Digital Security 101
![Illustration of the Chrome logo casting a shadow in the shape of a crossed-out circle](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/67a4f966f6dca7e10b7b5539_67a4f9239abdea3a4cb13e67_How%20to%20block%20ads%20on%20Chrome.webp)
How To Block Ads on Chrome (Android, iPhone, and Desktop)
Google Chrome includes built-in tools to help block some ads and pop-ups — but a third-party ad blocker is a better bet for an ad-free browsing experience.
![Illustrations of an iMac screen with a warning symbol](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/67a409757518f8097c35fa0d_67a40927fcf2740848f4453a_How%20to%20remove%20viruses%20from%20Mac.webp)
How To Remove Viruses From Mac Computers
Hackers use malware to infect your Mac, spy on you, or hold your sensitive files hostage — but with a few steps, you can clear your Mac of most infections.
![An illustration of an SSN card with a scammer taking out the numbers from the middle](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657ab6722a355c07e1953e2_634daf4eb818bb6d4cb644e7_How%2520Can%2520Social%2520Security%2520Identity%2520Theft%2520Occur.png)
How Can Social Security Identity Theft Occur? [9 Ways]
Social Security identity theft happens when scammers use your SSN to steal government benefits, take out loans in your name, and worse.
![examples of fraud](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/634db1db670df4965fc9a7bf_Examples%20of%20Fraud.png)
Examples of Fraud, Scams & Schemes to Avoid Right Now
Fraud and digital theft has surpassed physical theft. Learn how to identify common examples of fraud. Safeguard your loved ones and your finances, ASAP.
![An illustration of a stranger spying over someone's shoulder](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657aada886804e723f766aa_6356cc0ace34029a6c78b8d5_Shoulder-surfing-header-image.png)
What Is Shoulder Surfing? How It Happens & How to Avoid It
Shoulder surfing has evolved from scammers with prying eyes to advanced schemes using the latest technologies. Here’s how to protect your data in public.
![How do hackers get into your computer - illustration](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6349d038c744014c8d342fd1_How-do-hackers-get-into-your-computer-header-image.png)
How Hackers Get Into Your Computer (And How To Stop Them)
How do hackers get into your computer? Cybercriminals have numerous scams they can use to break into your device. Here’s how to keep them out.
![Illustration of a Social Security card with a lock in the middle](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/648a1137d09abc3bf910c13e_Protect%20your%20Social%20Security%20Number.webp)
How To Protect Your Social Security Number From Scammers
Do you know if scammers have your SSN? Learn how to protect your Social Security number and safeguard yourself against identity theft.
![Credit score vs. credit report - illustration](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657ab6bb3e4dac40a4a1cac_6489f0259af8df29e0b3efe4_Credit%2520Score%2520vs.%2520Credit%2520Report.png)
Credit Score vs. Credit Report: What You Need To Know
Learn the differences between your credit score and credit report, how they’re calculated, and what you can do to improve your credit today.
text
![Illustration of a letter with a text message notification](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/642dd2d3a427e34f48c79141_How%20to%20Block%20Texts%20From%20Emails.png)
How To Block Spam Texts From Email Addresses
Are you getting spam and scam texts from email addresses? Learn why this happens, what it means, and how to block texts from emails.
![An illustration of a stop sign intercepting chat bubbles](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6349ab074e32c3bf3dae08b9_Car%20extended%20warranty%20call%20scam.png)
How To Stop Spam Texts (on Android and iPhone)
Millions of spam texts are sent every single day. Learn how to stop spam texts, block spammers, and protect your phone and identity from criminals.
![Illustration of four fingers clutching a dark hole inside a phone](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657ab6cde0a9e7f93825ff8_63cac50bdaacd2561782dd93_Craigslist-scams-header-image.png)
Would You Fall For These 9 Craigslist Scams?
Craigslist scams are hard to prosecute because scammers operate outside of your home country or use stolen identities. Here are 9 ways to shop safely.
![Illustration of an open laptop with a man in a hoodie and mask climbing out of it](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657aad8fa12cafe97eb4015_6349c79a3a0cbe4028e297cb_Types-of-cyber-attacks-header-image.png)
17 Types of Cyber Attacks Commonly Used By Hackers
Cybercriminals are getting smarter and more sophisticated with their attacks. To stay safe, here are the latest threats you need to know.
![Illustration of a smartphone with an email on the screen containing a warning symbol](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657ab6e931bc233f17a1f32_64654d513305f0cb0176d51e_Bank%2520of%2520America%2520phishing%2520emails.png)
How To Spot a Bank of America Phishing Email
Did you get a suspicious email from Bank of America? It could be a scam. Learn to spot the warning signs of a Bank of America phishing email.
![Illustration of a deep sea diver shining a light on a warning symbol](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/659c7bede2ab6c77f1f7bb7c_659c7bb6485862ed2f6566e4_Dark%20Web%20alert.webp)
Did You Get a Dark Web Alert? How To Secure Your Accounts
If your PII surfaces on a cybercrime forum or website, there are ways for you to receive early notifications. This is where Dark Web alerts come in.