Blog Articles

All Articles

whale phishing image
November 16, 2023

What is a Whaling Attack? How whale phishing works

Whale phishing, or 'whaling,' targets high-profile individuals in fraud attempts, exploiting their access to sensitive data. Learn prevention tips.

Announcing our Akamai Proxy Integration
November 13, 2023

Announcing our Akamai Proxy Integration

Discover the new Akamai proxy integration by Fingerprint, enhancing visitor identification and fraud prevention.

Optimizing Identification Reliability with Fingerprint's AWS CloudFront Proxy Integration
November 2, 2023

Optimize identification reliability with AWS CloudFront proxy integration

Boost your visitor identification accuracy despite ad-blockers and privacy settings with Fingerprint's AWS CloudFront Proxy Integration.

Availability Changes to Our Cloud Proxy Integrations
November 1, 2023

Availability Changes to Our Cloud Proxy Integrations

As of November 1, 2023, Fingerprint's proxy integrations have new availability rules across our pricing plans.

How to Provide Personalization to Anonymous Users
October 27, 2023

How to Provide Personalization to Anonymous Users

The majority of visitors to your website are anonymous. Discover ways to personalize their experience without needing them to sign in.

The Limits of JA3 - What it is, why it's not enough for accurate device identification
October 26, 2023

The limits of JA3: Why it’s not enough for accurate device identification

Discover JA3 fingerprinting, its uses in device identification, its limitations, and what's needed for robust identification.

How to Prevent Coupon and Promo Abuse and Increase Repeat Sales
October 25, 2023

How to Prevent Coupon and Promo Abuse

Learn strategies to mitigate coupon and promo abuse to safeguard your profit margins and enhance customer experiences.

Maximizing Identification Accuracy with Fingerprint’s Cloudflare Proxy Integration
October 23, 2023

Maximize identification accuracy with Cloudflare proxy integration

Learn how Fingerprint Pro’s Cloudflare Proxy Integration aids in accurate device identification despite privacy policies.

Demo: Chrome Site Engagement Feature Can Leak Frequently Visited Sites
October 19, 2023

Demo: Chrome Site Engagement Feature Can Leak Frequently Visited Sites

We explain how Chromium’s Lookalike Warnings and Site Engagement can leak information on frequently visited sites to untrustworthy websites.

How to Increase Revenue by Identifying & Preventing Account Sharing
October 18, 2023

Account Sharing: The Step-By-Step Prevention Guide

Address account sharing impacts with our tutorial on detection techniques and converting users into paying customers.

Announcing our Series C Fundraising Round
October 17, 2023

Announcing our Series C Fundraising Round

Fingerprint raises $33 million in Series C funding to bolster fraud prevention and support for Enterprise organizations.

Demo: How Malicious Apps Can Easily Hide Copying Clipboard Data on Android 14
October 16, 2023

Demo: How apps can hide clipboard data copying on Android 14

Your clipboard data on Android 14 might be at risk. See how to protect your information with our guide.