Blog
Jan 8, 2025 309 20 min read
Presentation Attack Detection (PAD) explained
Dec 30, 2024 291 19 min read
Why every business needs identity theft protection
Feb 1, 2023 1264 14 min
Smishing – Protect Your Business From This Growing Threat
Jan 27, 2023 1500 17 min
Phishing – Tips, tricks, and strategies to protect your business and customers
Jan 25, 2023 1842 17 min
Account Takeover Fraud: A comprehensive guide for businesses
Jan 19, 2023 4021 17 min
Bank Fraud – Types and examples
Jan 13, 2023 1756 9 min
Wire fraud – how to avoid fraudsters
Jan 6, 2023 1747 26 min
Identity proofing – Prove your identity in the digital world
Jan 4, 2023 2069 10 min
Knowledge-Based Authentication (KBA) – Powerful verification based on personal information
Dec 28, 2022 1596 8 min
Synthetic Identity Fraud – How to Prevent it?
Dec 22, 2022 2312 7 min
What Are Money Transfer Scams and How to Avoid Them?
Dec 15, 2022 1386 2 min
RTL Interview: How to fight fraud? – CEO of Fraud.com – Emre Sayin
Dec 14, 2022 2789 11 min
Application Fraud – Everything You Need to Know to Detect it and Prevent it
Dec 7, 2022 1783 11 min
Return Fraud – How do you detect it and fight It?
Dec 2, 2022 1653 13 min
Payment Fraud – How to Protect Yourself and Your Business?
Nov 29, 2022 1647 11 min
Remote customer onboarding – A new approach to customer onboarding
Nov 23, 2022 1647 21 min
Customer onboarding – Process and examples
Nov 21, 2022 1802 9 min
DeepFake – Everything You Need to Know to Spot a Deepfake
Nov 16, 2022 1752 9 min
How to fight fraud: Understanding the Technology
Nov 15, 2022 1487 5 min
Behavioral Red Flags of Occupational Fraud
Nov 10, 2022 1816 10 min
Face Recognition – How Does it Work & Help Improve Your Security
Nov 8, 2022 2059 17 min






















