Introducing the DataVisor Online Fraud Report

By | March 15th, 2017|Company News, Technical Posts, Threat Blogs|

As DataVisor Co-Founder and CEO Yinglian Xie says in her foreword to the Inaugural DataVisor Online Fraud Report, “Data is power.” We have no shortage of data here at DataVisor and we have taken the opportunity to unlock it and analyze the results. Through our Global Telemetry Network of more than one billion users across 172+ [...]

Mobile Fraud Gone in a (Device) Flash

By | July 5th, 2016|Threat Blogs|

Device fingerprinting, i.e., collecting information from a device for the purposes of identification, is one of the main techniques used by online services for mobile fraud detection. The goal is to recognize “bad” devices used by fraudsters, such that they can be identified even when other attributes (such as user names or IP addresses) change. [...]

Are You Paying for Fake App Installs? What You Can Do About Install Fraud

By | April 6th, 2016|Threat Blogs|

A version of this post also appeared on Mobile Advertising Watch. The mobile app landscape is extremely competitive. With more than three million apps available today in the major app stores, a new app has slim chances of standing out and making it to the top of the charts. Install ad campaigns are increasingly popular (if [...]

Account Takeover Fraud: The Anatomy of an ATO Attack

By | February 24th, 2016|Threat Blogs|

As we mentioned in our recent Predictions for 2016, it’s likely that account takeover fraud (ATO fraud) will skyrocket this year as result of the many data breaches we witnessed in 2015. Cybercriminals put the work into stealing your data, now it’s time to put that data to work for them. Account takeover fraud fuels the underground [...]

Virtual Goods, Real Fraud | Virtual Currency Fraud, Currency Arbitrage

By | January 21st, 2016|Threat Blogs|

The recent announcement from Activision Blizzard to acquire King Digital Entertainment, maker of the hit game Candy Crush, for a staggering $5.9 billion certainly turned some heads. Is there really that much money in the mobile gaming industry? In a word, yes, but it’s not just the game makers who look to profit. With the [...]

Cyber Attackers Turn Location-Based Services Against You with Spam Account Profiles

By | December 1st, 2015|Threat Blogs|

  Image source: Facebook Social spam is not new. We've all experienced our share of unsolicited comments, stranger friend requests, phishing links, fake reviews, and click-baiting. But as online services introduce new features to make connecting and sharing content easier than ever, social spam is rapidly taking on new shapes and forms from [...]

Top 5 Predictions for Online Fraud in 2016

By | November 23rd, 2015|Threat Blogs|

As 2015 comes to a close, all of us fighting online fraud may start preparing for the upcoming fraud battle in 2016. As mobile apps and web services continue to increase in number and functionality, they remain an attractive target for fraudsters. Meanwhile, cyber attackers have continued to adapt to evade traditional security defenses – [...]

The Changing Tide of Financial Fraud

By | November 17th, 2015|Threat Blogs|

On October 1, the financial payments world was abuzz with talk about how the increased adoption of the new EMV standard for credit card purchases was going to bring about dramatic changes to financial fraud. Likely we will see a reduction in the amount of "brick and mortar" financial fraud transactions. But unfortunately it is going [...]

How To Register Millions of Fake Accounts With Ease

By | September 29th, 2015|Threat Blogs|

Fake accounts are a bigger problem than ever. With so many new security, why are they still so prevalent? Recent studies show that approximately 10 percent of accounts on social media sites are fake [1,2]. Other reports are more drastic: Instagram’s crackdown on spam fake accounts in December of last year exposed 18.9 million (29 percent) [...]

The Underground Market for User Accounts | Fake Accounts, Account Fraud

By | September 15th, 2015|Threat Blogs|

User accounts are extremely valuable - real accounts far more so than fake accounts. This is not only true for Internet properties, which are valued by the size and growth of their user base, but also for professional online criminals exploiting these platforms for a profit. The prevalence of these user accounts in the underground [...]

The Hidden Enemy Threatening Your Online User Growth | Fake Reviews, Fraud, Transactions

By | August 31st, 2015|Threat Blogs|

We are entering an era of billions of users and trillions of online accounts. This is attracting a growing wave of attacks like fake reviews targeting online services of all sizes. The Internet user population is now 3 billion strong [1]. There are now over 3 million mobile apps and online services available, and most [...]