Blog Articles

All Articles

How We Bypassed Safari 17's Advanced Audio Fingerprinting Protection
March 6, 2024

How We Bypassed Safari 17's Advanced Audio Fingerprinting Protection

Learn how Apple Safari 17's new anti-fingerprinting techniques impact audio fingerprinting methods. This article will cover how audio fingerprints are generated and provide a step-by-step breakdown of how to adapt traditional audio fingerprinting techniques for improved browser differentiation.

february product roundup
March 5, 2024

Product roundup: AWS Marketplace, our iOS demo, and more enterprise updates

Learn more about new releases, including Fingerprint on AWS Marketplace, our revamped iOS Device Intelligence Demo, High-Activity Device Smart Signal, Sealed Client Results, and SDK Health Page

The Comprehensive Guide to Firefox's Privacy & Security Features and Settings
March 5, 2024

The Comprehensive Guide to Firefox's Privacy & Security Features and Settings

In this thorough exploration, we go into Firefox's privacy and security mechanisms. We'll shed light on its features such as Enhanced Tracking Protection, Password Management, Browsing in Private Mode, Phishing and Malware Protection, and its Extensions.

Privacy-Focused Browser Settings: What Businesses Need To Know
February 27, 2024

Privacy-Focused Browser Settings: What Businesses Need To Know

Discover the role of privacy-focused settings in the context of fraud risk assessment. This blog post explores why people choose privacy-focused browsers and configurations, the protections they provide, and how they are detected.

The Comprehensive Guide to Safari's Privacy & Security Features and Settings
February 27, 2024

The Comprehensive Guide to Safari's Privacy & Security Features and Settings

In this comprehensive guide, we dive into Safari's privacy and security measures. We'll illuminate topics such as Intelligent Tracking Prevention, Navigation-Based Tracking, Fingerprinting, Password Monitoring, and Secure Payments.

The Power of Real-Time Fraud Detection
February 26, 2024

The Power of Real-Time Fraud Detection in Protecting Your Business

Explore how real-time fraud detection shields transactions, boosts customer trust, and cuts losses. Learn how to harness its power for your business.

E-commerce Fraud Prevention Software
February 25, 2024

8 E-commerce Fraud Prevention Software to Secure Your Online Transactions

Discover the top 8 e-commerce fraud prevention tools to safeguard your online transactions and enhance customer trust.

Best Fraud Prevention Software
February 24, 2024

10 Best Fraud Prevention Software for Protecting Your Business

Explore the top 10 fraud prevention software options for modern businesses of all sizes to secure transactions and data effectively.

suspect score
February 23, 2024

Product Update: Quickly Flag Suspicious Activity with Our New Suspect Score

Learn about our latest product update that simplifies fraud prevention by aggregating multiple signals into one score. Our new Suspect Score uses our Smart Signals and global probabilities to indicate potentially suspicious activity that you can directly use in your fraud prevention models.

Android device fingerprinting
February 23, 2024

Life After ANDROID_ID: Android Identification Made Easy With Device Fingerprinting

Out with the old, in with the new. Discover the power of device fingerprinting for Android devices with Fingerprint.

Browser fingerprinting
February 22, 2024

The Beginner’s Guide to Browser Fingerprinting for Fraud Detection

Learn how browser fingerprinting prevents fraud by accurately identifying users and flagging fraudsters using multiple signals on websites.

Detecting Suspicious Mobile Device Activity with Factory Reset Times
February 22, 2024

Detecting Suspicious Mobile Device Activity with Factory Reset Times

Mobile device factory resets are often performed for legitimate reasons, such as troubleshooting, selling, or improving device performance, and for fraudulent activities. This article looks at how fraudsters use factory resets, along with how to detect suspicious patterns.