Blog
Jan 8, 2025 282 20 min read
Presentation Attack Detection (PAD) explained
Dec 30, 2024 266 19 min read
Why every business needs identity theft protection
Feb 1, 2023 1251 14 min
Smishing – Protect Your Business From This Growing Threat
Jan 27, 2023 1468 17 min
Phishing – Tips, tricks, and strategies to protect your business and customers
Jan 25, 2023 1819 17 min
Account Takeover Fraud: A comprehensive guide for businesses
Jan 19, 2023 3980 17 min
Bank Fraud – Types and examples
Jan 13, 2023 1741 9 min
Wire fraud – how to avoid fraudsters
Jan 6, 2023 1728 26 min
Identity proofing – Prove your identity in the digital world
Jan 4, 2023 2049 10 min
Knowledge-Based Authentication (KBA) – Powerful verification based on personal information
Dec 28, 2022 1573 8 min
Synthetic Identity Fraud – How to Prevent it?
Dec 22, 2022 2282 7 min
What Are Money Transfer Scams and How to Avoid Them?
Dec 15, 2022 1379 2 min
RTL Interview: How to fight fraud? – CEO of Fraud.com – Emre Sayin
Dec 14, 2022 2768 11 min
Application Fraud – Everything You Need to Know to Detect it and Prevent it
Dec 7, 2022 1764 11 min
Return Fraud – How do you detect it and fight It?
Dec 2, 2022 1626 13 min
Payment Fraud – How to Protect Yourself and Your Business?
Nov 29, 2022 1637 11 min
Remote customer onboarding – A new approach to customer onboarding
Nov 23, 2022 1632 21 min
Customer onboarding – Process and examples
Nov 21, 2022 1775 9 min
DeepFake – Everything You Need to Know to Spot a Deepfake
Nov 16, 2022 1721 9 min
How to fight fraud: Understanding the Technology
Nov 15, 2022 1473 5 min
Behavioral Red Flags of Occupational Fraud
Nov 10, 2022 1786 10 min
Face Recognition – How Does it Work & Help Improve Your Security
Nov 8, 2022 2017 17 min






















