Digital Security 101
![Illustration of a piece of ID with a keyhole icon for a face, on top of a wallet to symbolize the cost of identity theft](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/66bb7a372e2e396eb8c25e5b_66bb7a011823c6b25ba27e84_How-does-identity-theft-insurance-work-lead-image.webp)
Identity Theft Insurance Coverage, Limits, and Exclusions
Identity theft insurance helps reimburse stolen funds, legal fees, and other recovery costs associated with ID fraud. Coverage may vary by plan.
![Illustration of the Chrome logo casting a shadow in the shape of a crossed-out circle](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/67a4f966f6dca7e10b7b5539_67a4f9239abdea3a4cb13e67_How%20to%20block%20ads%20on%20Chrome.webp)
How To Block Ads on Chrome (Android, iPhone, and Desktop)
Google Chrome includes built-in tools to help block some ads and pop-ups — but a third-party ad blocker is a better bet for an ad-free browsing experience.
![Illustration of the IDShield and Aura logos stacked on top of each other](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6515eafb472d95c34843234e_6515ea86e75120d40df362cc_Aura%20vs%20IDShield.webp)
Aura vs. IDShield: 2024 Review and Comparison
Trying to understand the differences between Aura and IDShield? In this guide, we’ll explain what you need to know to choose the right option for you.
![A creative illustration showing the Zelle logo](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6595b727e3cebd1c9c907a85_6595b6fe1a7e303fd0dfa11f_I-got-scammed-on-Zelle-lead-image.webp)
I Got Scammed on Zelle—Can I Get My Money Back?
Did you get scammed on Zelle? Here’s how you can try to get your money back and how to avoid common Zelle scams in the future.
![Illustration of a tilted envelope with placeholder designs for the delivery address box and postage stamp areas](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/64da711b7ebdf5f43f6548eb_64da70f514ba3e98ea06d191_How-do-I-stop-someone-from-using-my-address-lead-image.webp)
What Can Scammers Do With Your Personal Info? (Name & Address)
Is your name and address enough for someone to steal your identity? Learn what scammers can do with your basic contact information (and how to stay safe).
![An illustration of a hand holding up a magnifying glass against an exclamation mark](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657aade05a9dfa3988a4930_63b75666fd5eb4b199ee6f51_The%2520Latest%2520Scams%2520Going%2520Around.png)
The 12 Latest Scams You Need To Avoid (2024)
This year is shaping up to be one of the worst ever for online scams, cybercrime, and fraud. Stay safe by knowing the latest scams making the rounds.
![An illustration of an identification card with two hands peeking out from under the photo on the ID](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657aad8c0616c076342bc2f_6598409a8a145c6132002200_6598406d23216ceff35ad77d_Types%2520of%2520identity%2520theft.webp)
The 17 Types of Identity Theft You Need To Know
Nearly 40% of all Americans believe that their identities have been stolen at some point — learn the most common ways that identity thieves come after you.
![Illustration of a person wearing Groucho glass while using a phone and laptop — as if to indicate a catfisher](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/659460fbda92935bc4b968f3_659460dbf71c1caaf2b23946_How-to-tell-if-someone-is-scamming-you-online-lead-image.webp)
How To Tell if Someone Is Scamming You Online (Real Examples)
You might be dealing with an online scammer if they request sensitive personal information, money, or insist on speaking on a chat app of their choice.
text
![Illustration of a piece of ID with a keyhole icon for a face, on top of a wallet to symbolize the cost of identity theft](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/66bb7a372e2e396eb8c25e5b_66bb7a011823c6b25ba27e84_How-does-identity-theft-insurance-work-lead-image.webp)
Identity Theft Insurance Coverage, Limits, and Exclusions
Identity theft insurance helps reimburse stolen funds, legal fees, and other recovery costs associated with ID fraud. Coverage may vary by plan.
![Illustration of the Chrome logo casting a shadow in the shape of a crossed-out circle](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/67a4f966f6dca7e10b7b5539_67a4f9239abdea3a4cb13e67_How%20to%20block%20ads%20on%20Chrome.webp)
How To Block Ads on Chrome (Android, iPhone, and Desktop)
Google Chrome includes built-in tools to help block some ads and pop-ups — but a third-party ad blocker is a better bet for an ad-free browsing experience.
![Illustrations of an iMac screen with a warning symbol](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/67a409757518f8097c35fa0d_67a40927fcf2740848f4453a_How%20to%20remove%20viruses%20from%20Mac.webp)
How To Remove Viruses From Mac Computers
Hackers use malware to infect your Mac, spy on you, or hold your sensitive files hostage — but with a few steps, you can clear your Mac of most infections.
![Illustration of the WhatsApp logo inside of a bear trap.](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6349b0c8f387007afb804f1f_WhatsApp%20Scams.png)
The 10 Latest WhatsApp Scams (How To Identify a Scammer)
If you’d rather text than talk, how likely are you to fall for these WhatsApp scams? Here are 10 scams to know and how you can avoid them.
![Illustration of the Facebook logo on a manhole cover](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/67a2851a5c26f6a321e2383b_67a284bece27e0b7dbdce76b_How%20to%20delete%20your%20Facebook%20account%20And%20all%20of%20its%20data.webp)
How To Delete Your Facebook Account (and All Its Data)
While you can delete (or deactivate) your Facebook account at any time, Meta may hold onto your data for up to another six months afterward.
![Illustration of a text message bubble with a question mark on it](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/67a282791f4c270f7514abec_67a281fc58e79a90355dad5a_Can%20you%20get%20hacked%20by%20responding%20to%20a%20text%20message.webp)
No, You Can't Get Hacked By Responding To a Text Message
While you can’t be hacked simply by responding to a text message, it makes you vulnerable to more serious scams and threats that could put you in danger.