Keshia Rose photo

Keshia Rose

Role

Senior Developer Evangelist

Keshia Rose Articles

Keshia Rose's Articles

[Tutorial] What Is SMS Fraud? How to Detect and Prevent SMS Pumping Fraud
April 24, 2024

How to Detect and Prevent SMS Pumping Fraud

Dive into the world of SMS fraud prevention with our in-depth guide. Learn what SMS fraud is, common types of SMS fraud, their financial impacts, and how Fingerprint provides solutions to detect and thwart these threats with an in-depth tutorial.

How does Fingerprint’s device intelligence compare with Google Integrity API?
April 16, 2024

How does Fingerprint’s device intelligence compare with Google Integrity API?

Find out why relying solely on Google's Play Integrity API isn't enough for comprehensive fraud prevention. This post shows how Fingerprint’s mobile Smart Signals can fill these gaps, ensuring robust protection for both Android and iOS apps.

Bot detection radar
March 26, 2024

Bot Detection: What It Is and How to Block Bad Bots

Bot detection is the process of identifying and blocking automated web traffic, typically used in cybersecurity to prevent malicious activities.

What is account creation fraud? How to prevent it
March 21, 2024

What is account creation fraud? How to prevent it

Tackling account creation fraud is important for protecting your online platform's integrity and user experience. Explore how fraudulent account creation can impact businesses and learn effective prevention techniques.

Browser Spoofing: What it is and how to detect it
March 8, 2024

Browser Spoofing: What it is and how to detect it

Learn about browser tampering and how it impacts security. We discuss how users can change browser fingerprints, the issues this causes for companies, and how enhanced detection methods can protect online interactions.

Privacy-Focused Browser Settings: What Businesses Need To Know
February 27, 2024

Privacy-Focused Browser Settings: What Businesses Need To Know

Discover the role of privacy-focused settings in the context of fraud risk assessment. This blog post explores why people choose privacy-focused browsers and configurations, the protections they provide, and how they are detected.

suspect score
February 23, 2024

Product Update: Quickly Flag Suspicious Activity with Our New Suspect Score

Learn about our latest product update that simplifies fraud prevention by aggregating multiple signals into one score. Our new Suspect Score uses our Smart Signals and global probabilities to indicate potentially suspicious activity that you can directly use in your fraud prevention models.

Detecting Suspicious Mobile Device Activity with Factory Reset Times
February 22, 2024

Detecting Suspicious Mobile Device Activity with Factory Reset Times

Mobile device factory resets are often performed for legitimate reasons, such as troubleshooting, selling, or improving device performance, and for fraudulent activities. This article looks at how fraudsters use factory resets, along with how to detect suspicious patterns.

How to Prevent Mobile Fraud by Detecting Jailbroken Phones
February 22, 2024

How to Prevent Mobile Fraud by Detecting Jailbroken Phones

Jailbroken phones can pose significant risks to mobile app security. This article covers jailbreaking, why users jailbreak their devices, the security tradeoffs of elevated access, and how businesses can protect their services with jailbreak detection.

The Comprehensive Guide to Preventing Digital Payment BIN Attacks
February 14, 2024

The Comprehensive Guide to Preventing Digital Payment BIN Attacks

Explore the mechanics of Bank Identification Number (BIN) attacks within the digital payments infrastructure. This post will examine how they work, their risks, how fraudsters execute these attacks, and a tutorial on how to prevent them.

How to Approach Assessing Trust in Peer-to-Peer (P2P) Lending Platforms
January 31, 2024

How to Approach Assessing Trust in Peer-to-Peer (P2P) Lending Platforms

This article looks at the role of technical indicators in enhancing trust assessments in peer-to-peer lending. It covers browser-based signals and their integration into risk assessment models, highlighting how they can bolster platform security and reliability.

What is Bot-Driven Wire Transfer Fraud? How It Works and How to Prevent It
January 18, 2024

What is Bot-Driven Wire Transfer Fraud? How It Works and How to Prevent It

Explore bot-driven wire transfer fraud in this article, where we delve into various fraudulent techniques like phishing, account takeover, and transaction interception. Learn practical strategies to detect and prevent these attacks to protect financial assets.