Digital Security 101
![Illustration of a padlock with the YouTube logo on it](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/67b4edded6475429db48f0df_67b4ed5b79e215d4dc4083f8_How%20to%20block%20ads%20on%20YouTube.webp)
How To Block Annoying Ads on YouTube
While you can pay for an ad-free YouTube experience with YouTube Premium, third-party extensions and privacy-focused browsers are often cheaper and better.
![Illustration of a megaphone](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/67ad203be7286dba4f8b8388_67ad2000dbb781a959aca60b_How%20to%20block%20ads.webp)
How To Block Ads (Easiest Methods For Each Platform)
Ads and pop-ups aren’t just annoying; they can also put your online privacy and safety at risk — luckily you can block them on almost every platform.
![Illustration of a thief stealing a larger-than-life key](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657aad52aabaee60572e01a_63f6a11dfdd6759abc7db2ae_What%2520is%2520Credential%2520Stuffing.png)
What Is Credential Stuffing? (And How To Protect Yourself)
What is credential stuffing? If you reuse passwords, it’s time to understand this cyber threat and how to stop it — before it’s too late.
![Illustration of what seems like an employee ID card with a question mark in place of a person’s photo](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/63a34cd3760b5256de01fe5e_Employment%20Identity%20Theft.png)
Employment Identity Theft: How To Tell If You're a Victim
Criminals may be using your identity to gain employment or pass background checks. Learn how to spot the warning signs of employment identity theft.
![Illustration of a child staring at an iPad with fingers and speech bubbles coming out of it](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657aadaf2c95a0e129a5a39_6356d13e0e785f4494806245_Signs-of-cyberbullying-header-image.png)
10 Warning Signs of Cyberbullying (& What To Do)
The signs of cyberbullying can be hard to spot. But to keep your children safe, you need to get to know them. Here’s what to look for →
![Illustration of a computer hard drive with a lock symbol on it to represent protecting your data](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657aad5c0616c076342b7b6_651f2192e9b1681b513b48b1_651f20e2da4d313d93b2ec65_What%2520to%2520do%2520with%2520old%2520computers.webp)
What To Do With Old Computers (Before Throwing Them Away)
Not sure what to do with an old computer or device? Learn what data is on your old computer and how to properly trash, recycle, sell, or repurpose it.
![Credit dispute letter - illustration](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657ab6b6221371f5d1c1a94_63b855c6efafa669766a6700_How%2520to%2520Write%2520a%2520Credit%2520Dispute%2520Letter.png)
How To Write a Credit Dispute Letter (and Repair Your Credit)
A credit dispute letter can restore your credit score after identity fraud. Learn when to send the letter and what to include.
![How to prevent SIM swapping: Header image](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6349cf127253ed6d786d09ff_How-to-prevent-sim-swapping-header-image.png)
How To Prevent SIM Swapping and Port-out Scams
A SIM card swap is a gateway fraud; scammers can easily hijack your phone number — and then steal your identity. Here’s how to prevent SIM swapping.
text
![Illustration of the WhatsApp logo inside of a bear trap.](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6349b0c8f387007afb804f1f_WhatsApp%20Scams.png)
The 10 Latest WhatsApp Scams (How To Identify a Scammer)
If you’d rather text than talk, how likely are you to fall for these WhatsApp scams? Here are 10 scams to know and how you can avoid them.
![Illustration of the Facebook logo on a manhole cover](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/67a2851a5c26f6a321e2383b_67a284bece27e0b7dbdce76b_How%20to%20delete%20your%20Facebook%20account%20And%20all%20of%20its%20data.webp)
How To Delete Your Facebook Account (and All Its Data)
While you can delete (or deactivate) your Facebook account at any time, Meta may hold onto your data for up to another six months afterward.
![Illustration of a text message bubble with a question mark on it](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/67a282791f4c270f7514abec_67a281fc58e79a90355dad5a_Can%20you%20get%20hacked%20by%20responding%20to%20a%20text%20message.webp)
No, You Can't Get Hacked By Responding To a Text Message
While you can’t be hacked simply by responding to a text message, it makes you vulnerable to more serious scams and threats that could put you in danger.
![An illustration of taped headshot displayed on a phone screen](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6408cf0fd7afcc663400b1f2_My%20phone%20Number%20is%20Being%20Spoofed.png)
My Phone Number Is Being Spoofed — What Can I Do?
If scammers have spoofed your phone number, you could end up with a massive phone bill or worse. Learn what to do if your phone number is being spoofed.
![An illustration of a calculator with an exclamation mark made out of the buttons](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/642f2b1a2d6011c38b9a62be_Someone%20Used%20My%20SSN%20To%20File%20Taxes.png)
Did Someone File Taxes In Your Name? Here’s What To Do
If someone used your personal information and SSN to file taxes, you need to report the issues immediately and protect yourself against identity theft.
![An illustration of a paper note with a refresh icon](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657aad84b88d219d57b4269_63e146cbb6d8be776ede1e1d_Tax-refund-scams-header-image.png)
The 13 Latest Tax Refund Scams You Need To Know
Criminals use your stolen information to file fraudulent tax returns in your name and pocket the refund — unless you know how to spot the warning signs.