Digital Security 101

What To Do If Your Personal Information Has Been Compromised
Your personal information — including your email, phone number, and even SSN — can be compromised in a data breach or hack, putting you at risk of fraud.

Why Am I Getting So Many Spam Calls?
Your phone number is often leaked or sold, which makes it easy for scammers to spam you. Block unknown calls and protect your info to cut down on spam.

The Latest UPS Text Scams To Watch Out For
Did you just get a text from UPS? Be careful. It could be a scam! Here’s how to identify the latest UPS text scams and what to do if you get one.

How To Block Spam Texts From Email Addresses
Are you getting spam and scam texts from email addresses? Learn why this happens, what it means, and how to block texts from emails.

How To Stop Spam Texts (on Android and iPhone)
Millions of spam texts are sent every single day. Learn how to stop spam texts, block spammers, and protect your phone and identity from criminals.

Would You Fall For These 9 Craigslist Scams?
Craigslist scams are hard to prosecute because scammers operate outside of your home country or use stolen identities. Here are 9 ways to shop safely.

17 Types of Cyber Attacks Commonly Used By Hackers
Cybercriminals are getting smarter and more sophisticated with their attacks. To stay safe, here are the latest threats you need to know.

How To Spot a Bank of America Phishing Email
Did you get a suspicious email from Bank of America? It could be a scam. Learn to spot the warning signs of a Bank of America phishing email.
text

Is Identity Theft Protection Worth It? Only in These Cases
Identity theft protection services aren’t right for everyone. But if you’re a prior victim or have family members to protect, it could make sense for you.

What To Do If You Were Hacked: How To Recover Hacked Accounts
As soon as you see signs that your accounts or devices have been hacked, act quickly to remove malware, regain access, and minimize the damage.

How To Remove a Virus From Your Android Phone
Worried your Android phone or device has been infected? Follow these step-by-step instructions on how to identify and remove Android malware.

How To Dispute Debts in My Name (That Aren’t Mine)
Send a dispute letter to the collector within 30 days, dispute inaccuracies with credit bureaus, and request that the collector stop contacting you.

What is Credit Monitoring? Do You Really Need It?
Credit monitoring is one of the best ways to protect your credit score and catch the early warning signs of fraud — but only if you use the right service.

My Bank Account Has Been Hacked. Can I Get My Money Back?
Notify your bank to report any unauthorized transactions, start an investigation. Banks generally refund fraudulent transactions if reported promptly.