Digital Security 101
![Illustration of a piece of ID with a keyhole icon for a face, on top of a wallet to symbolize the cost of identity theft](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/66bb7a372e2e396eb8c25e5b_66bb7a011823c6b25ba27e84_How-does-identity-theft-insurance-work-lead-image.webp)
Identity Theft Insurance Coverage, Limits, and Exclusions
Identity theft insurance helps reimburse stolen funds, legal fees, and other recovery costs associated with ID fraud. Coverage may vary by plan.
![Illustration of the Chrome logo casting a shadow in the shape of a crossed-out circle](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/67a4f966f6dca7e10b7b5539_67a4f9239abdea3a4cb13e67_How%20to%20block%20ads%20on%20Chrome.webp)
How To Block Ads on Chrome (Android, iPhone, and Desktop)
Google Chrome includes built-in tools to help block some ads and pop-ups — but a third-party ad blocker is a better bet for an ad-free browsing experience.
![Illustration of a laptop screen with a question mark](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/66ce6607a74738f68b2c398e_66ce6588c1897bd85aea6dd7_What%20to%20do%20if%20you%27ve%20been%20hacked.webp)
What To Do If You Were Hacked: How To Recover Hacked Accounts
As soon as you see signs that your accounts or devices have been hacked, act quickly to remove malware, regain access, and minimize the damage.
![Illustration of a smartphone with a pirate flag coming out of with the Android logo in place of the classic skull and bones](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/65317b89e22f15ab56402e6b_65317a81c10cc14fb5459787_How%20to%20remove%20viruses%20from%20Android.webp)
How To Remove a Virus From Your Android Phone
Worried your Android phone or device has been infected? Follow these step-by-step instructions on how to identify and remove Android malware.
![Illustration of a stack of coins as if to represent mounting debt](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/66bb7a2223b18d08f0777565_66bb799f5c2caa46c02e4ff4_Debt-in-myname-but-not-mine-lead-image.webp)
How To Dispute Debts in My Name (That Aren’t Mine)
Send a dispute letter to the collector within 30 days, dispute inaccuracies with credit bureaus, and request that the collector stop contacting you.
![Illustration of a pair of binoculars next to a credit score](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6349b749a304d774b493ffc9_What%20is%20Credit%20Monitoring.png)
What is Credit Monitoring? Do You Really Need It?
Credit monitoring is one of the best ways to protect your credit score and catch the early warning signs of fraud — but only if you use the right service.
![Illustration of a pixelated cursor standing upright on top of a bank card](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/659f13fe35bde7d8ab9d14b7_659f1332ae7b065ab9c5757a_What%20to%20do%20if%20your%20bank%20account%20is%20hacked.webp)
My Bank Account Has Been Hacked. Can I Get My Money Back?
Notify your bank to report any unauthorized transactions, start an investigation. Banks generally refund fraudulent transactions if reported promptly.
![An illustration of an ID card where the person in the photo is holding a shield](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6349aa2b0fa06b2df7ae2a64_Best%20identity%20theft%20protection%20services.png)
How To Protect Yourself From Identity Theft
The best way to protect yourself from identity theft is to limit the information fraudsters can find about you — after that, it’s all about playing defense.
text
![Illustration of a chain with one link in the style of a dollar sign](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/65c5045a35d7ae84eeaea927_65c4015a611b420b6da2cf88_Is%20it%20safe%20to%20link%20bank%20accounts.webp)
Is It Safe To Link Bank Accounts? 7 Risks You Need To Know
Is it safe to link bank accounts to other apps and services? Get familiar with the risks to protect your finances from fraudsters.
![An illustration of a key in a speech bubble from both a laptop and phone](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657aad4ffde397f4ad4e869_65eb54d910769d84d4303772_65eb54a215f42fefc1c630d0_What-is-2FA-lead-image.webp)
How Does Two Factor Authentication (2FA) Work?
What is two-factor authentication’s role in keeping you safe from identity theft and financial fraud? It’s critical - and now’s the time to get on board.
![An illustration of a hand holding up a SIM card](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/644c27683fb336807d6c8f8f_What%20Can%20Someone%20Do%20With%20Your%20SIM%20Card.png)
What Can Someone Do With Your SIM Card? (How To Secure It)
A hacked SIM card doesn’t just provide access to your phone number — it can be used to hack almost any online account. Learn how to secure your SIM today.
![Illustration of an iPhone showing a vocal audio signal](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657ab704105853b41f3d9a7_65c3a42a68b7741d9539fcb0_65c3a3907e9b126ed922b3ae_AI%2520Voice%2520Scams.webp)
How To Spot (and Avoid) AI Voice Scams
Fraudsters need just three seconds of audio to “clone” a voice and use it to scam you. Avoid the latest AI voice scams by learning the warning signs.
![Illustration of an iPhone with a broken jail cell on the screen.](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657aad51da02f3e75c347d3_65c39fe05c84f570cd58656e_65c39f555d36e11cebed2150_what%2520does%2520jailbreaking%2520an%2520iPhone%2520do.webp)
What Does Jailbreaking an iPhone Do? (Risks and Benefits)
Jailbreaking gives your iPhone more customization options — but at the cost of its security and your safety. Here are the risks you should know about.
![Spousal identity theft: Header image](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657aad9e5d0d242d3948642_634daf0c9108fa4419c9fbd1_Spousal%2520Identity%2520Theft.png)
Understanding Spousal Identity Theft and How It Happens
Your spouse knows your credit card numbers, driver's license information, and even your SSN. Can spousal identity theft happen?