Digital Security 101
How To Delete Your Facebook Account (and All Its Data)
While you can delete (or deactivate) your Facebook account at any time, Meta may hold onto your data for up to another six months afterward.
No, You Can't Get Hacked By Responding To a Text Message
While you can’t be hacked simply by responding to a text message, it makes you vulnerable to more serious scams and threats that could put you in danger.
Trending Articles
Did the DMV Text You? Here’s How To Know If It’s a Scam
Scammers impersonate the DMV to fool you into giving them money and personal information. Learn how to identify the most common DMV text scams.
The Latest UPS Text Scams To Watch Out For
Did you just get a text from UPS? Be careful. It could be a scam! Here’s how to identify the latest UPS text scams and what to do if you get one.
How To Block Spam Texts From Email Addresses
Are you getting spam and scam texts from email addresses? Learn why this happens, what it means, and how to block texts from emails.
How To Stop Spam Texts (on Android and iPhone)
Millions of spam texts are sent every single day. Learn how to stop spam texts, block spammers, and protect your phone and identity from criminals.
Would You Fall For These 9 Craigslist Scams?
Craigslist scams are hard to prosecute because scammers operate outside of your home country or use stolen identities. Here are 9 ways to shop safely.
17 Types of Cyber Attacks Commonly Used By Hackers
Cybercriminals are getting smarter and more sophisticated with their attacks. To stay safe, here are the latest threats you need to know.
text
How To Block Websites on Your iPhone or iPad
Parental controls on Apple devices show you how to block websites on iPhones and iPads. But here are other (universal) tools to set up age-gated content.
How To Remember Passwords (and Secure Your Accounts)
Do you know how to remember passwords that hackers can’t guess? Learn how to create and store strong passwords to protect your accounts.
What Is Credential Stuffing? (And How To Protect Yourself)
What is credential stuffing? If you reuse passwords, it’s time to understand this cyber threat and how to stop it — before it’s too late.
Employment Identity Theft: How To Tell If You're a Victim
Criminals may be using your identity to gain employment or pass background checks. Learn how to spot the warning signs of employment identity theft.
10 Warning Signs of Cyberbullying (& What To Do)
The signs of cyberbullying can be hard to spot. But to keep your children safe, you need to get to know them. Here’s what to look for →
What To Do With Old Computers (Before Throwing Them Away)
Not sure what to do with an old computer or device? Learn what data is on your old computer and how to properly trash, recycle, sell, or repurpose it.