Keshia Rose photo

Keshia Rose

Role

Senior Developer Evangelist

Keshia Rose Articles

Keshia Rose's Articles

How does Fingerprint’s device intelligence compare with Google Integrity API?
April 16, 2024

How does Fingerprint’s device intelligence compare with Google Integrity API?

Find out why relying solely on Google's Play Integrity API isn't enough for comprehensive fraud prevention. This post shows how Fingerprint’s mobile Smart Signals can fill these gaps, ensuring robust protection for both Android and iOS apps.

Browser Spoofing: What it is and how to detect it
March 8, 2024

Browser Spoofing: What it is and how to detect it

Learn about browser tampering and how it impacts security. We discuss how users can change browser fingerprints, the issues this causes for companies, and how enhanced detection methods can protect online interactions.

Privacy-Focused Browser Settings: What Businesses Need To Know
February 27, 2024

Privacy-Focused Browser Settings: What Businesses Need To Know

Discover the role of privacy-focused settings in the context of fraud risk assessment. This blog post explores why people choose privacy-focused browsers and configurations, the protections they provide, and how they are detected.

Detecting Suspicious Mobile Device Activity with Factory Reset Times
February 22, 2024

Detecting Suspicious Mobile Device Activity with Factory Reset Times

Mobile device factory resets are often performed for legitimate reasons, such as troubleshooting, selling, or improving device performance, and for fraudulent activities. This article looks at how fraudsters use factory resets, along with how to detect suspicious patterns.

How to Prevent Mobile Fraud by Detecting Jailbroken Phones
February 22, 2024

How to Prevent Mobile Fraud by Detecting Jailbroken Phones

Jailbroken phones can pose significant risks to mobile app security. This article covers jailbreaking, why users jailbreak their devices, the security tradeoffs of elevated access, and how businesses can protect their services with jailbreak detection.

Navigating the Risks of User-Initiated App Cloning
December 5, 2023

Navigating the Risks of User-Initiated App Cloning

Explore the issue of user-initiated app cloning and its implications for business security and integrity. This article offers effective strategies for detecting and mitigating the risks of cloned apps.