Digital Security 101
![Illustration of a piece of ID with a keyhole icon for a face, on top of a wallet to symbolize the cost of identity theft](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/66bb7a372e2e396eb8c25e5b_66bb7a011823c6b25ba27e84_How-does-identity-theft-insurance-work-lead-image.webp)
Identity Theft Insurance Coverage, Limits, and Exclusions
Identity theft insurance helps reimburse stolen funds, legal fees, and other recovery costs associated with ID fraud. Coverage may vary by plan.
![Illustration of the Chrome logo casting a shadow in the shape of a crossed-out circle](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/67a4f966f6dca7e10b7b5539_67a4f9239abdea3a4cb13e67_How%20to%20block%20ads%20on%20Chrome.webp)
How To Block Ads on Chrome (Android, iPhone, and Desktop)
Google Chrome includes built-in tools to help block some ads and pop-ups — but a third-party ad blocker is a better bet for an ad-free browsing experience.
![An illustration of a laptop in the shape of a folder with the image of a skull on its top, symbolizing a computer virus](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/651b44f9be1e5d44ce4017ac_651b449ccafee687e06bfa1a_How%20to%20detect%20malware%20on%20your%20computer%20and%20phone.webp)
How To Detect Malware on Your Computer or Phone
Hackers only need a minute to wreak havoc on your finances and identity. Learn how to detect malware quickly and shut down cybercriminals.
![Illustration of an intruder passing through what seems like a life-size iPhone where its screen is a door](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/63c70d8ab4316f4fc812fab4_Can%20Someone%20Hack%20My%20iPhone.png)
Can Someone Hack My iPhone? How To Tell & What To Do
iPhones can’t be “hacked” in the traditional sense — but scammers have found numerous ways to access your data, photos, Apple ID, and other accounts.
![Illustration of a hand pulling a tiny hacker out of a smartphone](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6557cc6c9db4fdbbb6858a46_6557cc1c47a955094a771aa3_How%20to%20remove%20a%20hacker%20from%20my%20phone.webp)
Answered: How To Remove a Hacker From Your Smartphone
Deleting suspicious apps, resetting your device, and recovering hacked accounts are among the best ways to remove a hacker from your smartphone.
![Illustration of a laptop with bars over the screen and tentacles reaching out as if there is a virus being contained inside.](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657ab6ac7aa6a70ac7a1be6_65495c57a09741392586e313_65495b20dd64fa0a25ab3d0b_Do%2520you%2520need%2520antivirus%2520software_.webp)
Do You Need Antivirus? These Questions Can Help You Decide
With advances in built-in tools, many security experts claim you don’t need a third-party antivirus software provider. But that’s not the case for everyone.
![Illustration of a magnifying glass with footprints](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/64bf0c878e8b896cb3b1e56b_Track%20Down%20Someone%20Who%20Scammed%20You.webp)
How To Track Down Someone Who Scammed You (and What To Do Next)
Did you get scammed and want to find out who did it? Here’s everything you need to know about tracking down scammers (and what your options are).
![Illustration of a smartphone surrounded by arrows in the style of the USPhoneBook.com logo](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/667ee16870a616cdfbae8e86_667eddb9268d5e422184ec7b_USPhoneBook%20Opt%20Out.webp)
USPhoneBook Opt Out Guide: How To Remove Your Info
USPhoneBook.com collects and shares personal data, which can put you at risk of harassment or even identity theft — unless you remove your information.
text
![An illustration of an eraser wiping out the icon showing a person](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/64874659450442e78932c4c7_how-to-remove-yourself-from-data-broker-sites-header.webp)
How To Remove Yourself From Data Broker Sites
Understanding privacy policies and opt-outs could be the only way to learn how to remove yourself from data broker sites.
![Illustration of a credit utilization wheel with a combination lock inside of it](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/65e0f56d42e50dfb35801cfc_65e0f51f00da797c5bcfe74a_How%20to%20lock%20your%20credit.webp)
How To Lock Your Credit With All Three Bureaus
Credit locks are one of the best tools available for protecting your credit file from fraud and errors — but are more complicated than a fraud alert.
![An illustration of a check](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6356cfacd7a8f81bb5614a42_Stolen-tax-refund-check-header-image.png)
Stolen Tax Refund Check? Here’s How To Get Your Money Back
Tax season is scam season. If someone stole your tax refund check or filed for one under your name, here's how you can get it back and protect yourself.
![Illustration of a bag of money with a warning sign on the front.](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6384c32f2abcc704abe44faa_Loan-fraud-header.png)
Loan Fraud Explained: How Scammers Get Free Money In Your Name
If a criminal steals your identity, they can get loans on cars, homes, and businesses in your name. Here’s how to stop loan fraud from happening to you.
![Illustration of an iPad with the Bark logo on its screen](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/65d671645f257b3c43573f7f_65d66f90b0c4d54b0389aa04_Is%20Bark%20parental%20controls%20worth%20it.webp)
Is Bark Worth It? What Parents Should Know Before Buying
Bark has been a leader in parental controls software for years — but many users complain about its functionality and how easy it is to circumvent.
![Illustration of a laptop with a money symbol on the screen](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657aadd17221877f53aa413_65d66b30651db07ff43227a3_65d66a812d620351b2f1fa22_Online%2520Banking%2520Security.webp)
Online Banking Security: How To Keep Your Accounts Safe
Banks spend millions on online security — but it’s not always enough to keep scammers out. Follow these steps to secure your online bank account.