Digital Security 101
![Illustration of the Chrome logo casting a shadow in the shape of a crossed-out circle](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/67a4f966f6dca7e10b7b5539_67a4f9239abdea3a4cb13e67_How%20to%20block%20ads%20on%20Chrome.webp)
How To Block Ads on Chrome (Android, iPhone, and Desktop)
Google Chrome includes built-in tools to help block some ads and pop-ups — but a third-party ad blocker is a better bet for an ad-free browsing experience.
![Illustrations of an iMac screen with a warning symbol](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/67a409757518f8097c35fa0d_67a40927fcf2740848f4453a_How%20to%20remove%20viruses%20from%20Mac.webp)
How To Remove Viruses From Mac Computers
Hackers use malware to infect your Mac, spy on you, or hold your sensitive files hostage — but with a few steps, you can clear your Mac of most infections.
![An illustration of an SSN card with a scammer taking out the numbers from the middle](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657ab6722a355c07e1953e2_634daf4eb818bb6d4cb644e7_How%2520Can%2520Social%2520Security%2520Identity%2520Theft%2520Occur.png)
How Can Social Security Identity Theft Occur? [9 Ways]
Social Security identity theft happens when scammers use your SSN to steal government benefits, take out loans in your name, and worse.
![examples of fraud](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/634db1db670df4965fc9a7bf_Examples%20of%20Fraud.png)
Examples of Fraud, Scams & Schemes to Avoid Right Now
Fraud and digital theft has surpassed physical theft. Learn how to identify common examples of fraud. Safeguard your loved ones and your finances, ASAP.
![An illustration of a stranger spying over someone's shoulder](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657aada886804e723f766aa_6356cc0ace34029a6c78b8d5_Shoulder-surfing-header-image.png)
What Is Shoulder Surfing? How It Happens & How to Avoid It
Shoulder surfing has evolved from scammers with prying eyes to advanced schemes using the latest technologies. Here’s how to protect your data in public.
![How do hackers get into your computer - illustration](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6349d038c744014c8d342fd1_How-do-hackers-get-into-your-computer-header-image.png)
How Hackers Get Into Your Computer (And How To Stop Them)
How do hackers get into your computer? Cybercriminals have numerous scams they can use to break into your device. Here’s how to keep them out.
![Illustration of a Social Security card with a lock in the middle](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/648a1137d09abc3bf910c13e_Protect%20your%20Social%20Security%20Number.webp)
How To Protect Your Social Security Number From Scammers
Do you know if scammers have your SSN? Learn how to protect your Social Security number and safeguard yourself against identity theft.
![Credit score vs. credit report - illustration](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657ab6bb3e4dac40a4a1cac_6489f0259af8df29e0b3efe4_Credit%2520Score%2520vs.%2520Credit%2520Report.png)
Credit Score vs. Credit Report: What You Need To Know
Learn the differences between your credit score and credit report, how they’re calculated, and what you can do to improve your credit today.
text
![Netflix scams: Header image](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657aaddc0616c076342c107_635ab78f10f6a4c14e3008f0_how-to-tell-if-an-email-is-from-a-scammer-header.png)
New Netflix Scams: Why Someone Could Be After Your Account
Phishing emails make up the lion’s share of all Netflix scams today, but there are other ways that you could be caught off guard.
![Worst hacked celebrities of all time: Header image](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657ab68ea49d5bca91f9edc_6356caca494640e202a445dd_Hacked-celebrities-header-image.png)
80+ of the Worst Hacked Celebrities From the Last Decade
Hackers have targeted celebrities from Rihanna to Arianna Grande. But you don’t have to be famous to be on their list. Here’s how to keep yourself safe.
![Can someone steal your identity with your ID: Header image](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6349bab206551b9d95352ba5_Can%20Someone%20Steal%20Your%20Identity%20With%20Your%20ID.png)
Can Someone Steal Your Identity With Your ID?
Can someone steal your identity if they have your ID? Unfortunately, yes. Learn how to prevent identity theft if your ID gets lost or stolen.
![Illustration of an Amazon package with an exclamation mark on it](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6598649938811c543a5829dd_659862d41cce6160119b6172_Brushing%20scam.webp)
Brushing Scam: Is This Free Amazon Package Legit?
Did an unexpected Amazon package show up on your door? If so, you might be the target of a brushing scam. Here’s what to do about it.
![Illustration of a credit card laid over a bill with an exclamation mark on top](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/63f954308e826db282734ad9_How%20to%20Dispute%20a%20Credit%20Card%20Charge.png)
How To Dispute a Credit Card Charge in 9 Steps
If you see fraudulent charges or errors on your credit card statement you need to know how to properly dispute them quickly.
![An illustration of a pamphlet showing two broken hearts](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/63d41012c9c610bf172eb514_Military-romance-scams-header-image.png)
How To Identify a Military Romance Scam: 17 Warning Signs
There’s nothing more vile than someone pretending to be a service member to scam you. But military romance scams are real. Here’s how to spot them.