Skip to main content
Displaying 1 - 20 of 46
Article

Kids and Cell Phones

When you decide your kid is ready for a cell phone, here are some tools to help you think about setting limits, keeping them safe, and teaching them how to use their phones responsibly.
Article

Nonconsensual Distribution of Intimate Images: What To Know

Did someone take or share an intimate image or video of you without your consent? That’s known as nonconsensual distribution of intimate images. If that’s happened to you or someone you know, here’s information to help you decide what to do.
Article

Malware: How To Protect Against, Detect, and Remove It

Malware is one of the biggest threats to the security of your computer, tablet, phone, and other devices. Learn how to protect yourself, how to tell if your device has malware, and how to remove it.
Article

Stalkerware: What To Know

Do you think an abusive partner or ex is monitoring you through your phone? They might be using stalkerware to secretly track your device activity. Learn more about stalkerware, how to tell if it’s on your device, and what to do if it is.
Article

How To Recover Your Hacked Email or Social Media Account

There are lots of ways to protect your personal information and data from scammers. But what happens if your email or social media account gets hacked? Here are some quick steps to help you recover your email or social media account.
Article

Are Public Wi-Fi Networks Safe? What You Need To Know

Public Wi-Fi networks, or hotspots, in coffee shops, malls, airports, hotels, and other places are convenient. In the early days of the internet, they often weren’t secure. But things have changed. Here’s what you need to know about your safety when you connect to a public Wi-Fi network.
Article

How To Secure Your Home Wi-Fi Network

Your home networks might have a range of wireless devices on them — from computers and phones to IP cameras, voice assistants, smart TVs, and connected appliances. Taking some basic steps to secure your home Wi-Fi network will help protect your devices from getting hacked — and your information from getting stolen.
Article

How To Recognize and Avoid Phishing Scams

Scammers use email or text messages to trick you into giving them your personal and financial information. But there are several ways to protect yourself.
Article

What to Know About Romance Scams

Romance scammers create fake profiles on dating sites and apps or contact you through popular social media sites like Instagram or Facebook. The scammers strike up a relationship with you to build up trust, sometimes talking or chatting several times a day. Then, they make up a story and ask for money. Learn how to avoid romance scams.