Digital Security 101
![Illustration of a computer screen with an image of a lock on it, symbolizing that it is protected against online threats](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/64d53f62d18378633c2da98a_Aura%20vs%20Bark.webp)
Aura vs. Bark: How To Choose the Best Parental Control App
Aura vs. Bark is a hot debate — which is the best parental controls app to keep your kids safe online? It’s time to find out.
![Illustration of a piece of ID with a keyhole icon for a face, on top of a wallet to symbolize the cost of identity theft](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/66bb7a372e2e396eb8c25e5b_66bb7a011823c6b25ba27e84_How-does-identity-theft-insurance-work-lead-image.webp)
Identity Theft Insurance Coverage, Limits, and Exclusions
Identity theft insurance helps reimburse stolen funds, legal fees, and other recovery costs associated with ID fraud. Coverage may vary by plan.
![Illustration of a smartphone with a location marker on it](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/65cea36aaf52835724f3fd3f_65cea324337460e1ca6cdf35_How%20can%20someone%20track%20my%20location.webp)
How Can Someone Track My Location? (How To Stop Them)
Scammers and stalkers can track your location by using spyware or legal apps on your phone — unless you follow these steps to keep your location private.
![Illustration of a briefcase with the LinkedIn logo embossed on the front](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657aade0603147425ad9f36_65ce7ec0748babb80180caae_65ce7d7b723e2e96494de040_How%2520to%2520spot%2520LinkedIn%2520Job%2520scams.webp)
How To Spot LinkedIn Job Scams (11 Warning Signs)
Scammers use LinkedIn to post fake job listings, impersonate recruiters, and trick you into giving them sensitive information or sending money.
![Illustration of a smartphone with virus symbols all over the screen](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/65ce77d2ba132385975a63f2_65ce765e5492920b5309edae_How%20to%20know%20if%20your%20phone%20has%20a%20virus.webp)
How To Know If Your Phone Has a Virus
Unfamiliar apps and strange phone behavior are a few of the warning signs that your device has been infected and you need to take action immediately.
![Illustration of the IDShield logo casting a shadow in the shape of a question mark](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/65ce74ea074a2b822792e552_65ce723fd1f18ed1bd92cd84_Is%20IDShield%20Worth%20It.webp)
Is IDShield Worth It? What To Know Before Buying
IDShield claims to provide all-in-one protection against identity theft, fraud, and hacking — but has issues that could leave you vulnerable.
![Illustration of the LifeLock logo with a tag hanging off of it with the AARP logo](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/65ce6ffaed1f04b84b25f1cc_65ce6e9694e2ee0f742553d2_Is%20AARP%20Identity%20Theft%20Protection%20worth%20it.webp)
AARP Identity Theft Protection Review: Is It Worth It?
AARP offers a discounted version of LifeLock to its customers — but with limitations that could leave you vulnerable to hacking, identity theft, and fraud.
![Illustration of a phone's screen being taken over by pop-up ads, as if to show that they may contain spam](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657aad908ad9eacdf9d5a42_65a9c9b9dea43dd0e62ab0be_65a9c96cbe493c17f05a45c4_How%2520to%2520stop%2520pop-up%2520ads%2520on%2520Android%2520phones.webp)
10 Online Survey Scams and What They Hope You’ll Fall For
Scammers send fake surveys via spam texts, calls, or emails touting products and rewards — all to harvest sensitive information.
text
![Illustration of the profile view of a masked man; a metaphor for catfishing or other online scams](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657ab69e869eae303f3451a_65a17c78fec2cd615379f35f_65a17bf7b06b7db68ca996e5_Types%2520of%2520social%2520engineering%2520attacks.webp)
Extortion Scams: What To Know & How To Protect Yourself
Extortion is a crime recognized by both state and federal laws. If you or someone you know has been extorted, follow these steps to minimize damage.
![Illustration of a credit or debit card being pulled away on a fishing lure; a metaphor for financial fraud](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657ab679d5c79d3fc295d19_65a8dad443a1be5ff2468eea_65a8daa6a3b5627fdc0d4a9d_someone-used-my-credit-card-without-my-card-lead-image.webp)
Hacked Debit Card? 9 Ways To Protect Your Money
Most often, thieves “hack” debit cards with skimmers on POS terminals. Keeping a close eye on card statements, using contactless payments can help.
![Illustration of a shield with an exclamation mark on it; the shield is hanging on a wire fence](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657aad6fa12cafe97eb3dda_65297d5060f5d2796d5939c4_65297cb7bc3e2514c0e8140a_VPN%2520scams.webp)
11 Top VPN Features, What To Look For Before You Buy
Most extensive VPN features can be overwhelming — like split tunneling or DNS leak protection. If you’re only looking to stream, game, keep it simple.
![Illustration of the ID Watchdog logo at the top of a checklist](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657aadec7aa6a70ac7998a4_65f4a6682ba41fbbe6443adf_65f4a55dc6c9ff00c61ace46_Is%2520ID%2520Watchdog%2520worth%2520it.webp)
Is ID Watchdog Worth It? What To Know Before You Buy
ID Watchdog offers one of the best insurance policies in the industry — but its lack of digital security and questionable data policies are problematic.
![Illustration of the IdentityIQ logo](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/65f48a1fe59a986a6e1e5ae4_65f488c3ffef53e9e03cd236_IdentityIQ%20review.webp)
IdentityIQ Review: Is It Really Worth It?
IdentityIQ offers one of the most affordable basic plans for ID theft protection — but can leave you vulnerable even on its higher-priced plans.
![Illustration of an iPhone casting a shadow in the shape of a question mark](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657aadb4b88d219d57b46b2_65ef8d1d8ec9a59ee384241e_65ef8aecab7976f1dfabd89c_How%2520to%2520properly%2520set%2520up%2520your%2520iphone%2520privacy%2520settings.webp)
How To Properly Set Up Your Privacy Settings on iPhones
Your iPhone’s default privacy settings are relatively strong, but they can leave you vulnerable to data losses and hacking — unless you make these changes.