Blog
Jan 8, 20259420 min read
Presentation Attack Detection (PAD) explained
Dec 30, 20248319 min read
Why every business needs identity theft protection
Feb 1, 2023105914 min
Smishing – Protect Your Business From This Growing Threat
Jan 27, 2023122417 min
Phishing – Tips, tricks, and strategies to protect your business and customers
Jan 25, 2023151817 min
Account Takeover Fraud: A comprehensive guide for businesses
Jan 19, 2023340717 min
Bank Fraud – Types and examples
Jan 13, 202313889 min
Wire fraud – how to avoid fraudsters
Jan 6, 2023137126 min
Identity proofing – Prove your identity in the digital world
Dec 28, 202213048 min
Synthetic Identity Fraud – How to Prevent it?
Dec 22, 202217957 min
What Are Money Transfer Scams and How to Avoid Them?
Dec 15, 202212172 min
RTL Interview: How to fight fraud? – CEO of Fraud.com – Emre Sayin
Dec 14, 2022239211 min
Application Fraud – Everything You Need to Know to Detect it and Prevent it
Dec 7, 2022153511 min
Return Fraud – How do you detect it and fight It?
Dec 2, 2022140313 min
Payment Fraud – How to Protect Yourself and Your Business?
Nov 29, 2022143711 min
Remote customer onboarding – A new approach to customer onboarding
Nov 23, 2022141421 min
Customer onboarding – Process and examples
Nov 21, 202214759 min
DeepFake – Everything You Need to Know to Spot a Deepfake
Nov 16, 202214869 min
How to fight fraud: Understanding the Technology
Nov 15, 202212705 min
Behavioral Red Flags of Occupational Fraud
Nov 10, 2022151610 min
Face Recognition – How Does it Work & Help Improve Your Security
Nov 8, 2022163217 min