Digital Security 101

How To Quickly Identify a Scammer (Online, Phone, and Text)
Data breaches and AI have helped scammers become more convincing — but there are still common red flags that can warn you if you’re being scammed.

What To Do If Your Personal Information Has Been Compromised
Your personal information — including your email, phone number, and even SSN — can be compromised in a data breach or hack, putting you at risk of fraud.

Deep Web vs. Dark Web: What You Need To Know To Stay Safe
Learn the differences between the Deep and Dark Web, how to safely use them, and what you can do to stay safe online.

How To Avoid Apple Phishing Emails (Apple ID Scams)
Apple phishing emails are getting more sophisticated — and harder to identify. Learn how to protect your Apple account from hackers and scammers.

Ticketmaster Scams: Is It Safe To Buy Tickets on Ticketmaster?
Can you get scammed on Ticketmaster? Learn how to spot the most common Ticketmaster scams and how to safely buy tickets for your next big event.

Was Your Apple ID Hacked? Here's How To Secure Your Account
A hacked Apple ID can give scammers access to your most sensitive information — not to mention photos and videos. Learn how to secure your account.

How To Identify Amazon Email Scams (Before You Lose Money)
Amazon email scams can steal your life savings or identity. Know the red flags and how to protect your finances from fraudsters.

How To Identify (and Avoid) Publishers Clearing House Scams
Scammers use the promise of winnings to trick you into giving up money or sensitive information. Learn about the latest Publishers Clearing House scams.
text

How To Block Spam Calls (Android, iOS, and Landlines)
Knowing how to block spam calls is essential. Scammers can clone your voice or steal your info in seconds — you must be proactive.

What Happens If You Call Back a Spam Number?
Do you know what happens if you call back a spam number? Here's everything you need to know to avoid becoming a victim of scam calls.

What Are Scam Likely Calls? Can You Block Them?
Scam likely calls are those incoming calls that a carrier suspects to be spam. Follow these steps to block these types of calls and more.

Do Scammers Have Remote Access To Your Computer? Do This
If you gave a scammer remote access to your computer, don’t panic. You can still regain control by following these steps.

How Do I Stop Someone From Using My Address?
Someone who requests permission may legally use your address. However, if someone intentionally misrepresents your address, here’s how to stop them.

Home Title Theft: Everything You Need To Know (2023)
Americans lost ~$400 million to real estate-related fraud last year. If you look after several properties, you could be a target for home title theft.