Digital Security 101
![Illustration of the Chrome logo casting a shadow in the shape of a crossed-out circle](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/67a4f966f6dca7e10b7b5539_67a4f9239abdea3a4cb13e67_How%20to%20block%20ads%20on%20Chrome.webp)
How To Block Ads on Chrome (Android, iPhone, and Desktop)
Google Chrome includes built-in tools to help block some ads and pop-ups — but a third-party ad blocker is a better bet for an ad-free browsing experience.
![Illustrations of an iMac screen with a warning symbol](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/67a409757518f8097c35fa0d_67a40927fcf2740848f4453a_How%20to%20remove%20viruses%20from%20Mac.webp)
How To Remove Viruses From Mac Computers
Hackers use malware to infect your Mac, spy on you, or hold your sensitive files hostage — but with a few steps, you can clear your Mac of most infections.
![An illustration of an SSN card with a scammer taking out the numbers from the middle](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657ab6722a355c07e1953e2_634daf4eb818bb6d4cb644e7_How%2520Can%2520Social%2520Security%2520Identity%2520Theft%2520Occur.png)
How Can Social Security Identity Theft Occur? [9 Ways]
Social Security identity theft happens when scammers use your SSN to steal government benefits, take out loans in your name, and worse.
![examples of fraud](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/634db1db670df4965fc9a7bf_Examples%20of%20Fraud.png)
Examples of Fraud, Scams & Schemes to Avoid Right Now
Fraud and digital theft has surpassed physical theft. Learn how to identify common examples of fraud. Safeguard your loved ones and your finances, ASAP.
![An illustration of a stranger spying over someone's shoulder](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657aada886804e723f766aa_6356cc0ace34029a6c78b8d5_Shoulder-surfing-header-image.png)
What Is Shoulder Surfing? How It Happens & How to Avoid It
Shoulder surfing has evolved from scammers with prying eyes to advanced schemes using the latest technologies. Here’s how to protect your data in public.
![How do hackers get into your computer - illustration](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6349d038c744014c8d342fd1_How-do-hackers-get-into-your-computer-header-image.png)
How Hackers Get Into Your Computer (And How To Stop Them)
How do hackers get into your computer? Cybercriminals have numerous scams they can use to break into your device. Here’s how to keep them out.
![Illustration of a Social Security card with a lock in the middle](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/648a1137d09abc3bf910c13e_Protect%20your%20Social%20Security%20Number.webp)
How To Protect Your Social Security Number From Scammers
Do you know if scammers have your SSN? Learn how to protect your Social Security number and safeguard yourself against identity theft.
![Credit score vs. credit report - illustration](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657ab6bb3e4dac40a4a1cac_6489f0259af8df29e0b3efe4_Credit%2520Score%2520vs.%2520Credit%2520Report.png)
Credit Score vs. Credit Report: What You Need To Know
Learn the differences between your credit score and credit report, how they’re calculated, and what you can do to improve your credit today.
text
![How to remove hard inquiries: Header image](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657aae1a36e4fbc15af46d8_6349b899731642ac38360ae1_How%2520To%2520Remove%2520Inquiries%2520From%2520Credit%2520Report.png)
How To Remove Hard Inquiries From Your Credit Report
Here’s how to remove hard inquiries from your credit report if you suspect fraud. Unfamiliar and undisputed hard checks might cost you your identity.
![How to tell if an email is from a scammer: Header image](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/635ab78f10f6a4c14e3008f0_how-to-tell-if-an-email-is-from-a-scammer-header.png)
How To Tell If An Email Is From a Scammer [With Examples]
Did you receive an email from PayPal or Amazon asking to confirm your account details? Could it be legitimate or a scam? Here's how to tell.
![Illustration of a credit score tracker](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/638640db9069187c4b3c1840_credit-lock-vs-credit-freeze-header.png)
Credit Lock vs. Credit Freeze: Which One Is More Secure?
Credit freeze, security freeze, and credit lock are often used interchangeably — however, there are key differences between them you should know.
![Stolen social security card: Header image](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6349c569aad0e676488a6175_Stolen%20Social%20Security%20Card.png)
Stolen Social Security Card? Here’s What To Do
As long as SSNs are used as unique identifiers, scammers will target them. Learn what to do if your Social Security card is stolen or missing.
![An illustration of a fraudulent FEMA contractor against a battered window](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657ab69f2c95a0e129ae395_634dadbdd2c42670230fa380_FEMA%2520Scams.png)
7 Ways to Spot FEMA Scams and Protect Your Relief Money
When disasters strike, scammers aren't far behind. These seven common FEMA scams could roil your disaster relief benefits when you most need it.
![An illustration of a laptop with a warning sign displayed on the screen](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657ab698080ba51971d567b_63a23a873853df4556214574_Emerging-cyber-threats-header-image.png)
The 21 Latest Emerging Cyber Threats to Avoid
Cybercrime has increased by 600% in the past two years. Learn about the latest emerging cyber threats and how to protect yourself online.