Digital Security 101
![Illustration of a piece of ID with a keyhole icon for a face, on top of a wallet to symbolize the cost of identity theft](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/66bb7a372e2e396eb8c25e5b_66bb7a011823c6b25ba27e84_How-does-identity-theft-insurance-work-lead-image.webp)
Identity Theft Insurance Coverage, Limits, and Exclusions
Identity theft insurance helps reimburse stolen funds, legal fees, and other recovery costs associated with ID fraud. Coverage may vary by plan.
![Illustration of the Chrome logo casting a shadow in the shape of a crossed-out circle](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/67a4f966f6dca7e10b7b5539_67a4f9239abdea3a4cb13e67_How%20to%20block%20ads%20on%20Chrome.webp)
How To Block Ads on Chrome (Android, iPhone, and Desktop)
Google Chrome includes built-in tools to help block some ads and pop-ups — but a third-party ad blocker is a better bet for an ad-free browsing experience.
![Illustration of a laptop screen with a question mark](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/66ce6607a74738f68b2c398e_66ce6588c1897bd85aea6dd7_What%20to%20do%20if%20you%27ve%20been%20hacked.webp)
What To Do If You Were Hacked: How To Recover Hacked Accounts
As soon as you see signs that your accounts or devices have been hacked, act quickly to remove malware, regain access, and minimize the damage.
![Illustration of a smartphone with a pirate flag coming out of with the Android logo in place of the classic skull and bones](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/65317b89e22f15ab56402e6b_65317a81c10cc14fb5459787_How%20to%20remove%20viruses%20from%20Android.webp)
How To Remove a Virus From Your Android Phone
Worried your Android phone or device has been infected? Follow these step-by-step instructions on how to identify and remove Android malware.
![Illustration of a stack of coins as if to represent mounting debt](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/66bb7a2223b18d08f0777565_66bb799f5c2caa46c02e4ff4_Debt-in-myname-but-not-mine-lead-image.webp)
How To Dispute Debts in My Name (That Aren’t Mine)
Send a dispute letter to the collector within 30 days, dispute inaccuracies with credit bureaus, and request that the collector stop contacting you.
![Illustration of a pair of binoculars next to a credit score](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6349b749a304d774b493ffc9_What%20is%20Credit%20Monitoring.png)
What is Credit Monitoring? Do You Really Need It?
Credit monitoring is one of the best ways to protect your credit score and catch the early warning signs of fraud — but only if you use the right service.
![Illustration of a pixelated cursor standing upright on top of a bank card](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/659f13fe35bde7d8ab9d14b7_659f1332ae7b065ab9c5757a_What%20to%20do%20if%20your%20bank%20account%20is%20hacked.webp)
My Bank Account Has Been Hacked. Can I Get My Money Back?
Notify your bank to report any unauthorized transactions, start an investigation. Banks generally refund fraudulent transactions if reported promptly.
![An illustration of an ID card where the person in the photo is holding a shield](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6349aa2b0fa06b2df7ae2a64_Best%20identity%20theft%20protection%20services.png)
How To Protect Yourself From Identity Theft
The best way to protect yourself from identity theft is to limit the information fraudsters can find about you — after that, it’s all about playing defense.
text
![Illustration of a padlock casting a shadow in the shape of a profile icon](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657aada4bc8b269f0ced337_65d65d024bb7903d562a0f3b_How%2520to%2520properly%2520set%2520up%2520your%2520social%2520media%2520privacy%2520settings.png)
How To Properly Set Up Your Social Media Privacy Settings
Scammers, stalkers, and hackers can use public information on your social media profiles to target you — unless you change your privacy settings.
![Illustration of a smartphone with a location marker on it](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/65cea36aaf52835724f3fd3f_65cea324337460e1ca6cdf35_How%20can%20someone%20track%20my%20location.webp)
How Can Someone Track My Location? (How To Stop Them)
Scammers and stalkers can track your location by using spyware or legal apps on your phone — unless you follow these steps to keep your location private.
![Illustration of a briefcase with the LinkedIn logo embossed on the front](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657aade0603147425ad9f36_65ce7ec0748babb80180caae_65ce7d7b723e2e96494de040_How%2520to%2520spot%2520LinkedIn%2520Job%2520scams.webp)
How To Spot LinkedIn Job Scams (11 Warning Signs)
Scammers use LinkedIn to post fake job listings, impersonate recruiters, and trick you into giving them sensitive information or sending money.
![Illustration of a smartphone with virus symbols all over the screen](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/65ce77d2ba132385975a63f2_65ce765e5492920b5309edae_How%20to%20know%20if%20your%20phone%20has%20a%20virus.webp)
How To Know If Your Phone Has a Virus
Unfamiliar apps and strange phone behavior are a few of the warning signs that your device has been infected and you need to take action immediately.
![Illustration of the IDShield logo casting a shadow in the shape of a question mark](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/65ce74ea074a2b822792e552_65ce723fd1f18ed1bd92cd84_Is%20IDShield%20Worth%20It.webp)
Is IDShield Worth It? What To Know Before Buying
IDShield claims to provide all-in-one protection against identity theft, fraud, and hacking — but has issues that could leave you vulnerable.
![Illustration of the LifeLock logo with a tag hanging off of it with the AARP logo](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/65ce6ffaed1f04b84b25f1cc_65ce6e9694e2ee0f742553d2_Is%20AARP%20Identity%20Theft%20Protection%20worth%20it.webp)
AARP Identity Theft Protection Review: Is It Worth It?
AARP offers a discounted version of LifeLock to its customers — but with limitations that could leave you vulnerable to hacking, identity theft, and fraud.