Digital Security 101
![Illustration of the Chrome logo casting a shadow in the shape of a crossed-out circle](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/67a4f966f6dca7e10b7b5539_67a4f9239abdea3a4cb13e67_How%20to%20block%20ads%20on%20Chrome.webp)
How To Block Ads on Chrome (Android, iPhone, and Desktop)
Google Chrome includes built-in tools to help block some ads and pop-ups — but a third-party ad blocker is a better bet for an ad-free browsing experience.
![Illustrations of an iMac screen with a warning symbol](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/67a409757518f8097c35fa0d_67a40927fcf2740848f4453a_How%20to%20remove%20viruses%20from%20Mac.webp)
How To Remove Viruses From Mac Computers
Hackers use malware to infect your Mac, spy on you, or hold your sensitive files hostage — but with a few steps, you can clear your Mac of most infections.
![Illustration of a credit score tracker](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/638640db9069187c4b3c1840_credit-lock-vs-credit-freeze-header.png)
Credit Lock vs. Credit Freeze: Which One Is More Secure?
Credit freeze, security freeze, and credit lock are often used interchangeably — however, there are key differences between them you should know.
![Stolen social security card: Header image](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6349c569aad0e676488a6175_Stolen%20Social%20Security%20Card.png)
Stolen Social Security Card? Here’s What To Do
As long as SSNs are used as unique identifiers, scammers will target them. Learn what to do if your Social Security card is stolen or missing.
![An illustration of a fraudulent FEMA contractor against a battered window](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657ab69f2c95a0e129ae395_634dadbdd2c42670230fa380_FEMA%2520Scams.png)
7 Ways to Spot FEMA Scams and Protect Your Relief Money
When disasters strike, scammers aren't far behind. These seven common FEMA scams could roil your disaster relief benefits when you most need it.
![An illustration of a laptop with a warning sign displayed on the screen](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657ab698080ba51971d567b_63a23a873853df4556214574_Emerging-cyber-threats-header-image.png)
The 21 Latest Emerging Cyber Threats to Avoid
Cybercrime has increased by 600% in the past two years. Learn about the latest emerging cyber threats and how to protect yourself online.
![What to do if your phone is stolen.](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6349c379ef1ff8ee37e54de1_Stolen%20Phone.png)
Stolen Phone? Don't Panic! Follow These 11 Steps Now
Scammers can do more damage than you think with a stolen phone. Here’s what to do if your phone is stolen to protect your identity and more from fraudsters.
![Illustration of a smartphone with the Instagram logo on it](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6349c3f2a8dfe5a61486bd62_How%20to%20Recover%20a%20Hacked%20Instagram%20Account.png)
How to Recover a Hacked Instagram Account [Step by Step]
Was your Instagram account hacked? Don’t panic. Follow this step-by-step guide on what to do if your Instagram is hacked and you’ve been locked out.
text
![An illustration showing a mail icon placed over a block icon](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657ab6c8080ba51971d5a8a_6495fd7cbc8f12f4851b079a_Coinbase-scam-emails-header.webp)
How To Recognize and Report Coinbase Scam Emails
Fraudsters use Coinbase scam emails to impersonate the company and dupe users into sharing login information. Here’s what can happen after.
![Illustration of the Chase bank logo on a stop sign](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6495f43ed6880faa049a5147_Chase%20Bank%20Scams.png)
The 7 Latest Chase Bank Scams (and How To Avoid Them)
Are you a Chase Bank customer? Don’t get scammed! Learn about the 7 latest Chase Bank scams (and how to avoid them).
![Is credit monitoring worth it? - illustration](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657aadf4b88d219d57b4c06_6495dfa92bffa4b0225e440c_Is%2520Credit%2520Monitoring%2520Worth%2520It.png)
Is Credit Monitoring Actually Worth It? How To Decide
Credit monitoring can protect you against fraud. But do you need to pay for it? Learn what credit monitoring does and how to decide if you need it.
![Illustration of a credit card protected inside of a glass case](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657ab65ce73dd7c6ceaa0d2_6356cdc217b49564644ed602_How-to-prevent-credit-card-fraud-header-image.png)
How To Prevent Credit Card Fraud: 10 Essential Steps
Criminals use your physical card or stolen credit card numbers to make purchases in your name or impersonate you — here's how you can stop them.
![How to block text messages from unknown numbers - illustration](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/64936fe7b9176a7e1e272934_Block%20Text%20Messages%20from%20Unknown%20Numbers.png)
How To Block Text Messages From Unknown Numbers (NEW)
Is your phone being bombarded with text messages from strangers? Learn the easiest ways to block text messages from unknown numbers.
![Illustration of a see-saw with a credit score on one side and an avatar icon on the other.](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657ab6c31f88a25c357e17f_64936ada0ee09a42b3b06b10_Credit%2520Monitoring%2520vs%2520Identity%2520theft%2520Protection.png)
Do You Need Credit Monitoring or Identity Theft Protection?
What protects you (and your finances) more: identity theft protection or credit monitoring? Learn the benefits (and limitations) of both in this showdown.