Digital Security 101
![Illustration of a piece of ID with a keyhole icon for a face, on top of a wallet to symbolize the cost of identity theft](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/66bb7a372e2e396eb8c25e5b_66bb7a011823c6b25ba27e84_How-does-identity-theft-insurance-work-lead-image.webp)
Identity Theft Insurance Coverage, Limits, and Exclusions
Identity theft insurance helps reimburse stolen funds, legal fees, and other recovery costs associated with ID fraud. Coverage may vary by plan.
![Illustration of the Chrome logo casting a shadow in the shape of a crossed-out circle](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/67a4f966f6dca7e10b7b5539_67a4f9239abdea3a4cb13e67_How%20to%20block%20ads%20on%20Chrome.webp)
How To Block Ads on Chrome (Android, iPhone, and Desktop)
Google Chrome includes built-in tools to help block some ads and pop-ups — but a third-party ad blocker is a better bet for an ad-free browsing experience.
![An illustration of a laptop in the shape of a folder with the image of a skull on its top, symbolizing a computer virus](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/651b44f9be1e5d44ce4017ac_651b449ccafee687e06bfa1a_How%20to%20detect%20malware%20on%20your%20computer%20and%20phone.webp)
How To Detect Malware on Your Computer or Phone
Hackers only need a minute to wreak havoc on your finances and identity. Learn how to detect malware quickly and shut down cybercriminals.
![Illustration of an intruder passing through what seems like a life-size iPhone where its screen is a door](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/63c70d8ab4316f4fc812fab4_Can%20Someone%20Hack%20My%20iPhone.png)
Can Someone Hack My iPhone? How To Tell & What To Do
iPhones can’t be “hacked” in the traditional sense — but scammers have found numerous ways to access your data, photos, Apple ID, and other accounts.
![Illustration of a hand pulling a tiny hacker out of a smartphone](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6557cc6c9db4fdbbb6858a46_6557cc1c47a955094a771aa3_How%20to%20remove%20a%20hacker%20from%20my%20phone.webp)
Answered: How To Remove a Hacker From Your Smartphone
Deleting suspicious apps, resetting your device, and recovering hacked accounts are among the best ways to remove a hacker from your smartphone.
![Illustration of a laptop with bars over the screen and tentacles reaching out as if there is a virus being contained inside.](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657ab6ac7aa6a70ac7a1be6_65495c57a09741392586e313_65495b20dd64fa0a25ab3d0b_Do%2520you%2520need%2520antivirus%2520software_.webp)
Do You Need Antivirus? These Questions Can Help You Decide
With advances in built-in tools, many security experts claim you don’t need a third-party antivirus software provider. But that’s not the case for everyone.
![Illustration of a magnifying glass with footprints](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/64bf0c878e8b896cb3b1e56b_Track%20Down%20Someone%20Who%20Scammed%20You.webp)
How To Track Down Someone Who Scammed You (and What To Do Next)
Did you get scammed and want to find out who did it? Here’s everything you need to know about tracking down scammers (and what your options are).
![Illustration of a smartphone surrounded by arrows in the style of the USPhoneBook.com logo](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/667ee16870a616cdfbae8e86_667eddb9268d5e422184ec7b_USPhoneBook%20Opt%20Out.webp)
USPhoneBook Opt Out Guide: How To Remove Your Info
USPhoneBook.com collects and shares personal data, which can put you at risk of harassment or even identity theft — unless you remove your information.
text
![Illustration of a phone's screen being taken over by pop-up ads, as if to show that they may contain spam](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657aad908ad9eacdf9d5a42_65a9c9b9dea43dd0e62ab0be_65a9c96cbe493c17f05a45c4_How%2520to%2520stop%2520pop-up%2520ads%2520on%2520Android%2520phones.webp)
10 Online Survey Scams and What They Hope You’ll Fall For
Scammers send fake surveys via spam texts, calls, or emails touting products and rewards — all to harvest sensitive information.
![Illustration of an hourglass with coins instead of sand inside, symbolizing the short-term nature of payday loans.](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/65305ef6137bc4a37ee2f09a_65304d2a28193f7f2d279fef_Payday%20Loan%20Scams.webp)
5 Payday Loan Scams You Didn't Know About (Until Now)
Payday loans can be helpful when you need money fast — but how do you know if they’re legitimate? Learn the warning signs of common payday loan scams.
![Does a VPN protect you from hackers? (Illustration)](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657ab6a5a82d972a2b27786_64b80a30bf117ac8f3ade6f5_Does%2520a%2520VPN%2520Protect%2520You%2520From%2520Hackers.webp)
Does a VPN Protect You From Hackers? What To Know
A virtual private network (VPN) alone won’t keep you safe from hackers and online scammers. Learn how to protect yourself from online threats.
![Illustration of a stack of Bumble logos with a broken heart in the middle of each.](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/64b6fc79180e30bab2ac9e5c_How%20to%20Spot%20a%20Bumble%20Scammer.png)
How To Spot a Bumble Scammer: Avoid These 6 Bumble Scams
Dating and romance scammers have invaded Bumble. Learn how to spot a Bumble scammer and avoid the latest online dating scams before it’s too late.
![An illustration of a tilting phone displaying an abstract social media app icon](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657ab652aabaee605735b47_6384c59b1a6431afed885c7d_How-to-protect-your-personal-information-on-social-header.png)
How To Protect Your Personal Information on Social Media
Using social media is often a trade-off between connection and protection. But with a few small changes you can keep your personal information secure.
![Illustration of the Bark, Qustodio, and Aura logos on three small balls.](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/65c662df1682827a56730d70_65c66006f4340f791b6754c1_Qustodio%20vs.%20Bark.webp)
Qustodio vs. Bark: How To Choose Which One Is Right For You
As two of the top parental controls options, Qustodio and Bark share many of the same features — but there are specific differences you should be aware of.