Digital Security 101
Did Someone File Taxes In Your Name? Here’s What To Do
If someone used your personal information and SSN to file taxes, you need to report the issues immediately and protect yourself against identity theft.
The 13 Latest Tax Refund Scams You Need To Know
Criminals use your stolen information to file fraudulent tax returns in your name and pocket the refund — unless you know how to spot the warning signs.
Trending Articles
Amazon Account Hacked? Here's How To Recover It
If someone hacks your Amazon account, they can steal your credit card details or even your identity. Learn how to spot and recover a hacked Amazon account.
Tired of Unknown Callers? How To Uncover (and Block) Them
Talking with unknown callers could expose you to fraud or identity theft. Find out how to stop them and keep your entire family safe.
How To Tell If Your Computer Has a Virus (and Remove It)
Is your computer acting strangely? Learn how to recognize if your computer has a virus and what to do next to stay safe and secure.
What To Do With an Old SIM Card (Don't Throw It Out!)
Old SIM cards can put you at risk of hacking and identity theft. Learn what to do with your old SIM card to keep yourself safe and secure.
Help! A Family Member Opened a Credit Card In My Name
It’s a crime for a family member to open a credit card in your name (and without your knowledge). Here’s how to handle this precarious situation.
What To Do If Your Personal Information Has Been Compromised
Your personal information — including your email, phone number, and even SSN — can be compromised in a data breach or hack, putting you at risk of fraud.
text
How To Block Apps on iPhones: What Parents Need To Know
Knowing how to block apps on iPhones is crucial to shielding kids from online threats such as smartphone addictions, scams, and cyberbullying.
How To Quickly Identify Phishing Emails (13 Red Flags)
Clicking on links or responding to phishing emails can put you at risk of identity theft, hacking, or fraud. Check for these red flags before you react.
Here’s How You Can Prevent Credit Card Cloning
Cloned cards are fraudulent copies of real credit or debit cards. Hacked POS terminals and skimmers can both easily give away card information.
Extortion Scams: What To Know & How To Protect Yourself
Extortion is a crime recognized by both state and federal laws. If you or someone you know has been extorted, follow these steps to minimize damage.
Hacked Debit Card? 9 Ways To Protect Your Money
Most often, thieves “hack” debit cards with skimmers on POS terminals. Keeping a close eye on card statements, using contactless payments can help.
11 Top VPN Features, What To Look For Before You Buy
Most extensive VPN features can be overwhelming — like split tunneling or DNS leak protection. If you’re only looking to stream, game, keep it simple.