Jennifer Marsh photo

Jennifer Marsh

Role

Contributing Writer

Bio

I'm a software developer with a strong interest in cybersecurity. As an amateur hacker, I appreciate the many ways hackers find exploits in vulnerable code and love to read and write about the latest hacks. I aspire to get my first bounty, but I love educating users and developers on the ways they can protect their data.

Jennifer Marsh Articles

Jennifer Marsh's Articles

loan fraud application illustration
January 30, 2024

What is loan fraud? How businesses can prevent it

Explore loan fraud, identity theft, and bot attacks, and discover preventive strategies to protect financial integrity.

Social Engineering Keyboard
December 8, 2023

What is social engineering? The guide to preventing social engineering attacks

Learn what social engineering is, technical solutions for detection, and preventive strategies with our comprehensive guide.

Neobank Image
November 17, 2023

Neobanks: what they are, popular examples, neobank advantages, and common fraud risks with digital-only banks

Explore the world of neobanks: their features, benefits, fraud risks, and how Fingerprint addresses these challenges.

online advertisement fraud
March 16, 2023

How to prevent advertising fraud

Discover strategies to prevent advertising fraud and enhance your return on ad spend by tackling botnet activities.

online insurance fraud
March 10, 2023

Online insurance fraud: types, techniques, prevention

Understand online insurance fraud mechanisms and learn effective strategies to protect your business from fraudulent claims.

online auction fraud image
February 13, 2023

How to avoid online auction fraud

Stay informed about online auction fraud, its mechanisms, and how to protect yourself from becoming a victim.

Bot mitigation image
January 24, 2023

Why Bot Mitigation is Important

Learn how bot mitigation techniques can safeguard your business from malicious bots and protect your data.

Fraud in the News Image
January 10, 2023

2022 Fraud in the News

Review the largest data breaches of 2022 across industries and find protective strategies for your business.