Digital Security 101
![Illustration of the Facebook logo on a manhole cover](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/67a2851a5c26f6a321e2383b_67a284bece27e0b7dbdce76b_How%20to%20delete%20your%20Facebook%20account%20And%20all%20of%20its%20data.webp)
How To Delete Your Facebook Account (and All Its Data)
While you can delete (or deactivate) your Facebook account at any time, Meta may hold onto your data for up to another six months afterward.
![Illustration of a text message bubble with a question mark on it](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/67a282791f4c270f7514abec_67a281fc58e79a90355dad5a_Can%20you%20get%20hacked%20by%20responding%20to%20a%20text%20message.webp)
No, You Can't Get Hacked By Responding To a Text Message
While you can’t be hacked simply by responding to a text message, it makes you vulnerable to more serious scams and threats that could put you in danger.
![Illustration showing a Steam Wallet card with two prying eyes](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6384cf83ade65ed509bd322c_steam-card-scams-header.png)
What Are Steam Card Scams? How Can You Avoid Them?
While Steam gift cards are typically used to buy video games sold by the gaming platform, they can also be used in various card scams.
![An illustration of a hand holding a phone with a heart icon on the back](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6408e0d7c919e84186019235_How%20To%20Spot%20a%20Scammer%20on%20a%20Dating%20Site.png)
How To Spot a Scammer on a Dating Site: 9 Warning Signs
50% of Americans who have used a dating app in the past five years have experienced catfishing. Here’s how to spot a scammer on a dating site.
![An illustration showing a mail icon placed over a block icon](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657ab6c8080ba51971d5a8a_6495fd7cbc8f12f4851b079a_Coinbase-scam-emails-header.webp)
How To Recognize and Report Coinbase Scam Emails
Fraudsters use Coinbase scam emails to impersonate the company and dupe users into sharing login information. Here’s what can happen after.
![Illustration of the Chase bank logo on a stop sign](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6495f43ed6880faa049a5147_Chase%20Bank%20Scams.png)
The 7 Latest Chase Bank Scams (and How To Avoid Them)
Are you a Chase Bank customer? Don’t get scammed! Learn about the 7 latest Chase Bank scams (and how to avoid them).
![Is credit monitoring worth it? - illustration](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657aadf4b88d219d57b4c06_6495dfa92bffa4b0225e440c_Is%2520Credit%2520Monitoring%2520Worth%2520It.png)
Is Credit Monitoring Actually Worth It? How To Decide
Credit monitoring can protect you against fraud. But do you need to pay for it? Learn what credit monitoring does and how to decide if you need it.
![Illustration of a credit card protected inside of a glass case](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657ab65ce73dd7c6ceaa0d2_6356cdc217b49564644ed602_How-to-prevent-credit-card-fraud-header-image.png)
How To Prevent Credit Card Fraud: 10 Essential Steps
Criminals use your physical card or stolen credit card numbers to make purchases in your name or impersonate you — here's how you can stop them.
text
![An illustration of an SSN card with a scammer taking out the numbers from the middle](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657ab6722a355c07e1953e2_634daf4eb818bb6d4cb644e7_How%2520Can%2520Social%2520Security%2520Identity%2520Theft%2520Occur.png)
How Can Social Security Identity Theft Occur? [9 Ways]
Social Security identity theft happens when scammers use your SSN to steal government benefits, take out loans in your name, and worse.
![examples of fraud](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/634db1db670df4965fc9a7bf_Examples%20of%20Fraud.png)
Examples of Fraud, Scams & Schemes to Avoid Right Now
Fraud and digital theft has surpassed physical theft. Learn how to identify common examples of fraud. Safeguard your loved ones and your finances, ASAP.
![An illustration of a stranger spying over someone's shoulder](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657aada886804e723f766aa_6356cc0ace34029a6c78b8d5_Shoulder-surfing-header-image.png)
What Is Shoulder Surfing? How It Happens & How to Avoid It
Shoulder surfing has evolved from scammers with prying eyes to advanced schemes using the latest technologies. Here’s how to protect your data in public.
![How do hackers get into your computer - illustration](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6349d038c744014c8d342fd1_How-do-hackers-get-into-your-computer-header-image.png)
How Hackers Get Into Your Computer (And How To Stop Them)
How do hackers get into your computer? Cybercriminals have numerous scams they can use to break into your device. Here’s how to keep them out.
![Illustration of a Social Security card with a lock in the middle](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/648a1137d09abc3bf910c13e_Protect%20your%20Social%20Security%20Number.webp)
How To Protect Your Social Security Number From Scammers
Do you know if scammers have your SSN? Learn how to protect your Social Security number and safeguard yourself against identity theft.
![Credit score vs. credit report - illustration](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657ab6bb3e4dac40a4a1cac_6489f0259af8df29e0b3efe4_Credit%2520Score%2520vs.%2520Credit%2520Report.png)
Credit Score vs. Credit Report: What You Need To Know
Learn the differences between your credit score and credit report, how they’re calculated, and what you can do to improve your credit today.