Archive

SIM Swap Fraud

Learn More

SIM swap fraud is a type of account takeover attack that involves fraudsters deceiving service provider into…

SIM swap fraud is a type of account takeover attack that involves fraudsters deceiving service provider into transferring existing phone numbers to new phones.

Phishing Attacks

Learn More

Phishing attacks are on the rise. Modern fraudsters use them in increasingly sophisticated ways, and legacy fraud…

Phishing attacks are on the rise. Modern fraudsters use them in increasingly sophisticated ways, and legacy fraud solutions are failing to adapt.

URL Shortener Spam

Learn More

What is URL Shortener Spam? URL Shortener Spam is a technique used by spammers to evade detection and blacklisting for…

What is URL Shortener Spam? URL Shortener Spam is a technique used by spammers to evade detection and blacklisting for the purposes of spreading malicious content. The fraud is achieved by “masking” a malicious link through the use of a link shortening service such as Bitly, or any other of……

P2P VPN Networks

Learn More

What is a P2P VPN Service? A virtual private network (VPN) allows users to send and receive data, typically…

What is a P2P VPN Service? A virtual private network (VPN) allows users to send and receive data, typically encrypted, across public or shared networks. The data is sent as though the device were connected directly to the private network. When a device is actively using a VPN, any…

Device Emulators

Learn More

What is a Device Emulator? A device emulator is software that creates a virtual simulation of a computer environment,…

What is a Device Emulator? A device emulator is software that creates a virtual simulation of a computer environment, hardware, operating system, or CPU. Fraudsters use device emulators to create many synthetic devices (usually smartphones) that run on and are controlled from a single computer en…

GPS Spoofing

Learn More

What is GPS Spoofing? GPS spoofing is a technique used to fake the GPS location of a device. GPS spoofing is also…

What is GPS Spoofing? GPS spoofing is a technique used to fake the GPS location of a device. GPS spoofing is also referred to as location spoofing. This technique is used primarily on mobile phones, although some tablets feature built-in GPS. A fraudster may spoof the location of a device……

Call Center Scams

Learn More

What is a Call Center Scam? A call center scam is where a fraudster phones a call center and impersonates a real…

What is a Call Center Scam? A call center scam is where a fraudster phones a call center and impersonates a real customer with the goal of taking over that person’s account or obtaining personal information that can be used for other fraud attacks. Some fraudsters target a financial…

Bot Attacks

Learn More

What is a Bot? A bot is a software application that is programmed to perform repetitive, automated tasks over the…

What is a Bot? A bot is a software application that is programmed to perform repetitive, automated tasks over the internet. Thanks to bots, fraudsters can automate many of the tasks necessary to commit various forms of online fraud. Fraudsters today can initiate massive bot attacks to commit nearly…

Web Scraping

Learn More

What is Web Scraping? Web scraping refers to the automated extraction of large volumes of data from web pages and…

What is Web Scraping? Web scraping refers to the automated extraction of large volumes of data from web pages and applications. Once obtained, this data can be used for a wide variety of purposes. Web scraping is often referred to as data scraping, screen scraping, or content scraping. Common…