Digital Security 101
![Illustration of the Chrome logo casting a shadow in the shape of a crossed-out circle](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/67a4f966f6dca7e10b7b5539_67a4f9239abdea3a4cb13e67_How%20to%20block%20ads%20on%20Chrome.webp)
How To Block Ads on Chrome (Android, iPhone, and Desktop)
Google Chrome includes built-in tools to help block some ads and pop-ups — but a third-party ad blocker is a better bet for an ad-free browsing experience.
![Illustrations of an iMac screen with a warning symbol](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/67a409757518f8097c35fa0d_67a40927fcf2740848f4453a_How%20to%20remove%20viruses%20from%20Mac.webp)
How To Remove Viruses From Mac Computers
Hackers use malware to infect your Mac, spy on you, or hold your sensitive files hostage — but with a few steps, you can clear your Mac of most infections.
![Illustration of a credit score tracker](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/638640db9069187c4b3c1840_credit-lock-vs-credit-freeze-header.png)
Credit Lock vs. Credit Freeze: Which One Is More Secure?
Credit freeze, security freeze, and credit lock are often used interchangeably — however, there are key differences between them you should know.
![Stolen social security card: Header image](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6349c569aad0e676488a6175_Stolen%20Social%20Security%20Card.png)
Stolen Social Security Card? Here’s What To Do
As long as SSNs are used as unique identifiers, scammers will target them. Learn what to do if your Social Security card is stolen or missing.
![An illustration of a fraudulent FEMA contractor against a battered window](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657ab69f2c95a0e129ae395_634dadbdd2c42670230fa380_FEMA%2520Scams.png)
7 Ways to Spot FEMA Scams and Protect Your Relief Money
When disasters strike, scammers aren't far behind. These seven common FEMA scams could roil your disaster relief benefits when you most need it.
![An illustration of a laptop with a warning sign displayed on the screen](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657ab698080ba51971d567b_63a23a873853df4556214574_Emerging-cyber-threats-header-image.png)
The 21 Latest Emerging Cyber Threats to Avoid
Cybercrime has increased by 600% in the past two years. Learn about the latest emerging cyber threats and how to protect yourself online.
![What to do if your phone is stolen.](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6349c379ef1ff8ee37e54de1_Stolen%20Phone.png)
Stolen Phone? Don't Panic! Follow These 11 Steps Now
Scammers can do more damage than you think with a stolen phone. Here’s what to do if your phone is stolen to protect your identity and more from fraudsters.
![Illustration of a smartphone with the Instagram logo on it](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6349c3f2a8dfe5a61486bd62_How%20to%20Recover%20a%20Hacked%20Instagram%20Account.png)
How to Recover a Hacked Instagram Account [Step by Step]
Was your Instagram account hacked? Don’t panic. Follow this step-by-step guide on what to do if your Instagram is hacked and you’ve been locked out.
text
![Illustration of someone peeking out from behind a speech bubble on a laptop screen](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657ab6859b23a9d54e93ccc_649362d43b1bbfc750eb630f_Google%2520Chat%2520Scams.webp)
How To Avoid Google Chat Scams (9 Warning Signs)
Scammers have started targeting victims via Google Chat. Learn about the latest Google Chat scams, how to spot a scammer, and what to do if you’re a victim.
![An illustration of a magnifying glass superimposed on the Instagram logo](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657aae06459bcc481ea7804_6349b2b32250caad7e54cea3_Instagram%2520scams.png)
The 10 Biggest Instagram Scams Happening Right Now
Instagram scammers can create fake accounts or hack into Instagram accounts that you follow. Here are 10 Instagram scams to steer clear of this year.
![An illustration of an SSN card with a scammer taking out the numbers from the middle](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657ab6722a355c07e1953e2_634daf4eb818bb6d4cb644e7_How%2520Can%2520Social%2520Security%2520Identity%2520Theft%2520Occur.png)
How Can Social Security Identity Theft Occur? [9 Ways]
Social Security identity theft happens when scammers use your SSN to steal government benefits, take out loans in your name, and worse.
![examples of fraud](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/634db1db670df4965fc9a7bf_Examples%20of%20Fraud.png)
Examples of Fraud, Scams & Schemes to Avoid Right Now
Fraud and digital theft has surpassed physical theft. Learn how to identify common examples of fraud. Safeguard your loved ones and your finances, ASAP.
![An illustration of a stranger spying over someone's shoulder](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657aada886804e723f766aa_6356cc0ace34029a6c78b8d5_Shoulder-surfing-header-image.png)
What Is Shoulder Surfing? How It Happens & How to Avoid It
Shoulder surfing has evolved from scammers with prying eyes to advanced schemes using the latest technologies. Here’s how to protect your data in public.
![How do hackers get into your computer - illustration](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6349d038c744014c8d342fd1_How-do-hackers-get-into-your-computer-header-image.png)
How Hackers Get Into Your Computer (And How To Stop Them)
How do hackers get into your computer? Cybercriminals have numerous scams they can use to break into your device. Here’s how to keep them out.