Blog
Jan 8, 202519820 min read
Presentation Attack Detection (PAD) explained
Dec 30, 202417219 min read
Why every business needs identity theft protection
Feb 1, 2023117114 min
Smishing – Protect Your Business From This Growing Threat
Jan 27, 2023135517 min
Phishing – Tips, tricks, and strategies to protect your business and customers
Jan 25, 2023167017 min
Account Takeover Fraud: A comprehensive guide for businesses
Jan 19, 2023372717 min
Bank Fraud – Types and examples
Jan 13, 202315709 min
Wire fraud – how to avoid fraudsters
Jan 6, 2023155726 min
Identity proofing – Prove your identity in the digital world
Dec 28, 202214478 min
Synthetic Identity Fraud – How to Prevent it?
Dec 22, 202220447 min
What Are Money Transfer Scams and How to Avoid Them?
Dec 15, 202213272 min
RTL Interview: How to fight fraud? – CEO of Fraud.com – Emre Sayin
Dec 14, 2022259411 min
Application Fraud – Everything You Need to Know to Detect it and Prevent it
Dec 7, 2022167411 min
Return Fraud – How do you detect it and fight It?
Dec 2, 2022153213 min
Payment Fraud – How to Protect Yourself and Your Business?
Nov 29, 2022155411 min
Remote customer onboarding – A new approach to customer onboarding
Nov 23, 2022154221 min
Customer onboarding – Process and examples
Nov 21, 202216239 min
DeepFake – Everything You Need to Know to Spot a Deepfake
Nov 16, 202216119 min
How to fight fraud: Understanding the Technology
Nov 15, 202213875 min
Behavioral Red Flags of Occupational Fraud
Nov 10, 2022168810 min
Face Recognition – How Does it Work & Help Improve Your Security
Nov 8, 2022181717 min