Blog Articles

DeveloperWeek Image
February 3, 2023

Meet the Fingerprint team at DeveloperWeek 2023

Meet Fingerprint at booth #304 at DeveloperWeek in Oakland, California on February 16th & 17th to hear how Fingerprint identifies anonymous users and prevents fraud with high accuracy device identification.

All Articles

DeveloperWeek Image
February 3, 2023

Meet the Fingerprint team at DeveloperWeek 2023

Meet Fingerprint at booth #304 at DeveloperWeek in Oakland, California on February 16th & 17th to hear how Fingerprint identifies anonymous users and prevents fraud with high accuracy device identification.

Attribution Image
February 1, 2023

How to improve your attribution strategy with device identification

Return on ad spend (RAOS) is a common method of determining marketing campaign performance. There’s several attribution methods including first-touch, last-touch, and multi-touch attribution. We discuss the benefits and downsides of each including why device identification can help bridge the marketing attribution gap.

cryptocurrency scams image
January 27, 2023

The 7 cryptocurrency scams you need to know

Cryptocurrency is a digital currency that uses cryptography for secure transactions. It's becoming more and more popular as an alternative to traditional money, but it also brings with it certain risks and pitfalls. Cyber-criminals target cryptocurrency users in an attempt to steal their digital money. Many of these scams are successful, leaving victims unable to retrieve their money after realizing they've been scammed. Learn about the 7 types of cryptocurrency scams and how you can protect yourself.

Bot mitigation image
January 24, 2023

Why Bot Mitigation is Important

Bot mitigation is a process used to detect malicious bots and protect websites from their activities. It works by identifying suspicious behavior and then blocking it before any damage can be done. Learn how bot mitigation can protect your business from malicious threats and safeguard customer and corporate data.

How to Improve Your Online User Identification Process Image
January 20, 2023

How to Improve Your Online User Identification Process

Learn how to improve your online user identification process. We'll discuss the importance of user identification, methods for verifying accounts, and strategies for crafting a secure and private system. Plus, find out how device fingerprinting techniques can help protect your security processes.

P2P (Peer-To-Peer) Fraud Image
January 17, 2023

P2P (Peer-To-Peer) Fraud Research Guide

Peer-to-peer payments are digital payments that allow users to send and receive money directly from one person to another without needing a bank or other traditional financial institution. As more people use P2P payment systems, the potential for scams and fraud increases. In this fraud research guide, we provide you with the information you need to stay safe when managing P2P payments.

Unique and Anonymous Visitors Image
January 13, 2023

Why does identifying anonymous and unique website visitors matter?

Unique visitors are when someone who has visited a website or application in a specific time period. Anonymous visitors shield their identity to leave no identifiers, such as IP address or browser type. Google Analytics often leaves gaps when identifying returning unique visitors over an extended period of time as well as anonymous users. We explain the benefits of accurately identifying unique and anonymous visitors.

Fraud in the News Image
January 10, 2023

2022 Fraud in the News

Here are a few of the largest data breaches across industries that happened in 2022. From Cryptocurrecy to the Los Angeles school system, no one is safe from fraudulent activity. Learn about what you can do to protect your online business.

2022 Blogs Image
December 16, 2022

ICYMI: Our favorite blog posts of 2022

With 2022 wrapping up, we wanted to feature some of our favorite posts from throughout the year. Catch up on ten of our favorite blog posts below and get to know everything from TLS fingerprinting to audio fingerprinting to how to permanently ban users on your site.

Review Fraud Image
December 15, 2022

Too Good To Be True? How to Stop Online Review Fraud

Online review fraud is when a malicious user creates fake product or service reviews online. It typically occurs in one of two ways: fake positive reviews or fake negative reviews.

Super App Image
December 13, 2022

Security Obstacles of Super Apps

A super app is an all-in-one application that combines multiple services into one platform. This allows users to access various types of services without leaving the main app. Businesses that run super apps constantly battle common threats, but it becomes even more complicated when the super app provides services across multiple industries and stores extensive sensitive data.

Work from home desk image
December 9, 2022

The Top Five Must-Have Work-From-Home Essentials

A well-thought-out work-from-home setup is essential for remote employees. To make your work-from-home days more comfortable and productive, read about five essential items that every WFH warrior should have in their home office! From fast wifi to noise-canceling headphones, these simple updates will help make the most of your workspace.