Keshia Rose photo

Keshia Rose

Role

Senior Developer Evangelist

Keshia Rose Articles

Keshia Rose's Articles

What is Bot-Driven Wire Transfer Fraud? How It Works and How to Prevent It
January 18, 2024

What is Bot-Driven Wire Transfer Fraud? How It Works and How to Prevent It

Explore bot-driven wire transfer fraud in this article, where we delve into various fraudulent techniques like phishing, account takeover, and transaction interception. Learn practical strategies to detect and prevent these attacks to protect financial assets.

What is a DDoS attack? Understanding and Preventing Distributed Denial-of-Service Attacks
December 20, 2023

What is a DDoS attack? Understanding and Preventing Distributed Denial-of-Service Attacks

DDoS, or distributed denial-of-service, attacks are a prevalent threat to any online business or service and can cause large amounts of damage. In this article, we'll cover DDoS attacks, the different forms they take, their impact, and how to mitigate them effectively.

Open Banking What it is, Its Benefits, Its Risk of Fraudulent Account Linking and How to Prevent It
December 14, 2023

Open Banking What it is, Its Benefits, Its Risk of Fraudulent Account Linking and How to Prevent It

Learn what open banking is, how it differs from traditional banking, the benefits and risks of open banking, and the proactive measures fintech companies can implement to enhance security. This article will discuss how to prevent fraud from fraudulent account linking that may occur through third-party applications.

Product Update: Deep Dive into Your Fingerprint Data with Bulk CSV Export
December 12, 2023

Product Update: Deep Dive into Your Fingerprint Data with Bulk CSV Export

Introducing Bulk CSV Export, making downloading identification data in bulk from the Fingerprint dashboard quick and easy. This new feature lets you dive deep into data trends, make data-driven decisions, and strengthen your website's security measures.

How Paywalls Work, How Paywall Evasion Happens, and How to Implement Paywall Protection
December 12, 2023

How to Implement a Paywall

In this tutorial, we’ll dive into paywall protection for content sites and the challenges publishers face trying to protect paid content. Learn how to confidently manage anonymous visitors and their access, even when they browse in private mode.

Social Engineering Keyboard
December 8, 2023

What is social engineering? The guide to preventing social engineering attacks

Learn what social engineering is, how it works, technical solutions to detecting social engineering attempts, and ways to prevent social engineering altogether with device intelligence and fraud prevention solutions.

Navigating the Risks of User-Initiated App Cloning
December 5, 2023

Navigating the Risks of User-Initiated App Cloning

Explore the issue of user-initiated app cloning and its implications for business security and integrity. This article offers effective strategies for detecting and mitigating the risks of cloned apps.

Enhancing Visitor Detection with Fingerprint’s Akamai Proxy Integration
November 21, 2023

Guide: Enhancing Visitor Detection with Fingerprint's Akamai Proxy Integration

Discover how Fingerprint’s Akamai Proxy Integration offers a robust method for precise device recognition. This guide walks through the steps of setting up the Fingerprint Akamai proxy integration, making it easier to tackle the challenges of visitor identification and maximizing accuracy.

Announcing our Akamai Proxy Integration
November 13, 2023

Announcing our Akamai Proxy Integration

We released a new Akamai proxy integration that improves visitor identification accuracy, helping businesses prevent fraud and enhance user experiences. Learn more about the benefits of this integration and how it works.

How to Detect Repeat Loan Applications and Improve Loan Risk Assessment
November 7, 2023

How to Detect Repeat Loan Applications

Discover how to use our 99.5% accurate visitor identifiers to check for consistency between loan applications. Fingerprint’s identification API allows you to better assess loan risk, even among anonymous users.

Optimizing Identification Reliability with Fingerprint's AWS CloudFront Proxy Integration
November 2, 2023

Guide: Optimizing Identification Reliability with Fingerprint's AWS CloudFront Proxy Integration

Boost your visitor identification accuracy despite ad-blockers and privacy settings with Fingerprint's AWS CloudFront Proxy Integration.

Availability Changes to Our Cloud Proxy Integrations
November 1, 2023

Availability Changes to Our Cloud Proxy Integrations

Effective November 1, 2023, we changed the availability of our proxy integrations across our pricing plans. Moving forward, our Cloudflare proxy integration is only available on Pro Plus plans and higher, and the AWS CloudFront and Azure proxy integrations are only available on Enterprise plans.