt-svg-icon-list{grid-row-gap:5px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items5734_566231-70 ul.kt-svg-icon-list .kt-svg-icon-list-item-wrap .kt-svg-icon-list-single{margin-right:10px;}.kt-svg-icon-list-items5734_566231-70 ul.kt-svg-icon-list .kt-svg-icon-list-level-0 .kt-svg-icon-list-single svg{font-size:20px;}<\/style>\n<div class=\"wp-block-kadence-iconlist kt-svg-icon-list-items kt-svg-icon-list-items5734_566231-70 kt-svg-icon-list-columns-1 alignnone\"><ul class=\"kt-svg-icon-list\"><style>.kt-svg-icon-list-item-5734_f6b712-46 .kt-svg-icon-list-single{color:#ff0000 !important;}.kt-svg-icon-list-item-5734_f6b712-46 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-5734_f6b712-46 kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-ic_x kt-svg-icon-list-single\"><svg viewbox=\"0 0 8 8\"  fill=\"currentColor\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M4 0c-2.21 0-4 1.79-4 4s1.79 4 4 4 4-1.79 4-4-1.79-4-4-4zm-1.5 1.78l1.5 1.5 1.5-1.5.72.72-1.5 1.5 1.5 1.5-.72.72-1.5-1.5-1.5 1.5-.72-.72 1.5-1.5-1.5-1.5.72-.72z\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">DO NOT PROVIDE confidential information<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-5734_69a56b-42 .kt-svg-icon-list-single{color:#ff0000 !important;}.kt-svg-icon-list-item-5734_69a56b-42 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-5734_69a56b-42 kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-ic_x kt-svg-icon-list-single\"><svg viewbox=\"0 0 8 8\"  fill=\"currentColor\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M4 0c-2.21 0-4 1.79-4 4s1.79 4 4 4 4-1.79 4-4-1.79-4-4-4zm-1.5 1.78l1.5 1.5 1.5-1.5.72.72-1.5 1.5 1.5 1.5-.72.72-1.5-1.5-1.5 1.5-.72-.72 1.5-1.5-1.5-1.5.72-.72z\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">DO NOT TRANSFER MONEY because of a phone call.<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-5734_8d4026-04 .kt-svg-icon-list-single{color:#ff0000 !important;}.kt-svg-icon-list-item-5734_8d4026-04 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-5734_8d4026-04 kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-ic_x kt-svg-icon-list-single\"><svg viewbox=\"0 0 8 8\"  fill=\"currentColor\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M4 0c-2.21 0-4 1.79-4 4s1.79 4 4 4 4-1.79 4-4-1.79-4-4-4zm-1.5 1.78l1.5 1.5 1.5-1.5.72.72-1.5 1.5 1.5 1.5-.72.72-1.5-1.5-1.5 1.5-.72-.72 1.5-1.5-1.5-1.5.72-.72z\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">DO NOT CLICK on suspicious links.<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-5734_e276dd-12 .kt-svg-icon-list-single{color:#ff0000 !important;}.kt-svg-icon-list-item-5734_e276dd-12 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-5734_e276dd-12 kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-ic_x kt-svg-icon-list-single\"><svg viewbox=\"0 0 8 8\"  fill=\"currentColor\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M4 0c-2.21 0-4 1.79-4 4s1.79 4 4 4 4-1.79 4-4-1.79-4-4-4zm-1.5 1.78l1.5 1.5 1.5-1.5.72.72-1.5 1.5 1.5 1.5-.72.72-1.5-1.5-1.5 1.5-.72-.72 1.5-1.5-1.5-1.5.72-.72z\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">DO NOT SIGN any documents until you fully understand them.<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-5734_65bda6-bf .kt-svg-icon-list-single{color:#ff0000 !important;}.kt-svg-icon-list-item-5734_65bda6-bf .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-5734_65bda6-bf kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-ic_x kt-svg-icon-list-single\"><svg viewbox=\"0 0 8 8\"  fill=\"currentColor\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M4 0c-2.21 0-4 1.79-4 4s1.79 4 4 4 4-1.79 4-4-1.79-4-4-4zm-1.5 1.78l1.5 1.5 1.5-1.5.72.72-1.5 1.5 1.5 1.5-.72.72-1.5-1.5-1.5 1.5-.72-.72 1.5-1.5-1.5-1.5.72-.72z\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">NO HIDING (No silence)<\/span><\/li>\n<\/ul><\/div>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading5734_0c5455-d4, .wp-block-kadence-advancedheading.kt-adv-heading5734_0c5455-d4[data-kb-block=\"kb-adv-heading5734_0c5455-d4\"]{font-size:var(--global-kb-font-size-md, 