Digital Security 101

What To Do If Your Personal Information Has Been Compromised
Your personal information — including your email, phone number, and even SSN — can be compromised in a data breach or hack, putting you at risk of fraud.

Why Am I Getting So Many Spam Calls?
Your phone number is often leaked or sold, which makes it easy for scammers to spam you. Block unknown calls and protect your info to cut down on spam.

What Is Whaling Phishing? How To Avoid Executive Fraud
Whaling — also known as CEO fraud — is a type of phishing attack that targets and/or impersonates C-level executives in a company.

New Netflix Scams: Why Someone Could Be After Your Account
Phishing emails make up the lion’s share of all Netflix scams today, but there are other ways that you could be caught off guard.

80+ of the Worst Hacked Celebrities From the Last Decade
Hackers have targeted celebrities from Rihanna to Arianna Grande. But you don’t have to be famous to be on their list. Here’s how to keep yourself safe.

Can Someone Steal Your Identity With Your ID?
Can someone steal your identity if they have your ID? Unfortunately, yes. Learn how to prevent identity theft if your ID gets lost or stolen.

Brushing Scam: Is This Free Amazon Package Legit?
Did an unexpected Amazon package show up on your door? If so, you might be the target of a brushing scam. Here’s what to do about it.

How To Dispute a Credit Card Charge in 9 Steps
If you see fraudulent charges or errors on your credit card statement you need to know how to properly dispute them quickly.
text

My Social Security Number Was Found on the Dark Web. Help!
Most SSNs have been leaked to the Dark Web in recent years — making it more important than ever to learn how to make yourself a less vulnerable target.

How To Detect Malware on Your Computer or Phone
Hackers only need a minute to wreak havoc on your finances and identity. Learn how to detect malware quickly and shut down cybercriminals.

Can Someone Hack My iPhone? How To Tell & What To Do
iPhones can’t be “hacked” in the traditional sense — but scammers have found numerous ways to access your data, photos, Apple ID, and other accounts.

Answered: How To Remove a Hacker From Your Smartphone
Deleting suspicious apps, resetting your device, and recovering hacked accounts are among the best ways to remove a hacker from your smartphone.

Do You Need Antivirus? These Questions Can Help You Decide
With advances in built-in tools, many security experts claim you don’t need a third-party antivirus software provider. But that’s not the case for everyone.

How To Track Down Someone Who Scammed You (and What To Do Next)
Did you get scammed and want to find out who did it? Here’s everything you need to know about tracking down scammers (and what your options are).