Digital Security 101
![Illustration of a child on a tablet underneath an arch](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/67882d051b1ae5a70ae43ed2_6788299a49e9282b1a9342e3_The%20best%20apps%20for%20controlling%20your%20child%27s%20screen%20time.webp)
The Best Apps For Controlling Kids’ Screen Time Right Now
Basic screen time limiting apps can help parents take control of how their children use digital devices — but the best apps do even more to keep your kids safe.
![Illustration of a MacBook with a corroded image of the Apple logo on the back](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6788286be33661e32a65345f_67882631f049ca8103d9d88b_How%20to%20check%20for%20viruses%20on%20Mac.webp)
How To Check for Viruses on Your Mac Right Now
You can manually check for viruses on your Mac using built-in tools — or use antivirus software that will dig deeper and root out the worst Mac viruses.
Trending Articles
![Illustration of a child staring at an iPad with fingers and speech bubbles coming out of it](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657aadaf2c95a0e129a5a39_6356d13e0e785f4494806245_Signs-of-cyberbullying-header-image.png)
10 Warning Signs of Cyberbullying (& What To Do)
The signs of cyberbullying can be hard to spot. But to keep your children safe, you need to get to know them. Here’s what to look for →
![Illustration of a computer hard drive with a lock symbol on it to represent protecting your data](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657aad5c0616c076342b7b6_651f2192e9b1681b513b48b1_651f20e2da4d313d93b2ec65_What%2520to%2520do%2520with%2520old%2520computers.webp)
What To Do With Old Computers (Before Throwing Them Away)
Not sure what to do with an old computer or device? Learn what data is on your old computer and how to properly trash, recycle, sell, or repurpose it.
![Credit dispute letter - illustration](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657ab6b6221371f5d1c1a94_63b855c6efafa669766a6700_How%2520to%2520Write%2520a%2520Credit%2520Dispute%2520Letter.png)
How To Write a Credit Dispute Letter (and Repair Your Credit)
A credit dispute letter can restore your credit score after identity fraud. Learn when to send the letter and what to include.
![How to prevent SIM swapping: Header image](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6349cf127253ed6d786d09ff_How-to-prevent-sim-swapping-header-image.png)
How To Prevent SIM Swapping and Port-out Scams
A SIM card swap is a gateway fraud; scammers can easily hijack your phone number — and then steal your identity. Here’s how to prevent SIM swapping.
![Illustration of the Bitcoin logo on an upright coin where an arm is emerging from the side of the coin](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/641b2ac8f44dbbb62a759249_Pig%20butchering%20scam.png)
The Pig Butchering Scam: 10 Warning Signs & How To Avoid It
Pig butchering scams cost victims tens of billions each year. Learn the warning signs of this long-term con to stay safe online.
![An illustration showing someone mopping a life-size phone](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657ab6b17221877f53b2c47_6349c8fae4c17227e2f2ab49_Cyber-hygiene-header-image.png)
What Is Cyber Hygiene? 10 Ways to Stay Safe on the Internet
Cyber hygiene comprises a set of habits, tools, and techniques that can protect you from hackers and scammers. Make these 10 habits a part of your regimen.
text
![Illustration of a magnifying glass over a phone with a line through it, illustrating a spam call blocker](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/64f8e03fc2f7539463676c55_64f8dffda727aeaaa57b6242_Best%20spam%20call%20blocker.webp)
The 8 Best Spam Call Blocker Apps for Stopping Unwanted Calls
Phone scammers can bypass built-in and basic spam call blockers — but a new breed of AI-powered tools can finally protect you from non-stop spam calls.
![Illustration showing a warning symbol coming out of the top of a smartphone](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6384cb4d8ab0631ced4fbb58_How-to-know-if-your-phone-is-hacked-header.png)
How To Know If Your Phone Is Hacked (12 Warning Signs)
Signs of a hacked phone include reduced battery life, higher data usage, unusual device behavior, new apps, locked accounts, or receiving 2FA codes.
![Illustration of a briefcase with the LinkedIn logo on it with a flag coming out](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/66cf39d8468d3b528b86535a_65ce7d7b723e2e96494de040_How%20to%20spot%20LinkedIn%20Job%20scams.webp)
How To Know If a Recruiter Is Legit: 7 Recruitment Scam Red Flags
Fake recruiters prowl LinkedIn, post on Indeed, and reach out to victims with non-existent job offers — but you can spot them if you know what to look for.
![Illustration of an @ symbol at the bottom of the ocean](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/649ca7ee08bb4ea0bed287c6_My%20Email%20Address%20was%20Found%20on%20the%20Dark%20Web.webp)
Email Found on the Dark Web? Here’s How To Protect Yourself
If you’ve been part of a data breach, there’s a good chance that your email can be found on the Dark Web — but is this something you need to worry about?
![An illustration of the shadow of a hand hovering over an identification card](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/63b765583dcdad4ac9f2c00e_How%20to%20Prevent%20Identity%20Theft.png)
The Easiest Ways To Prevent Identity Theft [8 Steps]
While it’s impossible to completely prevent all types of identity theft, you can make yourself a much less vulnerable target with a few protective measures.
![Illustration of a larger-than-life ID with a criminal peeling off the photograph](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6349bedb6532b905cb1f3d5a_How-long-does-it-take-to-recover-from-identity-theft-header.png)
How Long Does It Take To Recover From Identity Theft?
The time it will take to recover after your identity has been stolen will depend on what information was stolen, how it was used, and how quickly you act.