1.25rem);font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading5734_0c5455-d4 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading5734_0c5455-d4[data-kb-block=\"kb-adv-heading5734_0c5455-d4\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading5734_0c5455-d4 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading5734_0c5455-d4[data-kb-block=\"kb-adv-heading5734_0c5455-d4\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading5734_0c5455-d4 wp-block-kadence-advancedheading has-green-color has-text-color\" data-kb-block=\"kb-adv-heading5734_0c5455-d4\"><strong>The &quot;3 Shoulds&quot; Rule: Principles of action for verifying and controlling a situation.<\/strong><\/p>\n\n\n<style>.wp-block-kadence-iconlist.kt-svg-icon-list-items5734_125249-60:not(.this-stops-third-party-issues){margin-top:0px;margin-bottom:0px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items5734_125249-60 ul.kt-svg-icon-list:not(.this-prevents-issues):not(.this-stops-third-party-issues):not(.tijsloc){margin-top:0px;margin-right:0px;margin-bottom:var(--global-kb-spacing-sm, 1.5rem);margin-left:0px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items5734_125249-60 ul.kt-svg-icon-list{grid-row-gap:5px;}.wp-block-kadence-iconlist.kt-svg-icon-list-items5734_125249-60 .kb-svg-icon-wrap{color:#198754;}.wp-block-kadence-iconlist.kt-svg-icon-list-items5734_125249-60 ul.kt-svg-icon-list .kt-svg-icon-list-item-wrap .kt-svg-icon-list-single{margin-right:10px;}.kt-svg-icon-list-items5734_125249-60 ul.kt-svg-icon-list .kt-svg-icon-list-level-0 .kt-svg-icon-list-single svg{font-size:20px;}<\/style>\n<div class=\"wp-block-kadence-iconlist kt-svg-icon-list-items kt-svg-icon-list-items5734_125249-60 kt-svg-icon-list-columns-1 alignnone\"><ul class=\"kt-svg-icon-list\"><style>.kt-svg-icon-list-item-5734_e90344-91 .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-5734_e90344-91 kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fas_check-circle kt-svg-icon-list-single\"><svg viewbox=\"0 0 512 512\"  fill=\"currentColor\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M504 256c0 136.967-111.033 248-248 248S8 392.967 8 256 119.033 8 256 8s248 111.033 248 248zM227.314 387.314l184-184c6.248-6.248 6.248-16.379 0-22.627l-22.627-22.627c-6.248-6.249-16.379-6.249-22.628 0L216 308.118l-70.059-70.059c-6.248-6.248-16.379-6.248-22.628 0l-22.627 22.627c-6.248 6.248-6.248 16.379 0 22.627l104 104c6.249 6.249 16.379 6.249 22.628.001z\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">You should apply the &quot;10-minute rule&quot;.\u201c<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-5734_27bc89-8d .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-5734_27bc89-8d kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fas_check-circle kt-svg-icon-list-single\"><svg viewbox=\"0 0 512 512\"  fill=\"currentColor\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M504 256c0 136.967-111.033 248-248 248S8 392.967 8 256 119.033 8 256 8s248 111.033 248 248zM227.314 387.314l184-184c6.248-6.248 6.248-16.379 0-22.627l-22.627-22.627c-6.248-6.249-16.379-6.249-22.628 0L216 308.118l-70.059-70.059c-6.248-6.248-16.379-6.248-22.628 0l-22.627 22.627c-6.248 6.248-6.248 16.379 0 22.627l104 104c6.249 6.249 16.379 6.249 22.628.001z\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">You should save an &quot;Emergency Contact List&quot;.\u201c<\/span><\/li>\n\n\n<style>.kt-svg-icon-list-item-5734_d59b09-0f .kt-svg-icon-list-text mark.kt-highlight{background-color:unset;font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}<\/style>\n<li class=\"wp-block-kadence-listitem kt-svg-icon-list-item-wrap kt-svg-icon-list-item-5734_d59b09-0f kt-svg-icon-list-level-1\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fas_check-circle kt-svg-icon-list-single\"><svg viewbox=\"0 0 512 512\"  fill=\"currentColor\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><path d=\"M504 256c0 136.967-111.033 248-248 248S8 392.967 8 256 119.033 8 256 8s248 111.033 248 248zM227.314 387.314l184-184c6.248-6.248 6.248-16.379 0-22.627l-22.627-22.627c-6.248-6.249-16.379-6.249-22.628 0L216 308.118l-70.059-70.059c-6.248-6.248-16.379-6.248-22.628 0l-22.627 22.627c-6.248 6.248-6.248 16.379 0 22.627l104 104c6.249 6.249 16.379 6.249 22.628.001z\"\/><\/svg><\/span><span class=\"kt-svg-icon-list-text\">Regular financial checks are recommended.