Digital Security 101
![Illustration of a piece of ID with a keyhole icon for a face, on top of a wallet to symbolize the cost of identity theft](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/66bb7a372e2e396eb8c25e5b_66bb7a011823c6b25ba27e84_How-does-identity-theft-insurance-work-lead-image.webp)
Identity Theft Insurance Coverage, Limits, and Exclusions
Identity theft insurance helps reimburse stolen funds, legal fees, and other recovery costs associated with ID fraud. Coverage may vary by plan.
![Illustration of the Chrome logo casting a shadow in the shape of a crossed-out circle](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/67a4f966f6dca7e10b7b5539_67a4f9239abdea3a4cb13e67_How%20to%20block%20ads%20on%20Chrome.webp)
How To Block Ads on Chrome (Android, iPhone, and Desktop)
Google Chrome includes built-in tools to help block some ads and pop-ups — but a third-party ad blocker is a better bet for an ad-free browsing experience.
![Illustration of a finger pressing a block button on an iPhone app](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657ab66ffde397f4ad57afb_6601f3683d021e5a9c42c9f4_6601f1f5a19c43b927ac3ffb_How%2520to%2520block%2520apps%2520on%2520iPhones.png)
How To Block Apps on iPhones: What Parents Need To Know
Knowing how to block apps on iPhones is crucial to shielding kids from online threats such as smartphone addictions, scams, and cyberbullying.
![Illustration of a letter with a flag coming out of it](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657ab6544ba86ad41d47f11_65fcb2990653cc3f5332eadd_65fcac868936037769d19998_How%2520to%2520identify%2520phishing%2520emails.webp)
How To Quickly Identify Phishing Emails (13 Red Flags)
Clicking on links or responding to phishing emails can put you at risk of identity theft, hacking, or fraud. Check for these red flags before you react.
![Illustration showing a magnifying glass placed in front of a credit card](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657aadbf4d1a5202b9cafca_65fb24c2166b51f1ba958bfd_65fb2492ebc5f077de54ce86_Credit-card-skimmer-lead-image.webp)
Here’s How You Can Prevent Credit Card Cloning
Cloned cards are fraudulent copies of real credit or debit cards. Hacked POS terminals and skimmers can both easily give away card information.
![Illustration of the profile view of a masked man; a metaphor for catfishing or other online scams](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657ab69e869eae303f3451a_65a17c78fec2cd615379f35f_65a17bf7b06b7db68ca996e5_Types%2520of%2520social%2520engineering%2520attacks.webp)
Extortion Scams: What To Know & How To Protect Yourself
Extortion is a crime recognized by both state and federal laws. If you or someone you know has been extorted, follow these steps to minimize damage.
![Illustration of a credit or debit card being pulled away on a fishing lure; a metaphor for financial fraud](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657ab679d5c79d3fc295d19_65a8dad443a1be5ff2468eea_65a8daa6a3b5627fdc0d4a9d_someone-used-my-credit-card-without-my-card-lead-image.webp)
Hacked Debit Card? 9 Ways To Protect Your Money
Most often, thieves “hack” debit cards with skimmers on POS terminals. Keeping a close eye on card statements, using contactless payments can help.
![Illustration of a shield with an exclamation mark on it; the shield is hanging on a wire fence](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657aad6fa12cafe97eb3dda_65297d5060f5d2796d5939c4_65297cb7bc3e2514c0e8140a_VPN%2520scams.webp)
11 Top VPN Features, What To Look For Before You Buy
Most extensive VPN features can be overwhelming — like split tunneling or DNS leak protection. If you’re only looking to stream, game, keep it simple.
text
![Illustration of four Social Security cards stacked like dominoes](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6349cd874aa9f576666513ba_What-can-someone-do-with-your-social-security-number-header-image.png)
What Can Someone Do with Your Social Security Number?
It’s easier than ever for scammers to get your SSN. Learn what someone can do with your Social Security number (and how to keep it safe).
![Illustration of an hourglass inside of an app symbol](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657aae1ce73dd7c6cea2af0_660f1f5ebdca7bbb5c09b9f3_660f1f124b6da9515f75a14a_How%2520to%2520set%2520time%2520limits%2520on%2520apps.webp)
How To Set Time Limits on Apps To Control Screen Time
Whether you’re trying to control your child’s screen time or your own, setting time limits can be a powerful tool — if you know how to do it properly.
![Illustration of the Avast logo in front of a mirror reflecting back the Aura logo](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/660f1a6d651eba2cdbcbacc6_660f19b236d229644de1851c_Is%20Avast%20safe.webp)
Is Avast Safe? What To Know Before You Buy
Avast is a popular antivirus software option — but recent data privacy concerns have made some users skeptical about whether it’s still the right choice.
![Illustration of the Canopy, Bark, and Aura logos on sticky notes](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/660d77b191383b16cdabdee9_660d77708023e36d2eede931_Canopy%20vs.%20Bark%20vs.%20Aura.webp)
Canopy vs Bark: How To Choose Which One Is Best For You
Parental control apps like Canopy and Bark can block adult content, giving parents a sense of safety — but do these apps do enough to keep kids safe online?
![Illustration of a shield with a keyhole and question mark at its center](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657aae06dfe8f4e72ff9ba6_64b805c5bf117ac8f3a7bdf1_Do%2520I%2520need%2520a%2520VPN.webp)
Is a VPN Worth It? What To Know Before You Use One
A VPN alone can't protect you from phishing or malware; still, for the average user they can be useful. With other security tools, they’re more effective.
![Illustration of a file folder with viruses coming out of it.](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657aae2df5d500653f14779_660c943d3477f430bb105db1_660c93ba4ee60ee9c0b1be28_How%2520to%2520remove%2520virsues%2520from%2520your%2520computer.webp)
How To Remove Viruses From Your Computer (Mac and PC)
It’s important that you act quickly as soon as you see signs that your computer has been infected with a virus to limit damage and protect your identity.