Digital Security 101
![Illustration of the Chrome logo casting a shadow in the shape of a crossed-out circle](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/67a4f966f6dca7e10b7b5539_67a4f9239abdea3a4cb13e67_How%20to%20block%20ads%20on%20Chrome.webp)
How To Block Ads on Chrome (Android, iPhone, and Desktop)
Google Chrome includes built-in tools to help block some ads and pop-ups — but a third-party ad blocker is a better bet for an ad-free browsing experience.
![Illustrations of an iMac screen with a warning symbol](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/67a409757518f8097c35fa0d_67a40927fcf2740848f4453a_How%20to%20remove%20viruses%20from%20Mac.webp)
How To Remove Viruses From Mac Computers
Hackers use malware to infect your Mac, spy on you, or hold your sensitive files hostage — but with a few steps, you can clear your Mac of most infections.
![Illustration of four fingers clutching a dark hole inside a phone](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657ab6cde0a9e7f93825ff8_63cac50bdaacd2561782dd93_Craigslist-scams-header-image.png)
Would You Fall For These 9 Craigslist Scams?
Craigslist scams are hard to prosecute because scammers operate outside of your home country or use stolen identities. Here are 9 ways to shop safely.
![Illustration of an open laptop with a man in a hoodie and mask climbing out of it](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657aad8fa12cafe97eb4015_6349c79a3a0cbe4028e297cb_Types-of-cyber-attacks-header-image.png)
17 Types of Cyber Attacks Commonly Used By Hackers
Cybercriminals are getting smarter and more sophisticated with their attacks. To stay safe, here are the latest threats you need to know.
![Illustration of a smartphone with an email on the screen containing a warning symbol](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657ab6e931bc233f17a1f32_64654d513305f0cb0176d51e_Bank%2520of%2520America%2520phishing%2520emails.png)
How To Spot a Bank of America Phishing Email
Did you get a suspicious email from Bank of America? It could be a scam. Learn to spot the warning signs of a Bank of America phishing email.
![Illustration of a deep sea diver shining a light on a warning symbol](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/659c7bede2ab6c77f1f7bb7c_659c7bb6485862ed2f6566e4_Dark%20Web%20alert.webp)
Did You Get a Dark Web Alert? How To Secure Your Accounts
If your PII surfaces on a cybercrime forum or website, there are ways for you to receive early notifications. This is where Dark Web alerts come in.
![Illustration of the Apple logo inside of a trap.](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6349c629163ebe85bcbd09a1_Scammed%20Using%20Apple%20Pay.png)
Scammed Using Apple Pay? Here's How To Get Your Money Back
Were you scammed on Apple Pay? Here’s how you can identify common Apple Pay scams and dispute fraudulent charges to try and get your money back.
![Illustration of a thief climbing the side of a larger-than-life IP address marker](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/65a173f115a77837b9cd9298_65a1737736748460f31a550d_IP%20address%20hacked.webp)
Was Your IP Address Hacked? How To Tell & What To Do
If your IP address is hacked, scammers can gain enough information to break into your financial accounts or steal your identity. Here’s how to stay safe.
text
![What is a data breach - illustration](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657aad5fa12cafe97eb3d7e_6449a1d36d021bab7082f72f_What%2520is%2520a%2520Data%2520Breach.webp)
What Is a Data Breach? (And How To Protect Your Data)
What is a data breach, and how can you protect your personal information? Find out everything you need to know to stay safe.
![How to read a credit report - illustration](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657aae259b23a9d54e8baeb_64822589aba43676fa3f848c_How%2520to%2520Read%2520a%2520Credit%2520Report.webp)
How To Read a Credit Report (and Dispute Errors)
Fraud and errors on your credit reports could be damaging your credit score. Learn how to read your credit reports and dispute any incorrect information.
![Illustration of an open briefcase full of money](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657ab6531f88a25c357d31a_64821f1835c05c64b353b671_How%2520to%2520Protect%2520Against%2520Ransomware.png)
How To Protect Against Ransomware: 10 Prevention Tips
Ransomware gangs don’t only target large organizations and government agencies. Learn what you can do to protect yourself against ransomware.
![How To Prove a Debt Is Not Yours - lead illustration](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657aae3fa12cafe97eb4778_647fac2292d3fc734d93e357_How%2520to%2520Prove%2520a%2520Debt%2520is%2520Not%2520Yours.webp)
How To Prove a Debt Is Not Yours (and Dispute It)
Did you find a strange debt in your name? It could be a sign of identity theft. Learn how to prove a debt is not yours and protect yourself against fraud.
![Work from home scams - illustration](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/645e8e6c8f9a01149361bdb2_Home%20Title%20Theft.webp)
The 10 Latest Work From Home Scams You Need To Know
Are you looking for a new job? Don’t get caught by a work-from-home scam. Here’s how to stay safe while looking for work online.
![An illustration of an office setup with an erect flag on a desk](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6349c60fe48a4285fe396adb_Job%20Scams.png)
20+ Early Warning Signs That All Point to a Job Scam
It’s hard to spot a phony recruiter, if you don’t know what you’re looking for. Watch out for these red flags and learn how to identify job scams right away.