Digital Security 101
![Illustration of the Chrome logo casting a shadow in the shape of a crossed-out circle](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/67a4f966f6dca7e10b7b5539_67a4f9239abdea3a4cb13e67_How%20to%20block%20ads%20on%20Chrome.webp)
How To Block Ads on Chrome (Android, iPhone, and Desktop)
Google Chrome includes built-in tools to help block some ads and pop-ups — but a third-party ad blocker is a better bet for an ad-free browsing experience.
![Illustrations of an iMac screen with a warning symbol](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/67a409757518f8097c35fa0d_67a40927fcf2740848f4453a_How%20to%20remove%20viruses%20from%20Mac.webp)
How To Remove Viruses From Mac Computers
Hackers use malware to infect your Mac, spy on you, or hold your sensitive files hostage — but with a few steps, you can clear your Mac of most infections.
![Google Voice verification code scam](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6356c9d44946406669a436c2_Google-verification-code-scam-header-image.png)
How To Avoid the Google Voice Verification Code Scam
Learn why scammers ask for your Google Voice verification code, what they can do with it, and how to protect yourself against Google Voice scams.
![Cash app scams](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6349c35baec7e5156d2b64dc_Cash%20App%20Scams.png)
The 14 Cash App Scams You Didn’t Know About (Until Now)
Cash App is convenient and fast. But is it safe? Not always. Here are the latest Cash App scams to be aware of and how to protect yourself from scammers.
![Illustration of someone holding gift cards like a poker hand with a credit card peeking out of their sleeve](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657aad508ad9eacdf9d582c_6356c91eac223b2bdb6a2588_What-is-carding-header-image.png)
Carding: The Fraud Technique Destroying Your Credit
Online shopping with your credit card is convenient. But can put you at risk of a type of fraud called carding. Learn how to protect yourself today.
text
![Illustration of someone peeking out from behind a speech bubble on a laptop screen](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657ab6859b23a9d54e93ccc_649362d43b1bbfc750eb630f_Google%2520Chat%2520Scams.webp)
How To Avoid Google Chat Scams (9 Warning Signs)
Scammers have started targeting victims via Google Chat. Learn about the latest Google Chat scams, how to spot a scammer, and what to do if you’re a victim.
![An illustration of a magnifying glass superimposed on the Instagram logo](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657aae06459bcc481ea7804_6349b2b32250caad7e54cea3_Instagram%2520scams.png)
The 10 Biggest Instagram Scams Happening Right Now
Instagram scammers can create fake accounts or hack into Instagram accounts that you follow. Here are 10 Instagram scams to steer clear of this year.
![An illustration of an SSN card with a scammer taking out the numbers from the middle](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657ab6722a355c07e1953e2_634daf4eb818bb6d4cb644e7_How%2520Can%2520Social%2520Security%2520Identity%2520Theft%2520Occur.png)
How Can Social Security Identity Theft Occur? [9 Ways]
Social Security identity theft happens when scammers use your SSN to steal government benefits, take out loans in your name, and worse.
![examples of fraud](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/634db1db670df4965fc9a7bf_Examples%20of%20Fraud.png)
Examples of Fraud, Scams & Schemes to Avoid Right Now
Fraud and digital theft has surpassed physical theft. Learn how to identify common examples of fraud. Safeguard your loved ones and your finances, ASAP.
![An illustration of a stranger spying over someone's shoulder](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657aada886804e723f766aa_6356cc0ace34029a6c78b8d5_Shoulder-surfing-header-image.png)
What Is Shoulder Surfing? How It Happens & How to Avoid It
Shoulder surfing has evolved from scammers with prying eyes to advanced schemes using the latest technologies. Here’s how to protect your data in public.
![How do hackers get into your computer - illustration](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6349d038c744014c8d342fd1_How-do-hackers-get-into-your-computer-header-image.png)
How Hackers Get Into Your Computer (And How To Stop Them)
How do hackers get into your computer? Cybercriminals have numerous scams they can use to break into your device. Here’s how to keep them out.