Blog Articles

All Articles

mobile phone illustration
September 1, 2022

New: Fingerprint Pro for iOS 2.0

Fingerprint for iOS version 2.0 is here with more features and upgrades—learn what’s new and improved.

subscription sharing illustration
August 16, 2022

Four Ways to use Fingerprint Pro

Explore Fingerprint's new website section showcasing how accurate device identification combats common online fraud.

Office Hours Image
July 28, 2022

You’re Invited! Join us for Fingerprint Pro Office Hours

Join our bi-weekly product overview and live Q&A to learn the basics of our product and its use cases.

account sharing log in screen
July 12, 2022

How to Prevent Account Sharing: Lessons from Netflix, Amazon, and more

Account sharing prevention is a strategic approach to restrict unauthorized access and protect users. Learn how to prevent it in your organization.

device identification accuracy
July 6, 2022

FingerprintJS and Fingerprint Pro: Identification accuracy explained

Learn why Fingerprint Pro's industry-leading accuracy sets the industry standard in our recent webinar on device identification.

We are now Fingerprint
May 31, 2022

FingerprintJS is now Fingerprint

We have dropped the "JS" and are now known as Fingerprint. Read more about our decision and how this impacts our customers.

[WEBINAR] Why Accuracy is Everything in Device Identification
May 24, 2022

[WEBINAR] Why Accuracy is Everything in Device Identification

Join our webinar to learn about Fingerprint Pro's industry-leading accuracy in device detection from our CTO and Head of Product.

illustration of a phone on an orange background
May 9, 2022

Overview of iOS fraud detection APIs and device fingerprinting

Discuss iOS application security techniques, their pros and cons, and alternative fraud detection approaches.

illustration of a padlock on an orange background
April 7, 2022

TLS fingerprinting: What it is and how to implement it

TLS is a cryptographic protocol that encrypts internet traffic for online security. It aids in understanding network activity and preventing fraud.

Illustration of a letter being opened by a fishing hook depicting a phishing email
March 29, 2022

8 Common Signs of an Email Phishing Attempt

Learn to spot email phishing attempts with our guide on common signs and protections for your business and personal data.

illustration of incognito browser window
March 22, 2022

Storing Anonymous Browsing Preferences Using Browser Fingerprinting

Discover how Fingerprint works, its use cases, and how to implement dark mode for remembering users’ preferences.

Illustrated shopping bag with arrows on a dark blue background
March 10, 2022

4 things to consider before choosing a buy now, pay later provider

Considering BNPL for your eCommerce store? Here are four key considerations to evaluate before choosing a BNPL provider.