Digital Security 101
![Illustration of the Chrome logo casting a shadow in the shape of a crossed-out circle](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/67a4f966f6dca7e10b7b5539_67a4f9239abdea3a4cb13e67_How%20to%20block%20ads%20on%20Chrome.webp)
How To Block Ads on Chrome (Android, iPhone, and Desktop)
Google Chrome includes built-in tools to help block some ads and pop-ups — but a third-party ad blocker is a better bet for an ad-free browsing experience.
![Illustrations of an iMac screen with a warning symbol](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/67a409757518f8097c35fa0d_67a40927fcf2740848f4453a_How%20to%20remove%20viruses%20from%20Mac.webp)
How To Remove Viruses From Mac Computers
Hackers use malware to infect your Mac, spy on you, or hold your sensitive files hostage — but with a few steps, you can clear your Mac of most infections.
![An illustration of an SSN card with a scammer taking out the numbers from the middle](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657ab6722a355c07e1953e2_634daf4eb818bb6d4cb644e7_How%2520Can%2520Social%2520Security%2520Identity%2520Theft%2520Occur.png)
How Can Social Security Identity Theft Occur? [9 Ways]
Social Security identity theft happens when scammers use your SSN to steal government benefits, take out loans in your name, and worse.
![examples of fraud](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/634db1db670df4965fc9a7bf_Examples%20of%20Fraud.png)
Examples of Fraud, Scams & Schemes to Avoid Right Now
Fraud and digital theft has surpassed physical theft. Learn how to identify common examples of fraud. Safeguard your loved ones and your finances, ASAP.
![An illustration of a stranger spying over someone's shoulder](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657aada886804e723f766aa_6356cc0ace34029a6c78b8d5_Shoulder-surfing-header-image.png)
What Is Shoulder Surfing? How It Happens & How to Avoid It
Shoulder surfing has evolved from scammers with prying eyes to advanced schemes using the latest technologies. Here’s how to protect your data in public.
![How do hackers get into your computer - illustration](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6349d038c744014c8d342fd1_How-do-hackers-get-into-your-computer-header-image.png)
How Hackers Get Into Your Computer (And How To Stop Them)
How do hackers get into your computer? Cybercriminals have numerous scams they can use to break into your device. Here’s how to keep them out.
![Illustration of a Social Security card with a lock in the middle](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/648a1137d09abc3bf910c13e_Protect%20your%20Social%20Security%20Number.webp)
How To Protect Your Social Security Number From Scammers
Do you know if scammers have your SSN? Learn how to protect your Social Security number and safeguard yourself against identity theft.
![Credit score vs. credit report - illustration](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657ab6bb3e4dac40a4a1cac_6489f0259af8df29e0b3efe4_Credit%2520Score%2520vs.%2520Credit%2520Report.png)
Credit Score vs. Credit Report: What You Need To Know
Learn the differences between your credit score and credit report, how they’re calculated, and what you can do to improve your credit today.
text
![Unemployment scams: Header image](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/634db4c1dea41a2b341885a9_Unemployment%20Fraud.png)
Unemployment Fraud: How Scammers Claim Benefits In Your Name
Unemployment scams lead to billions stolen in benefits and pandemic relief funds. But what happens when someone makes a claim under your name?
![Smishing: Header image](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657aadace73dd7c6cea2531_6356cf1690df1814acf0ca04_What-is-smishing-header-image.png)
What is Smishing? How To Spot & Avoid The Latest Text Scams
Smishing — receiving scam texts pretending to be someone you trust — has increased over 328% in the last year! Here’s how to spot and avoid smishing scams.
![social media safety for kids](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657aadafa12cafe97eb4245_6349ca03b8f0e16e381b89e1_Social-media-safety-for-kids-header-image.png)
How To Keep Your Kids and Teens Safe on Social Media
Social media safety for kids can be a confusing topic. Learn how to protect your children from the risks of social media and limit their screen time.
![How to identify a fake text message](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6349c53caad0e6e2788a2bed_How%20To%20Identify%20a%20Fake%20Text%20Message%20Scam.png)
How To Identify a Fake Text Message Scam [With Examples]
Almost a quarter of all fraud cases start out as text scams. Learn how to quickly identify a fake text message scam and keep your phone (& finances) secure.
![An illustration of an open laptop displaying a keyhole](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657ab6be5d0d242d3952cfc_6349bed8a97c1d373708694b_Best%2520identity%2520theft%2520protection%2520companies.png)
What Is Digital Security? Steps to Stay Safe Online (NEW)
The pandemic introduced us to remote socialization, school, work, and even healthcare. But have you truly mastered the art of digital security?
![Illustration of a man looking through a magnifying glass with a large question mark on it, indicating close scrutiny](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6349bdae666254c0f9468e13_How%20To%20Know%20If%20Your%20Identity%20Has%20Been%20Stolen.png)
Here's How To Know If Your Identity Has Been Stolen
Nearly 50% of Americans have experienced identity theft. Here's how to find out if someone has stolen your identity.