Digital Security 101
How To Delete Your Facebook Account (and All Its Data)
While you can delete (or deactivate) your Facebook account at any time, Meta may hold onto your data for up to another six months afterward.
No, You Can't Get Hacked By Responding To a Text Message
While you can’t be hacked simply by responding to a text message, it makes you vulnerable to more serious scams and threats that could put you in danger.
Trending Articles
How To Dispute a Credit Card Charge in 9 Steps
If you see fraudulent charges or errors on your credit card statement you need to know how to properly dispute them quickly.
How To Identify a Military Romance Scam: 17 Warning Signs
There’s nothing more vile than someone pretending to be a service member to scam you. But military romance scams are real. Here’s how to spot them.
How To Remove Hard Inquiries From Your Credit Report
Here’s how to remove hard inquiries from your credit report if you suspect fraud. Unfamiliar and undisputed hard checks might cost you your identity.
How To Tell If An Email Is From a Scammer [With Examples]
Did you receive an email from PayPal or Amazon asking to confirm your account details? Could it be legitimate or a scam? Here's how to tell.
Credit Lock vs. Credit Freeze: Which One Is More Secure?
Credit freeze, security freeze, and credit lock are often used interchangeably — however, there are key differences between them you should know.
Stolen Social Security Card? Here’s What To Do
As long as SSNs are used as unique identifiers, scammers will target them. Learn what to do if your Social Security card is stolen or missing.
text
How To Block Websites on Your iPhone or iPad
Parental controls on Apple devices show you how to block websites on iPhones and iPads. But here are other (universal) tools to set up age-gated content.
How To Remember Passwords (and Secure Your Accounts)
Do you know how to remember passwords that hackers can’t guess? Learn how to create and store strong passwords to protect your accounts.
What Is Credential Stuffing? (And How To Protect Yourself)
What is credential stuffing? If you reuse passwords, it’s time to understand this cyber threat and how to stop it — before it’s too late.
Employment Identity Theft: How To Tell If You're a Victim
Criminals may be using your identity to gain employment or pass background checks. Learn how to spot the warning signs of employment identity theft.
10 Warning Signs of Cyberbullying (& What To Do)
The signs of cyberbullying can be hard to spot. But to keep your children safe, you need to get to know them. Here’s what to look for →
What To Do With Old Computers (Before Throwing Them Away)
Not sure what to do with an old computer or device? Learn what data is on your old computer and how to properly trash, recycle, sell, or repurpose it.