<\/span><\/li>\n<\/ul><\/div>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading5734_efb7ba-88, .wp-block-kadence-advancedheading.kt-adv-heading5734_efb7ba-88[data-kb-block=\"kb-adv-heading5734_efb7ba-88\"]{font-size:var(--global-kb-font-size-md, 1.25rem);font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading5734_efb7ba-88 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading5734_efb7ba-88[data-kb-block=\"kb-adv-heading5734_efb7ba-88\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading5734_efb7ba-88 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading5734_efb7ba-88[data-kb-block=\"kb-adv-heading5734_efb7ba-88\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading5734_efb7ba-88 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading5734_efb7ba-88\"><strong>Most importantly, the core &quot;mantra&quot; to break through all tricks:<\/strong><\/p>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading5734_f0c2cd-33, .wp-block-kadence-advancedheading.kt-adv-heading5734_f0c2cd-33[data-kb-block=\"kb-adv-heading5734_f0c2cd-33\"]{max-width:642px;margin-right:auto;margin-left:auto;text-align:center;font-size:var(--global-kb-font-size-md, 1.25rem);font-style:normal;border-top-left-radius:20px;border-bottom-right-radius:20px;}.wp-block-kadence-advancedheading.kt-adv-heading5734_f0c2cd-33 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading5734_f0c2cd-33[data-kb-block=\"kb-adv-heading5734_f0c2cd-33\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading5734_f0c2cd-33 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading5734_f0c2cd-33[data-kb-block=\"kb-adv-heading5734_f0c2cd-33\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading5734_f0c2cd-33 wp-block-kadence-advancedheading has-white-color has-text-color has-orange-background-color has-background\" data-kb-block=\"kb-adv-heading5734_f0c2cd-33\"><strong>All urgent legal and financial matters can never be resolved simply over the phone.<\/strong><\/p>","protected":false},"excerpt":{"rendered":"<p>Currently, scammers are taking advantage of the elderly&#039;s anxiety about illness, their desire for extra income, and their kindness to carry out many sophisticated scams. In addition to online scams, they also commit direct scams at home by impersonating [\u2026]<span class=\"screen-reader-text\"> from Scams targeting the elderly<\/span><\/a><\/p>","protected":false},"author":3,"featured_media":5739,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[7,10],"tags":[],"class_list":["post-5734","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-canh-bao-pho-bien","category-chieu-tro-lua-dao-pho-bien"],"_links":{"self":[{"href":"https:\/\/chongluadao.vn\/blog\/en\/wp-json\/wp\/v2\/posts\/5734","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/chongluadao.vn\/blog\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/chongluadao.vn\/blog\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/chongluadao.vn\/blog\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/chongluadao.vn\/blog\/en\/wp-json\/wp\/v2\/comments?post=5734"}],"version-history":[{"count":1,"href":"https:\/\/chongluadao.vn\/blog\/en\/wp-json\/wp\/v2\/posts\/5734\/revisions"}],"predecessor-version":[{"id":5740,"href":"https:\/\/chongluadao.vn\/blog\/en\/wp-json\/wp\/v2\/posts\/5734\/revisions\/5740"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/chongluadao.vn\/blog\/en\/wp-json\/wp\/v2\/media\/5739"}],"wp:attachment":[{"href":"https:\/\/chongluadao.vn\/blog\/en\/wp-json\/wp\/v2\/media?parent=5734"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/chongluadao.vn\/blog\/en\/wp-json\/wp\/v2\/categories?post=5734"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/chongluadao.vn\/blog\/en\/wp-json\/wp\/v2\/tags?post=5734"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}