Anti Fraud technology Articles

Social Engineering Keyboard
December 8, 2023

What is social engineering? The guide to preventing social engineering attacks

Learn what social engineering is, how it works, technical solutions to detecting social engineering attempts, and ways to prevent social engineering altogether with device intelligence and fraud prevention solutions.

Navigating the Risks of User-Initiated App Cloning
December 5, 2023

Navigating the Risks of User-Initiated App Cloning

Explore the issue of user-initiated app cloning and its implications for business security and integrity. This article offers effective strategies for detecting and mitigating the risks of cloned apps.

login screen illustration
November 30, 2023

5 Common Security Mistakes You’re Making with Your Login Page and How to Fix Them

Learn five common mistakes in login page security and discover effective solutions for each. This in-depth guide discusses the importance of anti-fraud technology, multi-factor authentication, controlled login attempts, secure password storage via hashing, and the avoidance of weak hashing algorithms. Find out how to mitigate bot threats and automate authentication requests for better fraud prevention.

  • Anti Fraud technology
New Account Fraud: What It Is and 3 Ways to Stop It
November 30, 2023

New Account Fraud: What It Is and 3 Ways to Stop It

New account fraud or account creation fraud is an fraudulent act where fraudsters use stolen or fake identities to open new accounts and exploit targets.

fintech fraud dodgeball
November 28, 2023

Navigating the fintech fraud maze: 3 ways fintechs can stop fraud without adding friction

This guide focuses on enhancing fraud detection, building user trust, and strengthening informed decision-making for a safer fintech ecosystem and superior customer experience.

  • Anti Fraud technology
Neobank Image
November 17, 2023

Neobanks: what they are, popular examples, neobank advantages, and common fraud risks with digital-only banks

Explore what neobanks are, their functionality, and how they stand apart from traditional banks. Discover some of the well-known neobanks worldwide, the benefits they offer, and the prevalent fraud risks they face. Additionally, understand how Fingerprint can address these challenges.

whale phishing image
November 16, 2023

What is a Whaling Attack? How whale phishing works

Whale phishing, or 'whaling,' targets high-profile individuals in fraud attempts, exploiting their access to sensitive data. Learn prevention tips.

Anti Money Laundering Guide
November 8, 2023

Anti-Money Laundering and Fraud: Why It Matters and Examples

Learn about Anti-Money Laundering (AML) basics, how money laundering works, the role of international regulations, and effective strategies to prevent it.

How to Detect Repeat Loan Applications and Improve Loan Risk Assessment
November 7, 2023

How to Detect Repeat Loan Applications

Discover how to use our 99.5% accurate visitor identifiers to check for consistency between loan applications. Fingerprint’s identification API allows you to better assess loan risk, even among anonymous users.

SMS OTP Replacement Device Identification
October 10, 2023

Replace SMS OTP with Device Fingerprinting for Strong Customer Authentication (SCA) to minimize customer friction

Learn about PSD2, EBA, and SCA in the context of secure EU and EEA payment regulations. Understand what PSD2 compliance entails and discover how device fingerprinting can replace SMS One-Time Passwords for a comprehensive SCA approach for global organizations.

Reducing Payment Fraud with Reliable Visitor Identification
September 22, 2023

How to Reduce Payment Fraud

Payment fraud is a common issue in online financial transactions for goods or services. In this article, we will cover how using a reliable identification signal can greatly assist in enhancing your credit card anti-fraud workflows.

large language model fraud
September 20, 2023

Guide: Large Language Models-Generated Fraud, Malware, and Vulnerabilities

Discover how fraudsters use Large Language Models (LLMs) to conduct attacks, spread malware, and discover vulnerabilities in our comprehensive guide. Learn about the threats posed by AI-powered language models, understand the new age of automated cybercrime, and learn effective strategies to detect and prevent these sophisticated attacks.