Digital Security 101

What To Do If Your Personal Information Has Been Compromised
Your personal information — including your email, phone number, and even SSN — can be compromised in a data breach or hack, putting you at risk of fraud.

Why Am I Getting So Many Spam Calls?
Your phone number is often leaked or sold, which makes it easy for scammers to spam you. Block unknown calls and protect your info to cut down on spam.

Someone Bought a Car In My Name! What Should I do?
Yes, it’s possible for someone to steal your identity and buy a car in your name. Here’s how vehicle identity theft works and how you can recover.

Don’t Let These 10 Airbnb Scams Ruin Your Vacation in 2024
Booking your next vacation rental? Here’s a list of all the latest Airbnb scams so you know what listings to pass on and which ones are legitimate.

Car Title Scams Explained: How to Safely Buy a Used Car
Car title scams are rampant and can cause you to pay more for a vehicle that’s damaged or stolen. Here’s how to tell if a used car is legitimate or a scam.

The 12 Walmart Scams You Didn’t Know About (Until Now)
Walmart is the world’s biggest retailer. But that also makes it a huge target for scammers. Here are the latest Walmart scams you need to be aware of.

How To Prevent Check Washing: 8 Steps
Personal and pre-printed checks carry the highest risk of being washed. Here are eight ways to prevent check washing.

20 Phishing Email Examples: What Not To Fall For In 2024
Spotting a scam email isn't easy if you don't know the signs. Here are 20 phishing email examples that might look real at first.
text

Can Bluetooth Be Hacked? Follow These Bluetooth Security Tips
Hackers and criminals can use your device’s Bluetooth connection to steal data or spy on you. Learn how to boost your Bluetooth security and stay safe.

How To Block Websites on Your iPhone or iPad
Parental controls on Apple devices show you how to block websites on iPhones and iPads. But here are other (universal) tools to set up age-gated content.

How To Remember Passwords (and Secure Your Accounts)
Do you know how to remember passwords that hackers can’t guess? Learn how to create and store strong passwords to protect your accounts.

What Is Credential Stuffing? (And How To Protect Yourself)
What is credential stuffing? If you reuse passwords, it’s time to understand this cyber threat and how to stop it — before it’s too late.

Employment Identity Theft: How To Tell If You're a Victim
Criminals may be using your identity to gain employment or pass background checks. Learn how to spot the warning signs of employment identity theft.

10 Warning Signs of Cyberbullying (& What To Do)
The signs of cyberbullying can be hard to spot. But to keep your children safe, you need to get to know them. Here’s what to look for →