Digital Security 101

What To Do If Your Personal Information Has Been Compromised
Your personal information — including your email, phone number, and even SSN — can be compromised in a data breach or hack, putting you at risk of fraud.

Why Am I Getting So Many Spam Calls?
Your phone number is often leaked or sold, which makes it easy for scammers to spam you. Block unknown calls and protect your info to cut down on spam.

What To Do With an Old SIM Card (Don't Throw It Out!)
Old SIM cards can put you at risk of hacking and identity theft. Learn what to do with your old SIM card to keep yourself safe and secure.

Help! A Family Member Opened a Credit Card In My Name
It’s a crime for a family member to open a credit card in your name (and without your knowledge). Here’s how to handle this precarious situation.

The Dark Web Explained: How It Works & Why It's So Dangerous
See how cybercriminals profit from your personal information on the Dark Web. Learn how to protect your data from financial fraud and identity theft.

Child Identity Theft: The Parental Guide to Protecting Your Kids
More than 1 million children were the victims of child identity theft last year. Learn how to protect your kids from scammers in this parental guide.

What Do Hackers Do With Stolen Information?
Thieves may use stolen information to open fraudulent new bank accounts, apply for credit cards, or even demand a ransom. Can you prevent this?

Scammer Phone Number Lookup: Find Out Who’s Calling You
Want to find out who’s been harassing you over the phone? Avoid sketchy reverse phone number lookup services and follow these steps instead.
text

When Should Kids Get Their First Phones? 2024 Guide
Deciding when to give your child their first phone will depend on their maturity level, situation, and trust level. Here’s how to know if they’re ready.

LinkedIn Scams: 10 Ways You Could Be at Risk on the Platform
LinkedIn has over 900 million users — but honest professionals aren’t the only ones on the platform. Here are 10 common LinkedIn scams to know.

The Worst Social Media Scams of 2024 & How To Avoid Them
Social media scams are running rampant. Learn what to look out for and how to avoid the worst social media scams out there right now.

How To Spot Fake Apps: App Size, Permissions, Source
Most fake apps advertise free and unlimited access, ostensibly, to the premium app — but then give you information-stealing malware.

How To Spot a Fake QR Code Scam [9 New Examples]
Scanning a malicious or fake QR code can lead to financial losses, your device getting hacked, or even identity theft.

The 7 Latest Scams Targeting Veterans & U.S. Military
Scams targeting veterans are rising. Military veterans and their families can read this guide to learn the warning signs and protect themselves.