Credential stuffing is the automated use of usernames and passwords that have been obtained through hacking. These hacks can be coordinated by the party carrying out the credential stuffing attack, or hackers can purchase pre-obtained logins from the dark web. In this article, we provide six of the most effective techniques to protect yourself from credential stuffing attacks.
CNP, or card not present, is a type of credit card fraud that literally means the card is not physically presented to the merchant at the time of its use. It generally occurs when scammers obtain credit card details illegally and use them to make purchases online or over the phone, and is precisely why credit card holders keep their card information to themselves.
Gift card fraud involves using stolen credit card details to purchase gift cards. Part of the reason gift card fraud is popular among scammers is its anonymity. By using credit card information to purchase a gift card, a fraudster essentially keeps stolen cash without having spent it.
Signals generated by the use of an ad blocker can improve browser fingerprinting accuracy. This novel browser fingerprinting method, while oft-discussed as a theoretical source of entropy, has only just been added to Fingerprint as of April 2021.
Learn the most common bot detection techniques, and learn to implement bot detection and threat mitigation using browser fingerprinting techniques.
Are privacy updates making it harder to use browser fingerprinting for anti-fraud? We go through the major modern browsers and determine what is still possible to keep your website safe.
There are several ways to block specific users and email domains from your site. We discuss six common methods, including IP bans and how you can implement browser fingerprinting to ban unwanted users.
The Fingerprint team has uncovered a scheme flooding vulnerability. We explain how the exploit works across four major desktop browsers and show why it's a threat to anonymous browsing.