Blog
Jan 8, 202513220 min read
Presentation Attack Detection (PAD) explained
Dec 30, 202411819 min read
Why every business needs identity theft protection
Feb 1, 2023110114 min
Smishing – Protect Your Business From This Growing Threat
Jan 27, 2023127617 min
Phishing – Tips, tricks, and strategies to protect your business and customers
Jan 25, 2023157317 min
Account Takeover Fraud: A comprehensive guide for businesses
Jan 19, 2023354617 min
Bank Fraud – Types and examples
Jan 13, 202314479 min
Wire fraud – how to avoid fraudsters
Jan 6, 2023142726 min
Identity proofing – Prove your identity in the digital world
Dec 28, 202213668 min
Synthetic Identity Fraud – How to Prevent it?
Dec 22, 202218937 min
What Are Money Transfer Scams and How to Avoid Them?
Dec 15, 202212562 min
RTL Interview: How to fight fraud? – CEO of Fraud.com – Emre Sayin
Dec 14, 2022246411 min
Application Fraud – Everything You Need to Know to Detect it and Prevent it
Dec 7, 2022158811 min
Return Fraud – How do you detect it and fight It?
Dec 2, 2022145413 min
Payment Fraud – How to Protect Yourself and Your Business?
Nov 29, 2022147811 min
Remote customer onboarding – A new approach to customer onboarding
Nov 23, 2022146721 min
Customer onboarding – Process and examples
Nov 21, 202215349 min
DeepFake – Everything You Need to Know to Spot a Deepfake
Nov 16, 202215289 min
How to fight fraud: Understanding the Technology
Nov 15, 202213145 min
Behavioral Red Flags of Occupational Fraud
Nov 10, 2022156810 min
Face Recognition – How Does it Work & Help Improve Your Security
Nov 8, 2022170317 min