Digital Security 101

How To Quickly Identify a Scammer (Online, Phone, and Text)
Data breaches and AI have helped scammers become more convincing — but there are still common red flags that can warn you if you’re being scammed.

What To Do If Your Personal Information Has Been Compromised
Your personal information — including your email, phone number, and even SSN — can be compromised in a data breach or hack, putting you at risk of fraud.

How To Avoid Reverse Mortgage Scams
Scammers target reverse mortgages to try and steal the equity in your home — or worse. Here’s how to know if you’re dealing with a reverse mortgage scam.

How To Protect Your Home Title From Deed Theft
Deed fraud is a devastating scam where criminals forge your identity and steal the title to your home. Protect yourself by knowing the red flags.

The 12 Latest Types of Social Engineering Attacks (2024)
Hackers use social engineering attacks to manipulate you into giving them what they want — passwords, data, and money. Here’s how to protect yourself.

How Do Parental Controls Work? Setting Up Devices at Home
Content filtering, screen time limits, and internet usage all fall under the parental controls umbrella. Here’s how to set these up across devices.

TikTok Parental Controls: An Updated Guide for Parents
TikTok parental controls or Digital Wellbeing tools can manage screen time and content for kids. Turn on these features using this step-by-step guide.

When Should Kids Get Their First Phones?
Deciding when to give your child their first phone will depend on their maturity level, situation, and trust level. Here’s how to know if they’re ready.
text

What Is Credit Protection? 4 Options (and How To Choose)
Credit protection covers a wide range of tools that can protect your finances. Learn about the most common types of credit protection and how to choose.

Debt Collector Scams: How To Tell If a Debt Collector Is Legit
Did you get a phone call, letter, or message about unfamiliar debt? It could be a scam. Learn the latest debt collector scams and how to stay safe.

What Can Scammers Do With Your Passport Number?
A compromised passport number can lead to identity theft and fraud. Learn how to tell if your passport number is stolen and how to protect yourself.

What Is Whaling Phishing? How To Avoid Executive Fraud
Whaling — also known as CEO fraud — is a type of phishing attack that targets and/or impersonates C-level executives in a company.

New Netflix Scams: Why Someone Could Be After Your Account
Phishing emails make up the lion’s share of all Netflix scams today, but there are other ways that you could be caught off guard.

80+ of the Worst Hacked Celebrities From the Last Decade
Hackers have targeted celebrities from Rihanna to Arianna Grande. But you don’t have to be famous to be on their list. Here’s how to keep yourself safe.