Digital Security 101
![Illustration of the Chrome logo casting a shadow in the shape of a crossed-out circle](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/67a4f966f6dca7e10b7b5539_67a4f9239abdea3a4cb13e67_How%20to%20block%20ads%20on%20Chrome.webp)
How To Block Ads on Chrome (Android, iPhone, and Desktop)
Google Chrome includes built-in tools to help block some ads and pop-ups — but a third-party ad blocker is a better bet for an ad-free browsing experience.
![Illustrations of an iMac screen with a warning symbol](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/67a409757518f8097c35fa0d_67a40927fcf2740848f4453a_How%20to%20remove%20viruses%20from%20Mac.webp)
How To Remove Viruses From Mac Computers
Hackers use malware to infect your Mac, spy on you, or hold your sensitive files hostage — but with a few steps, you can clear your Mac of most infections.
![An illustration of an SSN card with a scammer taking out the numbers from the middle](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657ab6722a355c07e1953e2_634daf4eb818bb6d4cb644e7_How%2520Can%2520Social%2520Security%2520Identity%2520Theft%2520Occur.png)
How Can Social Security Identity Theft Occur? [9 Ways]
Social Security identity theft happens when scammers use your SSN to steal government benefits, take out loans in your name, and worse.
![examples of fraud](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/634db1db670df4965fc9a7bf_Examples%20of%20Fraud.png)
Examples of Fraud, Scams & Schemes to Avoid Right Now
Fraud and digital theft has surpassed physical theft. Learn how to identify common examples of fraud. Safeguard your loved ones and your finances, ASAP.
![An illustration of a stranger spying over someone's shoulder](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657aada886804e723f766aa_6356cc0ace34029a6c78b8d5_Shoulder-surfing-header-image.png)
What Is Shoulder Surfing? How It Happens & How to Avoid It
Shoulder surfing has evolved from scammers with prying eyes to advanced schemes using the latest technologies. Here’s how to protect your data in public.
![How do hackers get into your computer - illustration](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6349d038c744014c8d342fd1_How-do-hackers-get-into-your-computer-header-image.png)
How Hackers Get Into Your Computer (And How To Stop Them)
How do hackers get into your computer? Cybercriminals have numerous scams they can use to break into your device. Here’s how to keep them out.
![Illustration of a Social Security card with a lock in the middle](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/648a1137d09abc3bf910c13e_Protect%20your%20Social%20Security%20Number.webp)
How To Protect Your Social Security Number From Scammers
Do you know if scammers have your SSN? Learn how to protect your Social Security number and safeguard yourself against identity theft.
![Credit score vs. credit report - illustration](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657ab6bb3e4dac40a4a1cac_6489f0259af8df29e0b3efe4_Credit%2520Score%2520vs.%2520Credit%2520Report.png)
Credit Score vs. Credit Report: What You Need To Know
Learn the differences between your credit score and credit report, how they’re calculated, and what you can do to improve your credit today.
text
![Refund and recovery scams: Header image](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657aadc7d0a8053ce597c83_6349b059828774439401543d_Dont%2520Fall%2520For%2520These%25207%2520Nasty%2520Refund%2520Recovery%2520Scams.png)
Don’t Fall For These 7 Nasty Refund & Recovery Scams
Fraudsters know you’re desperate to get your money back after being scammed. Don’t get tricked twice. Look for these warning signs of a recovery scam.
![Scammed on Cash App: Header image](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6356ce4ea58f2157c9d8c680_I-got-scammed-on-Cash-App-what-to-do-header.png)
Did You Get Scammed on Cash App? Here’s What To Do
Did you get scammed on Cash App? Here’s how you can try to get your money back and how to avoid common Cash App scams in the future.
![Google Voice verification code scam](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6356c9d44946406669a436c2_Google-verification-code-scam-header-image.png)
How To Avoid the Google Voice Verification Code Scam
Learn why scammers ask for your Google Voice verification code, what they can do with it, and how to protect yourself against Google Voice scams.
![Cash app scams](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6349c35baec7e5156d2b64dc_Cash%20App%20Scams.png)
The 14 Cash App Scams You Didn’t Know About (Until Now)
Cash App is convenient and fast. But is it safe? Not always. Here are the latest Cash App scams to be aware of and how to protect yourself from scammers.
![Illustration of someone holding gift cards like a poker hand with a credit card peeking out of their sleeve](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657aad508ad9eacdf9d582c_6356c91eac223b2bdb6a2588_What-is-carding-header-image.png)
Carding: The Fraud Technique Destroying Your Credit
Online shopping with your credit card is convenient. But can put you at risk of a type of fraud called carding. Learn how to protect yourself today.