Digital Security 101
![Illustration of the Chrome logo casting a shadow in the shape of a crossed-out circle](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/67a4f966f6dca7e10b7b5539_67a4f9239abdea3a4cb13e67_How%20to%20block%20ads%20on%20Chrome.webp)
How To Block Ads on Chrome (Android, iPhone, and Desktop)
Google Chrome includes built-in tools to help block some ads and pop-ups — but a third-party ad blocker is a better bet for an ad-free browsing experience.
![Illustrations of an iMac screen with a warning symbol](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/67a409757518f8097c35fa0d_67a40927fcf2740848f4453a_How%20to%20remove%20viruses%20from%20Mac.webp)
How To Remove Viruses From Mac Computers
Hackers use malware to infect your Mac, spy on you, or hold your sensitive files hostage — but with a few steps, you can clear your Mac of most infections.
![Illustration of four fingers clutching a dark hole inside a phone](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657ab6cde0a9e7f93825ff8_63cac50bdaacd2561782dd93_Craigslist-scams-header-image.png)
Would You Fall For These 9 Craigslist Scams?
Craigslist scams are hard to prosecute because scammers operate outside of your home country or use stolen identities. Here are 9 ways to shop safely.
![Illustration of an open laptop with a man in a hoodie and mask climbing out of it](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657aad8fa12cafe97eb4015_6349c79a3a0cbe4028e297cb_Types-of-cyber-attacks-header-image.png)
17 Types of Cyber Attacks Commonly Used By Hackers
Cybercriminals are getting smarter and more sophisticated with their attacks. To stay safe, here are the latest threats you need to know.
![Illustration of a smartphone with an email on the screen containing a warning symbol](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657ab6e931bc233f17a1f32_64654d513305f0cb0176d51e_Bank%2520of%2520America%2520phishing%2520emails.png)
How To Spot a Bank of America Phishing Email
Did you get a suspicious email from Bank of America? It could be a scam. Learn to spot the warning signs of a Bank of America phishing email.
![Illustration of a deep sea diver shining a light on a warning symbol](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/659c7bede2ab6c77f1f7bb7c_659c7bb6485862ed2f6566e4_Dark%20Web%20alert.webp)
Did You Get a Dark Web Alert? How To Secure Your Accounts
If your PII surfaces on a cybercrime forum or website, there are ways for you to receive early notifications. This is where Dark Web alerts come in.
![Illustration of the Apple logo inside of a trap.](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6349c629163ebe85bcbd09a1_Scammed%20Using%20Apple%20Pay.png)
Scammed Using Apple Pay? Here's How To Get Your Money Back
Were you scammed on Apple Pay? Here’s how you can identify common Apple Pay scams and dispute fraudulent charges to try and get your money back.
![Illustration of a thief climbing the side of a larger-than-life IP address marker](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/65a173f115a77837b9cd9298_65a1737736748460f31a550d_IP%20address%20hacked.webp)
Was Your IP Address Hacked? How To Tell & What To Do
If your IP address is hacked, scammers can gain enough information to break into your financial accounts or steal your identity. Here’s how to stay safe.
text
![Illustration of the Apple logo inside of a trap.](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6349c629163ebe85bcbd09a1_Scammed%20Using%20Apple%20Pay.png)
Scammed Using Apple Pay? Here's How To Get Your Money Back
Were you scammed on Apple Pay? Here’s how you can identify common Apple Pay scams and dispute fraudulent charges to try and get your money back.
![Illustration of a thief climbing the side of a larger-than-life IP address marker](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/65a173f115a77837b9cd9298_65a1737736748460f31a550d_IP%20address%20hacked.webp)
Was Your IP Address Hacked? How To Tell & What To Do
If your IP address is hacked, scammers can gain enough information to break into your financial accounts or steal your identity. Here’s how to stay safe.
![What is credit protection: Header image](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6349b865bf6579782e6aeaf2_Credit%20Protection.png)
What Is Credit Protection? 4 Options (and How To Choose)
Credit protection covers a wide range of tools that can protect your finances. Learn about the most common types of credit protection and how to choose.
![Debt collector scams illustration](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657ab6af4d1a5202b9d1cb9_6439ad2a977a5f3f110e45f0_Debt%2520Collector%2520Scams.png)
Debt Collector Scams: How To Tell If a Debt Collector Is Legit
Did you get a phone call, letter, or message about unfamiliar debt? It could be a scam. Learn the latest debt collector scams and how to stay safe.
![What Can Scammers Do With Your Passport Number?](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/643717160e3455a17806f5d5_What%20Can%20Someone%20Do%20With%20Your%20Passport%20Number.png)
What Can Scammers Do With Your Passport Number?
A compromised passport number can lead to identity theft and fraud. Learn how to tell if your passport number is stolen and how to protect yourself.
![What is whaling phishing? Illustration](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657aad46459bcc481ea6e3b_6435c2be23038efde4b2a5bb_What%2520is%2520Whaling.png)
What Is Whaling Phishing? How To Avoid Executive Fraud
Whaling — also known as CEO fraud — is a type of phishing attack that targets and/or impersonates C-level executives in a company.