Keshia Rose photo

Keshia Rose

Role

Senior Developer Evangelist

Keshia Rose Articles

Keshia Rose's Articles

Bot detection radar
March 26, 2024

Bot Detection: What It Is and How to Block Bad Bots

Bot detection is the process of identifying and blocking automated web traffic, typically used in cybersecurity to prevent malicious activities.

What is account creation fraud? How to prevent it
March 21, 2024

What is account creation fraud? How to prevent it

Tackling account creation fraud is important for protecting your online platform's integrity and user experience. Explore how fraudulent account creation can impact businesses and learn effective prevention techniques.

The Comprehensive Guide to Preventing Digital Payment BIN Attacks
February 14, 2024

The Comprehensive Guide to Preventing Digital Payment BIN Attacks

Explore the mechanics of Bank Identification Number (BIN) attacks within the digital payments infrastructure. This post will examine how they work, their risks, how fraudsters execute these attacks, and a tutorial on how to prevent them.

How to Approach Assessing Trust in Peer-to-Peer (P2P) Lending Platforms
January 31, 2024

How to Approach Assessing Trust in Peer-to-Peer (P2P) Lending Platforms

This article looks at the role of technical indicators in enhancing trust assessments in peer-to-peer lending. It covers browser-based signals and their integration into risk assessment models, highlighting how they can bolster platform security and reliability.

  • Anti Fraud technology
What is Bot-Driven Wire Transfer Fraud? How It Works and How to Prevent It
January 18, 2024

What is Bot-Driven Wire Transfer Fraud? How It Works and How to Prevent It

Explore bot-driven wire transfer fraud in this article, where we delve into various fraudulent techniques like phishing, account takeover, and transaction interception. Learn practical strategies to detect and prevent these attacks to protect financial assets.

Social Engineering Keyboard
December 8, 2023

What is social engineering? The guide to preventing social engineering attacks

Learn what social engineering is, how it works, technical solutions to detecting social engineering attempts, and ways to prevent social engineering altogether with device intelligence and fraud prevention solutions.

Navigating the Risks of User-Initiated App Cloning
December 5, 2023

Navigating the Risks of User-Initiated App Cloning

Explore the issue of user-initiated app cloning and its implications for business security and integrity. This article offers effective strategies for detecting and mitigating the risks of cloned apps.

How to Detect Repeat Loan Applications and Improve Loan Risk Assessment
November 7, 2023

How to Detect Repeat Loan Applications

Discover how to use our 99.5% accurate visitor identifiers to check for consistency between loan applications. Fingerprint’s identification API allows you to better assess loan risk, even among anonymous users.

Reducing Payment Fraud with Reliable Visitor Identification
September 22, 2023

How to Reduce Payment Fraud

Payment fraud is a common issue in online financial transactions for goods or services. In this article, we will cover how using a reliable identification signal can greatly assist in enhancing your credit card anti-fraud workflows.