Digital Security 101
![Illustration of the Chrome logo casting a shadow in the shape of a crossed-out circle](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/67a4f966f6dca7e10b7b5539_67a4f9239abdea3a4cb13e67_How%20to%20block%20ads%20on%20Chrome.webp)
How To Block Ads on Chrome (Android, iPhone, and Desktop)
Google Chrome includes built-in tools to help block some ads and pop-ups — but a third-party ad blocker is a better bet for an ad-free browsing experience.
![Illustrations of an iMac screen with a warning symbol](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/67a409757518f8097c35fa0d_67a40927fcf2740848f4453a_How%20to%20remove%20viruses%20from%20Mac.webp)
How To Remove Viruses From Mac Computers
Hackers use malware to infect your Mac, spy on you, or hold your sensitive files hostage — but with a few steps, you can clear your Mac of most infections.
![An illustration of a key on a lock- and house-shaped keychain](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/634db48fb7590d493692d478_Deed%20Fraud.png)
6 Rental Scams: How To Tell If a Listing is Genuine
Rental scams target renters with fake listings, fraudulent leases, and more. Here’s how to avoid getting scammed while finding your next apartment or home.
![An illustration of an outstretched arm coming from a laptop screen](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657ab67c14c99d69324067b_63e25c1ac3738147709037a5_How-do-data-breaches-happen-header.png)
How Do Data Breaches Happen? What Can You Do About Them?
There were 4,145 publicly disclosed breaches in 2021 alone, representing over 22 billion compromised data records. How do data breaches happen?
![An illustration of a radar interface on a tablet](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6356d0d3a7a1479ab788d35d_What-is-Dark-Web-monitoring-header-image.png)
What Is Dark Web Monitoring? How Does It Work?
Billions of pieces of personal data, passwords, and credentials have been leaked to the Dark Web this year alone. Check to see if you’re at risk.
![An illustration showing a child scribbling on a life-size SSN card](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657aadb6dfe8f4e72ff96f0_6384ca14101ed2100b5f8db5_How-to-replace-a-childs-ssn-card-header.png)
How To Replace a Child’s (Stolen) Social Security Card
Nearly 900,000 children had their identities stolen in 2022. Here’s how to replace a child’s Social Security card if it was stolen or misplaced.
![An illustration of a hooded figure lurking behind an open laptop](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/634da9c2eec357543a4025bc_crypto%20recovery%20service%20scams.png)
Are Crypto Recovery Services a Scam? How To Be Sure
Most crypto recovery services are a scam. Here’s how to make sure you don’t get scammed twice when trying to get your cash and crypto back.
![An illustration of a life-size Social Security card and someone peeking over it](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/639cd8ccec0d820eb4a11417_What%20to%20Do%20If%20Someone%20Has%20Your%20Social%20Security%20Number.png)
What To Do If Someone Has Your Social Security Number
Scammers can use your SSN to open new accounts, gain employment, or impersonate you. Learn what to do if someone has your Social Security number.
text
![Refund and recovery scams: Header image](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657aadc7d0a8053ce597c83_6349b059828774439401543d_Dont%2520Fall%2520For%2520These%25207%2520Nasty%2520Refund%2520Recovery%2520Scams.png)
Don’t Fall For These 7 Nasty Refund & Recovery Scams
Fraudsters know you’re desperate to get your money back after being scammed. Don’t get tricked twice. Look for these warning signs of a recovery scam.
![Scammed on Cash App: Header image](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6356ce4ea58f2157c9d8c680_I-got-scammed-on-Cash-App-what-to-do-header.png)
Did You Get Scammed on Cash App? Here’s What To Do
Did you get scammed on Cash App? Here’s how you can try to get your money back and how to avoid common Cash App scams in the future.
![Google Voice verification code scam](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6356c9d44946406669a436c2_Google-verification-code-scam-header-image.png)
How To Avoid the Google Voice Verification Code Scam
Learn why scammers ask for your Google Voice verification code, what they can do with it, and how to protect yourself against Google Voice scams.
![Cash app scams](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6349c35baec7e5156d2b64dc_Cash%20App%20Scams.png)
The 14 Cash App Scams You Didn’t Know About (Until Now)
Cash App is convenient and fast. But is it safe? Not always. Here are the latest Cash App scams to be aware of and how to protect yourself from scammers.
![Illustration of someone holding gift cards like a poker hand with a credit card peeking out of their sleeve](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657aad508ad9eacdf9d582c_6356c91eac223b2bdb6a2588_What-is-carding-header-image.png)
Carding: The Fraud Technique Destroying Your Credit
Online shopping with your credit card is convenient. But can put you at risk of a type of fraud called carding. Learn how to protect yourself today.