Digital Security 101

How To Block Annoying Ads on YouTube
While you can pay for an ad-free YouTube experience with YouTube Premium, third-party extensions and privacy-focused browsers are often cheaper and better.

How To Block Ads (Easiest Methods For Each Platform)
Ads and pop-ups aren’t just annoying; they can also put your online privacy and safety at risk — luckily you can block them on almost every platform.

How To Check For Malware on Your Android Device Right Now
Android devices are typically more vulnerable to viruses and malware — luckily, you can scan for and delete malicious apps in a few quick steps.

Why It’s Important To Check Your Credit Reports (and How To Do It)
Your credit reports can bring to light early warning signs of fraud or errors that could impact your credit score — but only if you know where to look.

How To Contact the Police About Credit Card Fraud
Police don’t always investigate credit card fraud — however, filing a fraud and identity theft report with law enforcement can help you recover lost funds.

Is Norton Privacy Monitor Assistant Worth It? [New Review]
Norton Privacy Monitor Assistant can help with data broker opt-outs, but its add-on cost and quarterly scans may not make it the best choice.

Is Allstate Identity Protection Worth It? What To Know
While Allstate is well-known for car and home protection, its identity monitoring may not offer some of the usability available in newer products.

8 Best Credit Monitoring Services This Year (Free & Paid)
While there are free credit monitoring solutions available, many have limited features that can leave you vulnerable to fraud or credit score damage.
text

How To Block Websites on Your iPhone or iPad
Parental controls on Apple devices show you how to block websites on iPhones and iPads. But here are other (universal) tools to set up age-gated content.

How To Remember Passwords (and Secure Your Accounts)
Do you know how to remember passwords that hackers can’t guess? Learn how to create and store strong passwords to protect your accounts.

What Is Credential Stuffing? (And How To Protect Yourself)
What is credential stuffing? If you reuse passwords, it’s time to understand this cyber threat and how to stop it — before it’s too late.

Employment Identity Theft: How To Tell If You're a Victim
Criminals may be using your identity to gain employment or pass background checks. Learn how to spot the warning signs of employment identity theft.

10 Warning Signs of Cyberbullying (& What To Do)
The signs of cyberbullying can be hard to spot. But to keep your children safe, you need to get to know them. Here’s what to look for →

What To Do With Old Computers (Before Throwing Them Away)
Not sure what to do with an old computer or device? Learn what data is on your old computer and how to properly trash, recycle, sell, or repurpose it.