Digital Security 101

What To Do If Your Personal Information Has Been Compromised
Your personal information — including your email, phone number, and even SSN — can be compromised in a data breach or hack, putting you at risk of fraud.

How To Block Annoying Ads on YouTube
While you can pay for an ad-free YouTube experience with YouTube Premium, third-party extensions and privacy-focused browsers are often cheaper and better.

How To Avoid Apple Phishing Emails (Apple ID Scams)
Apple phishing emails are getting more sophisticated — and harder to identify. Learn how to protect your Apple account from hackers and scammers.

Ticketmaster Scams: Is It Safe To Buy Tickets on Ticketmaster?
Can you get scammed on Ticketmaster? Learn how to spot the most common Ticketmaster scams and how to safely buy tickets for your next big event.

Was Your Apple ID Hacked? Here's How To Secure Your Account
A hacked Apple ID can give scammers access to your most sensitive information — not to mention photos and videos. Learn how to secure your account.

How To Identify Amazon Email Scams (Before You Lose Money)
Amazon email scams can steal your life savings or identity. Know the red flags and how to protect your finances from fraudsters.

How To Identify (and Avoid) Publishers Clearing House Scams
Scammers use the promise of winnings to trick you into giving up money or sensitive information. Learn about the latest Publishers Clearing House scams.

The 7 Latest Bank of America Scams and How To Identify Them
Scammers target Bank of America customers to gain access to their accounts and steal their money. Learn the latest BofA scams and how to avoid them.
text

How To Block Apps on iPhones: What Parents Need To Know
Knowing how to block apps on iPhones is crucial to shielding kids from online threats such as smartphone addictions, scams, and cyberbullying.

How To Quickly Identify Phishing Emails (13 Red Flags)
Clicking on links or responding to phishing emails can put you at risk of identity theft, hacking, or fraud. Check for these red flags before you react.

Here’s How You Can Prevent Credit Card Cloning
Cloned cards are fraudulent copies of real credit or debit cards. Hacked POS terminals and skimmers can both easily give away card information.

Extortion Scams: What To Know & How To Protect Yourself
Extortion is a crime recognized by both state and federal laws. If you or someone you know has been extorted, follow these steps to minimize damage.

Hacked Debit Card? 9 Ways To Protect Your Money
Most often, thieves “hack” debit cards with skimmers on POS terminals. Keeping a close eye on card statements, using contactless payments can help.

11 Top VPN Features, What To Look For Before You Buy
Most extensive VPN features can be overwhelming — like split tunneling or DNS leak protection. If you’re only looking to stream, game, keep it simple.