Digital Security 101
![Illustration of a computer screen with an image of a lock on it, symbolizing that it is protected against online threats](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/64d53f62d18378633c2da98a_Aura%20vs%20Bark.webp)
Aura vs. Bark: How To Choose the Best Parental Control App
Aura vs. Bark is a hot debate — which is the best parental controls app to keep your kids safe online? It’s time to find out.
![Illustration of a piece of ID with a keyhole icon for a face, on top of a wallet to symbolize the cost of identity theft](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/66bb7a372e2e396eb8c25e5b_66bb7a011823c6b25ba27e84_How-does-identity-theft-insurance-work-lead-image.webp)
Identity Theft Insurance Coverage, Limits, and Exclusions
Identity theft insurance helps reimburse stolen funds, legal fees, and other recovery costs associated with ID fraud. Coverage may vary by plan.
![Illustration of one hand passing a check to another where the shadow of the check is an exclamation mark, indicating a scam](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657ab65ea49d5bca91f9d60_64e7e4100a91570428339d64_64e7e3f07bf19f614c72d2bd_How-to-prevent-check-fraud-lead-image.webp)
How To Prevent Check Washing: 8 Steps
Personal and pre-printed checks carry the highest risk of being washed. Here are eight ways to prevent check washing.
![Illustration of a fishing rod emerging from an envelope on a laptop screen as if to indicate a phishing email](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/65282af97ae4be5ae1873a26_65282aca65ccd0bcf0af3995_Phishing-email-examples-lead-image.webp)
20 Phishing Email Examples: What Not To Fall For In 2024
Spotting a scam email isn't easy if you don't know the signs. Here are 20 phishing email examples that might look real at first.
![Illustration of two traffic yield signs in the same pattern as the AnyDesk logo to signify AnyDesk scams](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/645452695fa2b08e46129989_AnyDesk%20Scams.webp)
Is AnyDesk Safe To Download? Avoid These 7 AnyDesk Scams
Did someone ask you to download AnyDesk? Slow down, as it could be a scam. Learn how AnyDesk scams work and how to keep yourself safe.
![Illustration of a smartphone with a tag hanging off of it with an exclamation mark to signify a warning about scams.](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657ab6d17221877f53b2dfe_6356cd305110b9facf12a3bb_Black-Friday-Cyber-Monday-scams-header-image.png)
How To Avoid Black Friday & Cyber Monday Scams (2023)
Black Friday & Cyber Monday scams are on the rise. Learn 9 common ways con artists are defrauding holiday shoppers this year.
![Illustration of a hand holding a smartphone with a question mark on the screen](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657aad9458b16e71abeb8c0_64f8d7e23b105b744bc23eae_64f8d7a89f42da585ee81f42_Unknown%2520callers%2520-%2520lead%2520illustration.webp)
What Are “Spam Risk” Phone Calls? Why Do They Keep Calling?
AT&T identifies an unwanted or potentially harmful call as a “Spam Risk”. Answering these calls could do more than just increase scam call frequency.
![Types of hackers](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657aad705a9dfa3988a4270_6349c1990124c0b3efac2dcd_Types-of-hackers-header-image.png)
The 15 Types of Hackers (And How To Protect Yourself)
Cybercrime is the fastest growing crime in America. Learn about the different types of hackers, who they’re after, and how to protect yourself.
text
![Illustration of a text message bubble with a question mark on it](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/67a282791f4c270f7514abec_67a281fc58e79a90355dad5a_Can%20you%20get%20hacked%20by%20responding%20to%20a%20text%20message.webp)
No, You Can't Get Hacked By Responding To a Text Message
While you can’t be hacked simply by responding to a text message, it makes you vulnerable to more serious scams and threats that could put you in danger.
![An illustration of taped headshot displayed on a phone screen](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6408cf0fd7afcc663400b1f2_My%20phone%20Number%20is%20Being%20Spoofed.png)
My Phone Number Is Being Spoofed — What Can I Do?
If scammers have spoofed your phone number, you could end up with a massive phone bill or worse. Learn what to do if your phone number is being spoofed.
![An illustration of a calculator with an exclamation mark made out of the buttons](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/642f2b1a2d6011c38b9a62be_Someone%20Used%20My%20SSN%20To%20File%20Taxes.png)
Did Someone File Taxes In Your Name? Here’s What To Do
If someone used your personal information and SSN to file taxes, you need to report the issues immediately and protect yourself against identity theft.
![An illustration of a paper note with a refresh icon](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657aad84b88d219d57b4269_63e146cbb6d8be776ede1e1d_Tax-refund-scams-header-image.png)
The 13 Latest Tax Refund Scams You Need To Know
Criminals use your stolen information to file fraudulent tax returns in your name and pocket the refund — unless you know how to spot the warning signs.
![An illustration of an incoming call appearing on a phone that is handheld](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657aae0ea49d5bca91f2d50_6408cf3688848fed98d2daf4_IRS%2520Scams.png)
10 IRS Scams You Need To Avoid This Tax Season
Scammers impersonate the IRS during tax season to trick you into sending them money or providing sensitive information — here’s what you need to know.
![Illustration of a Social Security card with coins stacked on top of it and a warning symbol](https://cdn.prod.website-files.com/6082ee0e95eb6459d78fac06/6657aad97d0a8053ce5976e4_63e143719810c4f79d904ebb_Tax%2520Identity%2520Theft.png)
How To Protect Yourself Against Tax Identity Theft
If scammers use stolen information to file taxes in your name, it can cost you time, energy, and even money — unless you put protective measures in place.