Digital Security 101
![Illustration of the Chrome logo casting a shadow in the shape of a crossed-out circle](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/67a4f966f6dca7e10b7b5539_67a4f9239abdea3a4cb13e67_How%20to%20block%20ads%20on%20Chrome.webp)
How To Block Ads on Chrome (Android, iPhone, and Desktop)
Google Chrome includes built-in tools to help block some ads and pop-ups — but a third-party ad blocker is a better bet for an ad-free browsing experience.
![Illustrations of an iMac screen with a warning symbol](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/67a409757518f8097c35fa0d_67a40927fcf2740848f4453a_How%20to%20remove%20viruses%20from%20Mac.webp)
How To Remove Viruses From Mac Computers
Hackers use malware to infect your Mac, spy on you, or hold your sensitive files hostage — but with a few steps, you can clear your Mac of most infections.
![Illustration of a credit score tracker](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/638640db9069187c4b3c1840_credit-lock-vs-credit-freeze-header.png)
Credit Lock vs. Credit Freeze: Which One Is More Secure?
Credit freeze, security freeze, and credit lock are often used interchangeably — however, there are key differences between them you should know.
![Stolen social security card: Header image](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6349c569aad0e676488a6175_Stolen%20Social%20Security%20Card.png)
Stolen Social Security Card? Here’s What To Do
As long as SSNs are used as unique identifiers, scammers will target them. Learn what to do if your Social Security card is stolen or missing.
![An illustration of a fraudulent FEMA contractor against a battered window](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657ab69f2c95a0e129ae395_634dadbdd2c42670230fa380_FEMA%2520Scams.png)
7 Ways to Spot FEMA Scams and Protect Your Relief Money
When disasters strike, scammers aren't far behind. These seven common FEMA scams could roil your disaster relief benefits when you most need it.
![An illustration of a laptop with a warning sign displayed on the screen](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657ab698080ba51971d567b_63a23a873853df4556214574_Emerging-cyber-threats-header-image.png)
The 21 Latest Emerging Cyber Threats to Avoid
Cybercrime has increased by 600% in the past two years. Learn about the latest emerging cyber threats and how to protect yourself online.
![What to do if your phone is stolen.](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6349c379ef1ff8ee37e54de1_Stolen%20Phone.png)
Stolen Phone? Don't Panic! Follow These 11 Steps Now
Scammers can do more damage than you think with a stolen phone. Here’s what to do if your phone is stolen to protect your identity and more from fraudsters.
![Illustration of a smartphone with the Instagram logo on it](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6349c3f2a8dfe5a61486bd62_How%20to%20Recover%20a%20Hacked%20Instagram%20Account.png)
How to Recover a Hacked Instagram Account [Step by Step]
Was your Instagram account hacked? Don’t panic. Follow this step-by-step guide on what to do if your Instagram is hacked and you’ve been locked out.
text
![What is a data breach - illustration](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657aad5fa12cafe97eb3d7e_6449a1d36d021bab7082f72f_What%2520is%2520a%2520Data%2520Breach.webp)
What Is a Data Breach? (And How To Protect Your Data)
What is a data breach, and how can you protect your personal information? Find out everything you need to know to stay safe.
![How to read a credit report - illustration](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657aae259b23a9d54e8baeb_64822589aba43676fa3f848c_How%2520to%2520Read%2520a%2520Credit%2520Report.webp)
How To Read a Credit Report (and Dispute Errors)
Fraud and errors on your credit reports could be damaging your credit score. Learn how to read your credit reports and dispute any incorrect information.
![Illustration of an open briefcase full of money](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657ab6531f88a25c357d31a_64821f1835c05c64b353b671_How%2520to%2520Protect%2520Against%2520Ransomware.png)
How To Protect Against Ransomware: 10 Prevention Tips
Ransomware gangs don’t only target large organizations and government agencies. Learn what you can do to protect yourself against ransomware.
![How To Prove a Debt Is Not Yours - lead illustration](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657aae3fa12cafe97eb4778_647fac2292d3fc734d93e357_How%2520to%2520Prove%2520a%2520Debt%2520is%2520Not%2520Yours.webp)
How To Prove a Debt Is Not Yours (and Dispute It)
Did you find a strange debt in your name? It could be a sign of identity theft. Learn how to prove a debt is not yours and protect yourself against fraud.
![Work from home scams - illustration](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/645e8e6c8f9a01149361bdb2_Home%20Title%20Theft.webp)
The 10 Latest Work From Home Scams You Need To Know
Are you looking for a new job? Don’t get caught by a work-from-home scam. Here’s how to stay safe while looking for work online.
![An illustration of an office setup with an erect flag on a desk](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6349c60fe48a4285fe396adb_Job%20Scams.png)
20+ Early Warning Signs That All Point to a Job Scam
It’s hard to spot a phony recruiter, if you don’t know what you’re looking for. Watch out for these red flags and learn how to identify job scams right away.