Digital Security 101
![Illustration of the Facebook logo on a manhole cover](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/67a2851a5c26f6a321e2383b_67a284bece27e0b7dbdce76b_How%20to%20delete%20your%20Facebook%20account%20And%20all%20of%20its%20data.webp)
How To Delete Your Facebook Account (and All Its Data)
While you can delete (or deactivate) your Facebook account at any time, Meta may hold onto your data for up to another six months afterward.
![Illustration of a text message bubble with a question mark on it](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/67a282791f4c270f7514abec_67a281fc58e79a90355dad5a_Can%20you%20get%20hacked%20by%20responding%20to%20a%20text%20message.webp)
No, You Can't Get Hacked By Responding To a Text Message
While you can’t be hacked simply by responding to a text message, it makes you vulnerable to more serious scams and threats that could put you in danger.
![Illustration of a child on a tablet underneath an arch](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/67882d051b1ae5a70ae43ed2_6788299a49e9282b1a9342e3_The%20best%20apps%20for%20controlling%20your%20child%27s%20screen%20time.webp)
The Best Apps For Controlling Kids’ Screen Time Right Now
Basic screen time limiting apps can help parents take control of how their children use digital devices — but the best apps do even more to keep your kids safe.
![Illustration of a MacBook with a corroded image of the Apple logo on the back](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6788286be33661e32a65345f_67882631f049ca8103d9d88b_How%20to%20check%20for%20viruses%20on%20Mac.webp)
How To Check for Viruses on Your Mac Right Now
You can manually check for viruses on your Mac using built-in tools — or use antivirus software that will dig deeper and root out the worst Mac viruses.
![Illustration of a man looking at a giant shield with an exclamation mark on it](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/678825319433d3828d6ac064_678824f30428477c60bbca2b_What%20to%20do%20if%20you%20receive%20a%20data%20breach%20alert.webp)
What To Do If You Receive a Data Breach Alert
A data breach alert tells you what information was leaked and provides guidance on how to stay safe — but there’s more you can do to protect yourself.
![Illustration of a smartphone with a staircase inside of it](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/67882299d81bc3b6eee5c6a7_6786f985bb1f4bd8036e49fc_What%20to%20do%20if%20your%20phone%20is%20hacked.webp)
Is Your Phone Hacked? Follow These Steps Right Now
Using antivirus software, removing suspicious apps, and checking your app permissions, cache, and accounts can help you quickly shut down hackers.
![Illustration of an open laptop with a print out of a fake website taped over the screen](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/65988c73acc47734ffc4bd5f_65988c0877b008b56b2cb6a3_Fake%20websites.webp)
How To Identify Fake Websites: 11 Warning Signs
Scammers build fake websites to steal your personal information, passwords, and money. Here’s how to identify fake websites before it's too late.
![Illustration of a smartphone with a skull and bones symbol on the back using the Android logo](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6786f8894fa5331d55b58b09_6786f80c741e0328aced39c3_How%20to%20check%20for%20malware%20on%20Androids.webp)
How To Check For Malware on Your Android Device Right Now
Android devices are typically more vulnerable to viruses and malware — luckily, you can scan for and delete malicious apps in a few quick steps.
text
![Illustration of a smartphone with an illustration of a footprint on the screen](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/675b292a2363f5586ef82a03_675b28a5302e0731d330aaa7_How%20to%20check%20your%20digital%20footprint.webp)
How To Check Your Digital Footprint (with Free Scanner)
Your digital footprint can expose you to scams, hacking, and identity theft — unless you take steps to find out what’s in your footprint and stay safe.
![Illustration of a Facebook dislike button casting a shadow in the shape of an exclamation mark.](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/675a28dd59cbf67a8aaef996_675a28ac36f336ed77bda0eb_How%20to%20check%20if%20your%20Facebook%20has%20been%20hacked.webp)
How To Tell If Your Facebook Has Been Hacked Right Now
Facebook has built-in tools that can help you quickly determine if your account has been hacked (and regain access if it has been compromised).
![Illustration of a marionette with online account profile icons attached to the strings.](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/675a2505a4034e43f2aa5a4e_675a24bd9fa3ff7a69f2be39_How%20to%20prevent%20identity%20theft%20online.webp)
How To Prevent Identity Theft Online (and Secure Your Data)
If hackers gain access to your personal info, they can target your most sensitive online accounts — from online banking to your email or social media.
![Illustration of a 3D version of the LifeLock logo with a question mark on it](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/653177759c90377f77754ec3_6531773ed92a2b7c98471001_Is%20LifeLock%20Worth%20It.webp)
Is LifeLock Worth It? What You Need To Know Before You Buy
LifeLock is a well-known name in identity theft protection, though its pricing and past security issues may prompt you to explore other options.
![Illustration of a padlock with a profile logo on it](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/67508d6d184910932706ea42_67508d11a2c2ff17d4a4a4e1_How%20to%20protect%20your%20personal%20information%20online.webp)
How To Protect Your Personal Information Online
While it’s nearly impossible to prevent your personal information from ending up online, you can take steps to secure your accounts before it’s too late.
![Illustration of a hand holding a magnifying glass](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/674fa436374d122c44e31b6e_674fa394c9c4232a8aff7344_How%20to%20remove%20your%20data%20from%20the%20Dark%20Web.webp)
How To Remove Your Information From the Dark Web
While it’s nearly impossible to remove your leaked data from the Dark Web, you can take steps to protect yourself against the consequences of a data leak.