Infographic: The Online Fraudster’s Tool Shed

In March we released our inaugural DataVisor Online Fraud Report, which took a look at our base of more than one billion users across 172+ countries in the world, and fulfilled its mission of arming fraud fighters like our customers with some new intel on how bad actors conduct attacks. [...]

By | May 15th, 2017|Company News, Technical Posts|0 Comments

Guest Post: AML Data Quality – The Challenge of Fitting a Square Peg into a Round Hole

As mentioned in my previous articles, traditional rule-based transaction monitoring systems (TMS) have architectural limitations which make them prone to false positives and false negatives: Naive rules create a plague of false positives that are expensive for investigators to sift through Sophisticated money launderers know how to circumvent rule-based systems [...]

By | April 17th, 2017|Technical Posts|0 Comments

Introducing the DataVisor Online Fraud Report

As DataVisor Co-Founder and CEO Yinglian Xie says in her foreword to the Inaugural DataVisor Online Fraud Report, “Data is power.” We have no shortage of data here at DataVisor and we have taken the opportunity to unlock it and analyze the results. Through our Global Telemetry Network of [...]

By | March 15th, 2017|Company News, Technical Posts, Threat Blogs|0 Comments

Guest Post: The Other Elephant in the Room: Defeating False Negatives in AML Systems

ending the false positive alerts plague, approximately 90-95 percent of alerts generated by Transaction Monitoring Systems (TMS) are false positives. So, why don’t we tighten our rule thresholds to let fewer alerts through? Image Source Unfortunately, tightening thresholds typically increases false negative alerts, which are real [...]

By | March 5th, 2017|Technical Posts|0 Comments

Guest Post: End the False Positive Alerts Plague in Anti-Money Laundering (AML) Systems

Keith Furst is the Founder of Data Derivatives, and has years of experience within a variety of financial institutions including Tier One wholesale banks, investment banks, foreign bank branches, commercial banks, retail banks, broker-dealers, prepaid card providers and merchant acquirers with a focus on implementing, fine tuning and validating financial [...]

By | February 12th, 2017|Technical Posts|0 Comments

Twitter Bots: These are the Droids You’re Looking For

Wondering if your company has any crime rings sleeping among your users? Most will acknowledge that there are likely some accounts lurking here or there, but may not realize that it’s a big problem. This attitude is held by a lot of companies, large and small, and many think they [...]

By | January 23rd, 2017|Quick Takes, Technical Posts|0 Comments

Guest Post: Lock It Down and Smarten Up – Best Practices for Online Security

This is a guest post from Zack Pumerantz, fraud prevention manager at FanDuel. At FanDuel, Zack is responsible for proactive investigation, chargebacks, reporting and training his quickly growing team of cyber crime specialists.  Zack's team brings to the table a ruthless drive to catch criminals, a focused approach and team chemistry [...]

By | October 17th, 2016|Quick Takes, Technical Posts|0 Comments

Bad Account Opening: Fake Accounts and Real Big Trouble

Wells, wells, wells, what do we have here? Last week the news broke that Wells Fargo had “been hit with $185 million in civil penalties for secretly opening millions of unauthorized deposit and credit card accounts that harmed customers,” and the backlash caused by the account opening has been harsh. While [...]

By | September 15th, 2016|Quick Takes, Technical Posts|0 Comments

A Guide To Hiring Your Fraud Team Part 2: Automate, Motivate and Innovate

Matching wits with a nefarious user. Solving a puzzle where you have to find missing clues. Determining what steps they’ll take next. Getting an adrenaline rush when hot on the trail of a bad guy. Protecting good customers and keeping them safe. These all describe a typical day in the [...]

By | September 7th, 2016|Meetups, Technical Posts|0 Comments

Where to Begin – A Guide to Hiring Fraud Analysts and Building Your Team

In my last post, I talked about technology and, in particular, components in a fraud-detection architecture. But when it comes to building a fraud strategy, it’s not just about technology. Perhaps equally, if not more, important are the people who analyze and review cases to catch fraudsters. This post is [...]

By | August 17th, 2016|Meetups, Quick Takes, Technical Posts|0 Comments

Unsupervised Analytics: Moving Beyond Rules Engines and Learning Models

Rules engines, machine learning models, ID verification, or reputation lookups (e.g. email, IP blacklists and whitelists) and unsupervised analytics? I've often been asked which one to use and should you only go with one over the others. There is a place for each to provide value and you should anticipate [...]

By | August 1st, 2016|Technical Posts|0 Comments