Jennifer Marsh photo

Jennifer Marsh

Role

Contributing Writer

Bio

Here is some text for my bio: I'm a software developer with a strong interest in cybersecurity. As an amateur hacker, I appreciate the many ways hackers find exploits in vulnerable code and love to read and write about the latest hacks. I aspire to get my first bounty, but I love educating users and developers on the ways they can protect their data.

Jennifer Marsh Articles

Jennifer Marsh's Articles

cryptocurrency scams image
January 27, 2023

The 7 cryptocurrency scams you need to know

Cryptocurrency is a digital currency that uses cryptography for secure transactions. It's becoming more and more popular as an alternative to traditional money, but it also brings with it certain risks and pitfalls. Cyber-criminals target cryptocurrency users in an attempt to steal their digital money. Many of these scams are successful, leaving victims unable to retrieve their money after realizing they've been scammed. Learn about the 7 types of cryptocurrency scams and how you can protect yourself.

Bot mitigation image
January 24, 2023

Why Bot Mitigation is Important

Bot mitigation is a process used to detect malicious bots and protect websites from their activities. It works by identifying suspicious behavior and then blocking it before any damage can be done. Learn how bot mitigation can protect your business from malicious threats and safeguard customer and corporate data.

Fraud in the News Image
January 10, 2023

2022 Fraud in the News

Here are a few of the largest data breaches across industries that happened in 2022. From Cryptocurrecy to the Los Angeles school system, no one is safe from fraudulent activity. Learn about what you can do to protect your online business.

Super App Image
December 13, 2022

Security Obstacles of Super Apps

A super app is an all-in-one application that combines multiple services into one platform. This allows users to access various types of services without leaving the main app. Businesses that run super apps constantly battle common threats, but it becomes even more complicated when the super app provides services across multiple industries and stores extensive sensitive data.

Credential Theft Image
December 2, 2022

How Credential Theft Threatens Online Businesses

There are many risks involved when you decide to collect personal or financial information for your online business. Stay one step ahead of fraudsters and learn how online businesses can protect themselves from credential theft.

Gaming Controllers and Poker Cards
November 21, 2022

Detecting Signup Promo Abuse for Gaming and Gambling

Signup promo abuse is a type of fraud that occurs when players use signup bonuses or promotional offers from online casinos or gaming sites with an ulterior motive. For example, some gamers may create multiple accounts to take advantage of multiple signup bonuses or promotions that are offered by casinos.

Synthetic ID Image
November 2, 2022

Synthetic Identity Fraud Threatens to Steal Millions from Businesses and Consumers

Synthetic identity fraud occurs when the perpetrator creates a completely fictitious identity with fake information. They may use stolen Social Security numbers or other personally identifiable information (PII) to create a unique profile that looks like an actual person.

Social Engineering Keyboard
October 13, 2022

Why Social Engineering Attacks Are Successful with Technical Staff

No one is safe from social engineering - even the most tech-savvy professionals. Learn how cyber attackers are using new methods to trick users into giving personal or confidential information.

login identity theft
September 28, 2022

How Compromised Credentials and Identity Theft Contribute to Government Benefits Fraud

In this article, we’ll explain how identity theft works, how valuable it is to bad actors, how government benefit fraud is affected by identity theft, and what protection measures can be put in place to help prevent identity theft.

login screen illustration
September 13, 2022

Five Mistakes You’re Making with Your Login Page Security and How to Fix Them

Your login page is a perfect target for hackers because it serves as the primary defense between the internet and sensitive data. Most web applications allow users to log into accounts and view sensitive information. If your login page isn’t secure, you’re likely making these five mistakes.

application illustration
September 2, 2022

The Basics of Loan Fraud and How To Prevent It

There are several different types of loan fraud. One of the most common forms of loan fraud is application fraud, which involves falsely applying for a loan by providing inaccurate or incomplete information on an application form. This could include providing false employment history or exaggerating your income level in order to obtain a larger loan.