Digital Security 101
![Illustration of the Chrome logo casting a shadow in the shape of a crossed-out circle](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/67a4f966f6dca7e10b7b5539_67a4f9239abdea3a4cb13e67_How%20to%20block%20ads%20on%20Chrome.webp)
How To Block Ads on Chrome (Android, iPhone, and Desktop)
Google Chrome includes built-in tools to help block some ads and pop-ups — but a third-party ad blocker is a better bet for an ad-free browsing experience.
![Illustrations of an iMac screen with a warning symbol](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/67a409757518f8097c35fa0d_67a40927fcf2740848f4453a_How%20to%20remove%20viruses%20from%20Mac.webp)
How To Remove Viruses From Mac Computers
Hackers use malware to infect your Mac, spy on you, or hold your sensitive files hostage — but with a few steps, you can clear your Mac of most infections.
![What is credit protection: Header image](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6349b865bf6579782e6aeaf2_Credit%20Protection.png)
What Is Credit Protection? 4 Options (and How To Choose)
Credit protection covers a wide range of tools that can protect your finances. Learn about the most common types of credit protection and how to choose.
![Debt collector scams illustration](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657ab6af4d1a5202b9d1cb9_6439ad2a977a5f3f110e45f0_Debt%2520Collector%2520Scams.png)
Debt Collector Scams: How To Tell If a Debt Collector Is Legit
Did you get a phone call, letter, or message about unfamiliar debt? It could be a scam. Learn the latest debt collector scams and how to stay safe.
![What Can Scammers Do With Your Passport Number?](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/643717160e3455a17806f5d5_What%20Can%20Someone%20Do%20With%20Your%20Passport%20Number.png)
What Can Scammers Do With Your Passport Number?
A compromised passport number can lead to identity theft and fraud. Learn how to tell if your passport number is stolen and how to protect yourself.
![What is whaling phishing? Illustration](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657aad46459bcc481ea6e3b_6435c2be23038efde4b2a5bb_What%2520is%2520Whaling.png)
What Is Whaling Phishing? How To Avoid Executive Fraud
Whaling — also known as CEO fraud — is a type of phishing attack that targets and/or impersonates C-level executives in a company.
![Netflix scams: Header image](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657aaddc0616c076342c107_635ab78f10f6a4c14e3008f0_how-to-tell-if-an-email-is-from-a-scammer-header.png)
New Netflix Scams: Why Someone Could Be After Your Account
Phishing emails make up the lion’s share of all Netflix scams today, but there are other ways that you could be caught off guard.
![Worst hacked celebrities of all time: Header image](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657ab68ea49d5bca91f9edc_6356caca494640e202a445dd_Hacked-celebrities-header-image.png)
80+ of the Worst Hacked Celebrities From the Last Decade
Hackers have targeted celebrities from Rihanna to Arianna Grande. But you don’t have to be famous to be on their list. Here’s how to keep yourself safe.
text
![Illustration of someone peeking out from behind a speech bubble on a laptop screen](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657ab6859b23a9d54e93ccc_649362d43b1bbfc750eb630f_Google%2520Chat%2520Scams.webp)
How To Avoid Google Chat Scams (9 Warning Signs)
Scammers have started targeting victims via Google Chat. Learn about the latest Google Chat scams, how to spot a scammer, and what to do if you’re a victim.
![An illustration of a magnifying glass superimposed on the Instagram logo](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657aae06459bcc481ea7804_6349b2b32250caad7e54cea3_Instagram%2520scams.png)
The 10 Biggest Instagram Scams Happening Right Now
Instagram scammers can create fake accounts or hack into Instagram accounts that you follow. Here are 10 Instagram scams to steer clear of this year.
![An illustration of an SSN card with a scammer taking out the numbers from the middle](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657ab6722a355c07e1953e2_634daf4eb818bb6d4cb644e7_How%2520Can%2520Social%2520Security%2520Identity%2520Theft%2520Occur.png)
How Can Social Security Identity Theft Occur? [9 Ways]
Social Security identity theft happens when scammers use your SSN to steal government benefits, take out loans in your name, and worse.
![examples of fraud](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/634db1db670df4965fc9a7bf_Examples%20of%20Fraud.png)
Examples of Fraud, Scams & Schemes to Avoid Right Now
Fraud and digital theft has surpassed physical theft. Learn how to identify common examples of fraud. Safeguard your loved ones and your finances, ASAP.
![An illustration of a stranger spying over someone's shoulder](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657aada886804e723f766aa_6356cc0ace34029a6c78b8d5_Shoulder-surfing-header-image.png)
What Is Shoulder Surfing? How It Happens & How to Avoid It
Shoulder surfing has evolved from scammers with prying eyes to advanced schemes using the latest technologies. Here’s how to protect your data in public.
![How do hackers get into your computer - illustration](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6349d038c744014c8d342fd1_How-do-hackers-get-into-your-computer-header-image.png)
How Hackers Get Into Your Computer (And How To Stop Them)
How do hackers get into your computer? Cybercriminals have numerous scams they can use to break into your device. Here’s how to keep them out.