Digital Security 101
![Illustration of a piece of ID with a keyhole icon for a face, on top of a wallet to symbolize the cost of identity theft](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/66bb7a372e2e396eb8c25e5b_66bb7a011823c6b25ba27e84_How-does-identity-theft-insurance-work-lead-image.webp)
Identity Theft Insurance Coverage, Limits, and Exclusions
Identity theft insurance helps reimburse stolen funds, legal fees, and other recovery costs associated with ID fraud. Coverage may vary by plan.
![Illustration of the Chrome logo casting a shadow in the shape of a crossed-out circle](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/67a4f966f6dca7e10b7b5539_67a4f9239abdea3a4cb13e67_How%20to%20block%20ads%20on%20Chrome.webp)
How To Block Ads on Chrome (Android, iPhone, and Desktop)
Google Chrome includes built-in tools to help block some ads and pop-ups — but a third-party ad blocker is a better bet for an ad-free browsing experience.
![An illustration of a laptop in the shape of a folder with the image of a skull on its top, symbolizing a computer virus](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/651b44f9be1e5d44ce4017ac_651b449ccafee687e06bfa1a_How%20to%20detect%20malware%20on%20your%20computer%20and%20phone.webp)
How To Detect Malware on Your Computer or Phone
Hackers only need a minute to wreak havoc on your finances and identity. Learn how to detect malware quickly and shut down cybercriminals.
![Illustration of an intruder passing through what seems like a life-size iPhone where its screen is a door](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/63c70d8ab4316f4fc812fab4_Can%20Someone%20Hack%20My%20iPhone.png)
Can Someone Hack My iPhone? How To Tell & What To Do
iPhones can’t be “hacked” in the traditional sense — but scammers have found numerous ways to access your data, photos, Apple ID, and other accounts.
![Illustration of a hand pulling a tiny hacker out of a smartphone](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6557cc6c9db4fdbbb6858a46_6557cc1c47a955094a771aa3_How%20to%20remove%20a%20hacker%20from%20my%20phone.webp)
Answered: How To Remove a Hacker From Your Smartphone
Deleting suspicious apps, resetting your device, and recovering hacked accounts are among the best ways to remove a hacker from your smartphone.
![Illustration of a laptop with bars over the screen and tentacles reaching out as if there is a virus being contained inside.](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657ab6ac7aa6a70ac7a1be6_65495c57a09741392586e313_65495b20dd64fa0a25ab3d0b_Do%2520you%2520need%2520antivirus%2520software_.webp)
Do You Need Antivirus? These Questions Can Help You Decide
With advances in built-in tools, many security experts claim you don’t need a third-party antivirus software provider. But that’s not the case for everyone.
![Illustration of a magnifying glass with footprints](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/64bf0c878e8b896cb3b1e56b_Track%20Down%20Someone%20Who%20Scammed%20You.webp)
How To Track Down Someone Who Scammed You (and What To Do Next)
Did you get scammed and want to find out who did it? Here’s everything you need to know about tracking down scammers (and what your options are).
![Illustration of a smartphone surrounded by arrows in the style of the USPhoneBook.com logo](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/667ee16870a616cdfbae8e86_667eddb9268d5e422184ec7b_USPhoneBook%20Opt%20Out.webp)
USPhoneBook Opt Out Guide: How To Remove Your Info
USPhoneBook.com collects and shares personal data, which can put you at risk of harassment or even identity theft — unless you remove your information.
text
![Illustration of a text message speech bubble with a money sign inside symbolizing a debt relief scam call](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657aadf08ad9eacdf9d6307_650099d708823dca6069ff9f_6500993965eedb5971be95dd_Credit%2520National%2520assist%2520scam%2520calls.webp)
How To Avoid the Credit National Assist Debt Relief Scam
Are you getting calls from “Credit National Assist?” Learn how to spot this common phone scam and protect yourself from fraudsters.
![Identity theft credit repair – illustration](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/649ca5c3b252a5d762774935_How%20to%20Repair%20Your%20Credit%20After%20Identity%20Theft.png)
How To Repair Your Credit After Identity Theft
Did an identity thief ruin your credit with fraudulent charges? Here’s what you can do to repair your credit score after identity theft.
![An illustration of a person chasing airborne dollar coins with a butterfly net](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657ab6b5a82d972a2b2791b_64921881a99ec2bad22f17a4_Credit-repair-scams-header.webp)
Credit Repair Scams: New Scam Types & How To Avoid Them
In credit repair scams, companies or individuals promise to improve your credit score using illegitimate means. Learn how to give these a wide berth.
![Illustration of a credit score combined with an alarm clock](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657ab66934209a3f25939db_642f1ee06310337798b0712c_How%2520Long%2520Does%2520It%2520Take%2520to%2520Repair%2520Credit.png)
How Long Does It Take To Repair Your Credit? (How To Do It)
Saddled with a low credit score due to fraud or missed payments? Learn how long it takes to repair credit (and how to do it the right way).
![Illustration of a credit score with a warning sign in the middle](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6408cf442938de0017490498_Credit%20Score%20Scams.png)
Are Free Credit Reports Safe? How To Avoid Credit Score Scams
Scammers use fake credit score sites and repair agencies to steal your personal info. Learn how to spot (and avoid) the latest credit score scams.
![Illustration showing the prohibition sign on an email icon](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6384cdf669578c810dd86028_how-to-stop-spam-emails-header.png)
How To Stop Spam Emails (New Concise Guide)
If you simply opened a spam email, you may be in the clear. But if you clicked on a link, downloaded an attachment, or responded, be cautious.