Digital Security 101

How To Block Annoying Ads on YouTube
While you can pay for an ad-free YouTube experience with YouTube Premium, third-party extensions and privacy-focused browsers are often cheaper and better.

How To Block Ads (Easiest Methods For Each Platform)
Ads and pop-ups aren’t just annoying; they can also put your online privacy and safety at risk — luckily you can block them on almost every platform.

How Does Identity Theft Insurance Work? Do You Need It?
Identity theft insurance may be a standalone policy or an add-on with your home insurance. What do these cover? How much do they cost?

Identity Theft Victim Assistance: How To Get Help
Are you the victim of identity theft or fraud? Here are the best resources to help you secure your identity, recover funds, and protect yourself.

My Social Security Number Was Found on the Dark Web. Help!
Most SSNs have been leaked to the Dark Web in recent years — making it more important than ever to learn how to make yourself a less vulnerable target.

How To Detect Malware on Your Computer or Phone
Hackers only need a minute to wreak havoc on your finances and identity. Learn how to detect malware quickly and shut down cybercriminals.

Can Someone Hack My iPhone? How To Tell & What To Do
iPhones can’t be “hacked” in the traditional sense — but scammers have found numerous ways to access your data, photos, Apple ID, and other accounts.

Answered: How To Remove a Hacker From Your Smartphone
Deleting suspicious apps, resetting your device, and recovering hacked accounts are among the best ways to remove a hacker from your smartphone.
text

How To Write a Credit Dispute Letter (and Repair Your Credit)
A credit dispute letter can restore your credit score after identity fraud. Learn when to send the letter and what to include.

How To Prevent SIM Swapping and Port-out Scams
A SIM card swap is a gateway fraud; scammers can easily hijack your phone number — and then steal your identity. Here’s how to prevent SIM swapping.

The Pig Butchering Scam: 10 Warning Signs & How To Avoid It
Pig butchering scams cost victims tens of billions each year. Learn the warning signs of this long-term con to stay safe online.

What Is Cyber Hygiene? 10 Ways to Stay Safe on the Internet
Cyber hygiene comprises a set of habits, tools, and techniques that can protect you from hackers and scammers. Make these 10 habits a part of your regimen.

Amazon Account Hacked? Here's How To Recover It
If someone hacks your Amazon account, they can steal your credit card details or even your identity. Learn how to spot and recover a hacked Amazon account.

Tired of Unknown Callers? How To Uncover (and Block) Them
Talking with unknown callers could expose you to fraud or identity theft. Find out how to stop them and keep your entire family safe.