Digital Security 101

What To Do If Your Personal Information Has Been Compromised
Your personal information — including your email, phone number, and even SSN — can be compromised in a data breach or hack, putting you at risk of fraud.

Why Am I Getting So Many Spam Calls?
Your phone number is often leaked or sold, which makes it easy for scammers to spam you. Block unknown calls and protect your info to cut down on spam.

Types of Google Play Gift Card Scams and How to Report It
Common Google Play gift card scams employ a wide range of techniques — from phishing emails to elaborate social engineering schemes. Here’s what to do.

How To Tell If Your Wi-Fi Is Hacked (And How To Fix It)
Your Wi-Fi may be prone to hacking if you're still using your router's default credentials, haven't updated its firmware, or have remote management on.

What Can Someone Do With Your License Plate Number?
Fraudsters can’t find out your SSN or other sensitive information from your license plate number alone — but they can use it to scam or impersonate you.

How To Spot a Fake Bank Text Message Scam
Fake bank text messages are a form of smishing where fraudsters use texts to impersonate financial institutions and phish for PII.

Is Roblox Safe for Kids? The Parental Safety Guide (2024)
While most in-game experiences on Roblox are tame, there have been cases where it inadvertently exposed kids to harmful content, including gambling.

The 11 Latest Telegram App Scams To Watch Out For
Scammers have flocked to Telegram in recent years. Here’s how to keep your personal information, crypto, and online accounts safe from Telegram app scams.
text

Can Bluetooth Be Hacked? Follow These Bluetooth Security Tips
Hackers and criminals can use your device’s Bluetooth connection to steal data or spy on you. Learn how to boost your Bluetooth security and stay safe.

How To Block Websites on Your iPhone or iPad
Parental controls on Apple devices show you how to block websites on iPhones and iPads. But here are other (universal) tools to set up age-gated content.

How To Remember Passwords (and Secure Your Accounts)
Do you know how to remember passwords that hackers can’t guess? Learn how to create and store strong passwords to protect your accounts.

What Is Credential Stuffing? (And How To Protect Yourself)
What is credential stuffing? If you reuse passwords, it’s time to understand this cyber threat and how to stop it — before it’s too late.

Employment Identity Theft: How To Tell If You're a Victim
Criminals may be using your identity to gain employment or pass background checks. Learn how to spot the warning signs of employment identity theft.

10 Warning Signs of Cyberbullying (& What To Do)
The signs of cyberbullying can be hard to spot. But to keep your children safe, you need to get to know them. Here’s what to look for →