Fingerprinting Articles

Bot mitigation image
January 24, 2023

Why Bot Mitigation is Important

Bot mitigation is a process used to detect malicious bots and protect websites from their activities. It works by identifying suspicious behavior and then blocking it before any damage can be done. Learn how bot mitigation can protect your business from malicious threats and safeguard customer and corporate data.

How to Improve Your Online User Identification Process Image
January 20, 2023

How to Improve Your Online User Identification Process

Learn how to improve your online user identification process. We'll discuss the importance of user identification, methods for verifying accounts, and strategies for crafting a secure and private system. Plus, find out how device fingerprinting techniques can help protect your security processes.

  • Fingerprinting
Unique and Anonymous Visitors Image
January 13, 2023

How to Identify Anonymous Website Visitors

Anonymous visitors shield their identity to leave no identifiers, such as IP address or browser type. We explain how to accurately identify anonymous visitors.

  • Fingerprinting
Fraud in the News Image
January 10, 2023

2022 Fraud in the News

Here are a few of the largest data breaches across industries that happened in 2022. From Cryptocurrecy to the Los Angeles school system, no one is safe from fraudulent activity. Learn about what you can do to protect your online business.

2023 fraud trends and threats
December 1, 2022

Four Fraud Threats to Watch For in 2023

With more and more businesses relying on fully digital operations for their organizations, the opportunity to be affected by fraud only increases as companies grow. Let's discuss four of the biggest fraud threats to business in 2023.

Cookieless Future Trash Can
October 21, 2022

What Is the Cookieless Future and What Does It Mean for Developers?

For decades, cookies have been an essential component of the online experience for users. With browsers intending to phase out third-party cookies in the near future, learn how this will change the internet operations for developers.

  • Fingerprinting
user identification
September 14, 2022

Why Anti-Fingerprinting Techniques Don't Work in Browsers

Exploring anti-fingerprinting solutions, we discuss their effectiveness and why device identification is crucial in preventing online fraud.

subscription sharing illustration
August 16, 2022

Four Ways to use Fingerprint Pro

Fingerprint supports a wide range of use cases, including the ones mentioned above. To showcase each, we built a new section of our website to help visualize how highly accurate device identification can help common occurrences of online fraud and personalize the user experience.

pixel art of nft scams
July 14, 2022

What You Need to Know About NFT Scams

An NFT, or non-fungible token, is a blockchain-minted digital asset class unique enough to be considered a genuinely individual item in all but the physical capacity. Common types of NFT Scams are spear-phishing marketplaces, spear-phishing specific owners/users, and counterfeit & non-existent NFTs.

device identification accuracy
July 6, 2022

FingerprintJS and Fingerprint Pro: 99.5% Device Identification Accuracy Explained

Accuracy really is everything when it comes to device identification. Fingerprint Pro maintains a 99.5% accuracy rate, which is the industry’s highest accuracy rate. We discussed how and why in a recent webinar and why our accuracy rates differ between our open-source FingerprintJS browser fingerprinting library and our Fingerprint Pro device identification solution. These are the key takeaways you need to know.

  • Fingerprinting
We are now Fingerprint
May 31, 2022

FingerprintJS is now Fingerprint

We have dropped the "JS" and are now known as Fingerprint. Read more about our decision and how this impacts our customers.

  • Fingerprinting
illustration of a phone on an orange background
May 9, 2022

An Overview of iOS Fraud Detection APIs and Device Fingerprinting Techniques

Discussing existing techniques and APIs native to iOS that allow developers to harden application security. It weighs all the main pros and cons of methods that are provided by Apple and covers an alternative approach that is successfully deployed in our fraud detection solutions on other platforms.