Digital Security 101
![Illustration of a piece of ID with a keyhole icon for a face, on top of a wallet to symbolize the cost of identity theft](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/66bb7a372e2e396eb8c25e5b_66bb7a011823c6b25ba27e84_How-does-identity-theft-insurance-work-lead-image.webp)
Identity Theft Insurance Coverage, Limits, and Exclusions
Identity theft insurance helps reimburse stolen funds, legal fees, and other recovery costs associated with ID fraud. Coverage may vary by plan.
![Illustration of the Chrome logo casting a shadow in the shape of a crossed-out circle](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/67a4f966f6dca7e10b7b5539_67a4f9239abdea3a4cb13e67_How%20to%20block%20ads%20on%20Chrome.webp)
How To Block Ads on Chrome (Android, iPhone, and Desktop)
Google Chrome includes built-in tools to help block some ads and pop-ups — but a third-party ad blocker is a better bet for an ad-free browsing experience.
![Illustration of a Social Security card with a hand holding a stethoscope to it](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6525948a5421cb1725fa5608_6525940465e7688277e120cf_How%20Do%20I%20Check%20To%20See%20If%20Someone%20Is%20Using%20My%20SSN.webp)
How Can I Find Out If Someone Is Using My Social Security Number?
A compromised Social Security number can lead to identity theft, fraud, and worse. Learn how to tell if someone is using your SSN without your permission.
![How to prevent medical identity theft - illustration](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/64b59cc0da5a71c807cf8502_How%20to%20Prevent%20Medical%20Identity%20Theft.png)
How To Prevent Medical Identity Theft: 7 Must-Do Steps
Preventing medical identity theft starts with locking down your health insurance information, having 2FA on related apps, and tracking your medical records.
![Illustration of the McAfee logo](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/646bfe94a1c0c5c77b0583ee_McAfee%20Alternatives%20and%20Competitors.png)
The 7 Best McAfee Competitors and Alternatives (How To Choose)
While McAfee was once a household name for digital security, its products aren’t as well-suited to combat modern cyberthreats compared to the alternatives.
![Illustration of an open laptop with a keyhole on its back](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657aae2c28fae41459cb2f9_641b2a7f1e92836c736d9513_How%2520To%2520Protect%2520Your%2520Privacy%2520Online.png)
How To Protect Your Privacy Online
Your personal information is easily available online to anyone who knows where to look — unless you take these steps to secure your online identity.
![Illustration of a phone lying flat with a credit score wheel emerging from it](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/65b22d242fd03ce5740285cb_65b22d0a577ebd2fad420095_Credit-monitoring-app-lead-image.webp)
The 6 Best Credit Monitoring Apps (Track Your Credit Scores)
Credit monitoring apps help track your credit score, warn you of fraud, and educate you about building credit — but not all are worth your time and money.
![Illustration of a police report](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6356d01d5110b99c3e12d899_How-to-file-police-report-for-identity-theft-header.png)
How To File A Police Report For Identity Theft (in 2024)
A police report is often required to dispute new accounts, fraudulent loans, and other identity theft crimes — but they can sometimes be difficult to file.
text
![Illustration of a text bubble above an iPhone with an Apple logo merged with a lock symbol inside](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/65b19cfdfc956bfa247aeec7_65b19b7dc9c659d1f4633be6_How%20to%20remove%20fake%20Apple%20security%20alerts.webp)
How To Remove Apple Security Alerts & Mac Pop-up Viruses
While most Apple virus warning pop-ups and security alerts are scams, they can be red flags signaling real issues that threaten your internet safety.
![Illustration of a desktop computer with a set of closed blinds covering the screen](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657ab6d6221371f5d1c1cb1_65b0461b09b4f685e817caf8_65b045d9c75fc3e539deebde_The%2520best%2520anti-tracking%2520software.webp)
The 8 Best Anti-Tracking Software for Online Privacy
Websites track your behavior to sell to advertisers — and scammers. Anti-tracking and ad blocking tools can help increase your online privacy and safety.
![Illustration of a 3D do-not-disturb symbol](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657ab66b3728e9d593aa26b_65b0428ea0e047a7c4001205_65b042164aa0b9ecd7899c15_How%2520to%2520block%2520restricted%2520calls.webp)
How To Block Restricted Calls on Android and iPhones (2024)
Restricted calls are hard to block, as these callers intentionally hide their contact information — however, there are new tools available to help.
![Illustration of an open envelope with an exclamation mark on it — indicative of a hacked Gmail account](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/65af7d7ab0d7f3a58657425f_65af7d616604134c820c0c38_Gmail-hacked-lead-image.webp)
I Think My Gmail Was Hacked! How To Secure Your Email
If you think your Gmail has been hacked, first recover your account using Google’s Account Recovery process and then reset your password.
![Illustration of an Android phone's screen being taken over by pop-up ads](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657aad908ad9eacdf9d5a42_65a9c9b9dea43dd0e62ab0be_65a9c96cbe493c17f05a45c4_How%2520to%2520stop%2520pop-up%2520ads%2520on%2520Android%2520phones.webp)
How To Stop Pop-up Ads on Android Phones and Tablets
If pop-up ads are taking over your Android device, you’ll need to scan for viruses as well as update your browser, system, and app settings.
![An illustration of an upright debit card on top of a puddle](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657ab6b75f0d8a84cda23b3_6496143a50ee7878957d5a57_Debit-card-fraud-header.webp)
How Does Debit Card Fraud Happen? Can You Avoid It?
Debit card fraud happens when someone unlawfully uses your debit card or card information to make purchases or withdrawals. Here’s how.