Digital Security 101
![Illustration of a computer screen with an image of a lock on it, symbolizing that it is protected against online threats](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/64d53f62d18378633c2da98a_Aura%20vs%20Bark.webp)
Aura vs. Bark: How To Choose the Best Parental Control App
Aura vs. Bark is a hot debate — which is the best parental controls app to keep your kids safe online? It’s time to find out.
![Illustration of a piece of ID with a keyhole icon for a face, on top of a wallet to symbolize the cost of identity theft](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/66bb7a372e2e396eb8c25e5b_66bb7a011823c6b25ba27e84_How-does-identity-theft-insurance-work-lead-image.webp)
Identity Theft Insurance Coverage, Limits, and Exclusions
Identity theft insurance helps reimburse stolen funds, legal fees, and other recovery costs associated with ID fraud. Coverage may vary by plan.
![Illustration of a credit utilization wheel with a combination lock inside of it](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/65e0f56d42e50dfb35801cfc_65e0f51f00da797c5bcfe74a_How%20to%20lock%20your%20credit.webp)
How To Lock Your Credit With All Three Bureaus
Credit locks are one of the best tools available for protecting your credit file from fraud and errors — but are more complicated than a fraud alert.
![An illustration of a check](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6356cfacd7a8f81bb5614a42_Stolen-tax-refund-check-header-image.png)
Stolen Tax Refund Check? Here’s How To Get Your Money Back
Tax season is scam season. If someone stole your tax refund check or filed for one under your name, here's how you can get it back and protect yourself.
![Illustration of a bag of money with a warning sign on the front.](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6384c32f2abcc704abe44faa_Loan-fraud-header.png)
Loan Fraud Explained: How Scammers Get Free Money In Your Name
If a criminal steals your identity, they can get loans on cars, homes, and businesses in your name. Here’s how to stop loan fraud from happening to you.
![Illustration of an iPad with the Bark logo on its screen](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/65d671645f257b3c43573f7f_65d66f90b0c4d54b0389aa04_Is%20Bark%20parental%20controls%20worth%20it.webp)
Is Bark Worth It? What Parents Should Know Before Buying
Bark has been a leader in parental controls software for years — but many users complain about its functionality and how easy it is to circumvent.
![Illustration of a laptop with a money symbol on the screen](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657aadd17221877f53aa413_65d66b30651db07ff43227a3_65d66a812d620351b2f1fa22_Online%2520Banking%2520Security.webp)
Online Banking Security: How To Keep Your Accounts Safe
Banks spend millions on online security — but it’s not always enough to keep scammers out. Follow these steps to secure your online bank account.
![Illustration of a padlock casting a shadow in the shape of a profile icon](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657aada4bc8b269f0ced337_65d65d024bb7903d562a0f3b_How%2520to%2520properly%2520set%2520up%2520your%2520social%2520media%2520privacy%2520settings.png)
How To Properly Set Up Your Social Media Privacy Settings
Scammers, stalkers, and hackers can use public information on your social media profiles to target you — unless you change your privacy settings.
text
![Illustration of the profile view of a masked man; a metaphor for catfishing or other online scams](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657ab69e869eae303f3451a_65a17c78fec2cd615379f35f_65a17bf7b06b7db68ca996e5_Types%2520of%2520social%2520engineering%2520attacks.webp)
Extortion Scams: What To Know & How To Protect Yourself
Extortion is a crime recognized by both state and federal laws. If you or someone you know has been extorted, follow these steps to minimize damage.
![Illustration of a credit or debit card being pulled away on a fishing lure; a metaphor for financial fraud](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657ab679d5c79d3fc295d19_65a8dad443a1be5ff2468eea_65a8daa6a3b5627fdc0d4a9d_someone-used-my-credit-card-without-my-card-lead-image.webp)
Hacked Debit Card? 9 Ways To Protect Your Money
Most often, thieves “hack” debit cards with skimmers on POS terminals. Keeping a close eye on card statements, using contactless payments can help.
![Illustration of a shield with an exclamation mark on it; the shield is hanging on a wire fence](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657aad6fa12cafe97eb3dda_65297d5060f5d2796d5939c4_65297cb7bc3e2514c0e8140a_VPN%2520scams.webp)
11 Top VPN Features, What To Look For Before You Buy
Most extensive VPN features can be overwhelming — like split tunneling or DNS leak protection. If you’re only looking to stream, game, keep it simple.
![Illustration of the ID Watchdog logo at the top of a checklist](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657aadec7aa6a70ac7998a4_65f4a6682ba41fbbe6443adf_65f4a55dc6c9ff00c61ace46_Is%2520ID%2520Watchdog%2520worth%2520it.webp)
Is ID Watchdog Worth It? What To Know Before You Buy
ID Watchdog offers one of the best insurance policies in the industry — but its lack of digital security and questionable data policies are problematic.
![Illustration of the IdentityIQ logo](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/65f48a1fe59a986a6e1e5ae4_65f488c3ffef53e9e03cd236_IdentityIQ%20review.webp)
IdentityIQ Review: Is It Really Worth It?
IdentityIQ offers one of the most affordable basic plans for ID theft protection — but can leave you vulnerable even on its higher-priced plans.
![Illustration of an iPhone casting a shadow in the shape of a question mark](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657aadb4b88d219d57b46b2_65ef8d1d8ec9a59ee384241e_65ef8aecab7976f1dfabd89c_How%2520to%2520properly%2520set%2520up%2520your%2520iphone%2520privacy%2520settings.webp)
How To Properly Set Up Your Privacy Settings on iPhones
Your iPhone’s default privacy settings are relatively strong, but they can leave you vulnerable to data losses and hacking — unless you make these changes.