Skip to main content
Displaying 1 - 20 of 46
Article

Kids and Cell Phones

When you decide your kid is ready for a cell phone, here are some tools to help you think about setting limits, keeping them safe, and teaching them how to use their phones responsibly.
Article

Nonconsensual Distribution of Intimate Images: What To Know

Did someone take or share an intimate image or video of you without your consent? That’s known as nonconsensual distribution of intimate images. If that’s happened to you or someone you know, here’s information to help you decide what to do.
Article

Credit Freeze or Fraud Alert: What's Right for Your Credit Report?

Credit freezes and fraud alerts can help protect you from identity theft. They can also help stop someone who stole your identity from continuing to misuse it. Credit freezes and fraud alerts work in different ways. Learn the differences, how to place a freeze or alert, and how long they last. Your personal situation will determine which one is right for you.
Article

Malware: How To Protect Against, Detect, and Remove It

Malware is one of the biggest threats to the security of your computer, tablet, phone, and other devices. Learn how to protect yourself, how to tell if your device has malware, and how to remove it.
Article

What To Know About Identity Theft

Learn what identity theft is, how to protect yourself against it, and how to know if someone stole your identity.

Article

What To Know About Medical Identity Theft

Learn what medical identity theft is, how to protect yourself from it, and how to know and what to do if someone is using your medical information.
Article

Stalkerware: What To Know

Do you think an abusive partner or ex is monitoring you through your phone? They might be using stalkerware to secretly track your device activity. Learn more about stalkerware, how to tell if it’s on your device, and what to do if it is.
Article

How To Recover Your Hacked Email or Social Media Account

There are lots of ways to protect your personal information and data from scammers. But what happens if your email or social media account gets hacked? Here are some quick steps to help you recover your email or social media account.
Article

Are Public Wi-Fi Networks Safe? What You Need To Know

Public Wi-Fi networks, or hotspots, in coffee shops, malls, airports, hotels, and other places are convenient. In the early days of the internet, they often weren’t secure. But things have changed. Here’s what you need to know about your safety when you connect to a public Wi-Fi network.
Article

How To Secure Your Home Wi-Fi Network

Your home networks might have a range of wireless devices on them — from computers and phones to IP cameras, voice assistants, smart TVs, and connected appliances. Taking some basic steps to secure your home Wi-Fi network will help protect your devices from getting hacked — and your information from getting stolen.
Article

How To Recognize and Avoid Phishing Scams

Scammers use email or text messages to trick you into giving them your personal and financial information. But there are several ways to protect yourself.