Digital Security 101
![Illustration of a computer screen with an image of a lock on it, symbolizing that it is protected against online threats](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/64d53f62d18378633c2da98a_Aura%20vs%20Bark.webp)
Aura vs. Bark: How To Choose the Best Parental Control App
Aura vs. Bark is a hot debate — which is the best parental controls app to keep your kids safe online? It’s time to find out.
![Illustration of a piece of ID with a keyhole icon for a face, on top of a wallet to symbolize the cost of identity theft](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/66bb7a372e2e396eb8c25e5b_66bb7a011823c6b25ba27e84_How-does-identity-theft-insurance-work-lead-image.webp)
Identity Theft Insurance Coverage, Limits, and Exclusions
Identity theft insurance helps reimburse stolen funds, legal fees, and other recovery costs associated with ID fraud. Coverage may vary by plan.
![How does identity theft happen: Header image](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6349c4cce5ca7098291b4667_How-does-identity-theft-happen-header-image.png)
How Does Identity Theft Happen? (and How To Avoid It)
Fraudsters have more ways than ever to steal your identity. But by learning their scams, you can help keep your identity, finances, and family safe.
![Illustration of a finger pressing a block button on an iPhone app](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657ab66ffde397f4ad57afb_6601f3683d021e5a9c42c9f4_6601f1f5a19c43b927ac3ffb_How%2520to%2520block%2520apps%2520on%2520iPhones.png)
How To Block Apps on iPhones: What Parents Need To Know
Knowing how to block apps on iPhones is crucial to shielding kids from online threats such as smartphone addictions, scams, and cyberbullying.
![Illustration of a letter with a flag coming out of it](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657ab6544ba86ad41d47f11_65fcb2990653cc3f5332eadd_65fcac868936037769d19998_How%2520to%2520identify%2520phishing%2520emails.webp)
How To Quickly Identify Phishing Emails (13 Red Flags)
Clicking on links or responding to phishing emails can put you at risk of identity theft, hacking, or fraud. Check for these red flags before you react.
![Illustration showing a magnifying glass placed in front of a credit card](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657aadbf4d1a5202b9cafca_65fb24c2166b51f1ba958bfd_65fb2492ebc5f077de54ce86_Credit-card-skimmer-lead-image.webp)
Here’s How You Can Prevent Credit Card Cloning
Cloned cards are fraudulent copies of real credit or debit cards. Hacked POS terminals and skimmers can both easily give away card information.
![Illustration of the profile view of a masked man; a metaphor for catfishing or other online scams](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657ab69e869eae303f3451a_65a17c78fec2cd615379f35f_65a17bf7b06b7db68ca996e5_Types%2520of%2520social%2520engineering%2520attacks.webp)
Extortion Scams: What To Know & How To Protect Yourself
Extortion is a crime recognized by both state and federal laws. If you or someone you know has been extorted, follow these steps to minimize damage.
![Illustration of a credit or debit card being pulled away on a fishing lure; a metaphor for financial fraud](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657ab679d5c79d3fc295d19_65a8dad443a1be5ff2468eea_65a8daa6a3b5627fdc0d4a9d_someone-used-my-credit-card-without-my-card-lead-image.webp)
Hacked Debit Card? 9 Ways To Protect Your Money
Most often, thieves “hack” debit cards with skimmers on POS terminals. Keeping a close eye on card statements, using contactless payments can help.
text
![Illustration of the LifeLock logo with a tag hanging off of it with the AARP logo](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/65ce6ffaed1f04b84b25f1cc_65ce6e9694e2ee0f742553d2_Is%20AARP%20Identity%20Theft%20Protection%20worth%20it.webp)
AARP Identity Theft Protection Review: Is It Worth It?
AARP offers a discounted version of LifeLock to its customers — but with limitations that could leave you vulnerable to hacking, identity theft, and fraud.
![Illustration of a phone's screen being taken over by pop-up ads, as if to show that they may contain spam](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657aad908ad9eacdf9d5a42_65a9c9b9dea43dd0e62ab0be_65a9c96cbe493c17f05a45c4_How%2520to%2520stop%2520pop-up%2520ads%2520on%2520Android%2520phones.webp)
10 Online Survey Scams and What They Hope You’ll Fall For
Scammers send fake surveys via spam texts, calls, or emails touting products and rewards — all to harvest sensitive information.
![Illustration of an hourglass with coins instead of sand inside, symbolizing the short-term nature of payday loans.](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/65305ef6137bc4a37ee2f09a_65304d2a28193f7f2d279fef_Payday%20Loan%20Scams.webp)
5 Payday Loan Scams You Didn't Know About (Until Now)
Payday loans can be helpful when you need money fast — but how do you know if they’re legitimate? Learn the warning signs of common payday loan scams.
![Illustration of a hacker typing on a keyboard in front of a shield](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657ab6a5a82d972a2b27786_64b80a30bf117ac8f3ade6f5_Does%2520a%2520VPN%2520Protect%2520You%2520From%2520Hackers.webp)
Does a VPN Protect You From Hackers? What To Know
A virtual private network (VPN) alone won’t keep you safe from hackers and online scammers. Learn how to protect yourself from online threats.
![Illustration of a stack of Bumble logos with a broken heart in the middle of each.](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/64b6fc79180e30bab2ac9e5c_How%20to%20Spot%20a%20Bumble%20Scammer.png)
How To Spot a Bumble Scammer: Avoid These 6 Bumble Scams
Dating and romance scammers have invaded Bumble. Learn how to spot a Bumble scammer and avoid the latest online dating scams before it’s too late.
![An illustration of a tilting phone displaying an abstract social media app icon](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657ab652aabaee605735b47_6384c59b1a6431afed885c7d_How-to-protect-your-personal-information-on-social-header.png)
How To Protect Your Personal Information on Social Media
Using social media is often a trade-off between connection and protection. But with a few small changes you can keep your personal information secure.