Articles

  • Antifraud operations models

    Choosing an antifraud model starts with 2 questions: how much control you want, and how much fraud expertise you have in-house. This article compares outsourced, hybrid, and internal approaches, and shows where each model fits in eCommerce operations.

    Published on:: 2024-08-10 18:29:56

  • Advanced Fraud Rule Engines: Complex Policies and Third-Party Data

    Fraud prevention is no longer a single check. It depends on a fraud rule engine that enriches data from multiple sources, applies clear knockout rules, and combines scoring with decision logic in real time. This article explains how complex policies, third-party data, behavioral signals, and machine learning fit together in a practical antifraud setup.

    Published on:: 2024-08-10 18:29:56

  • Understanding BIN Attacks in More Detail: An Advanced Analysis

    In the fast-changing world of cybercrime, BIN (Bank Identification Number) attacks have become a serious threat. These attacks have shifted from simple operations to more complex schemes supported by artificial intelligence (AI). As they become harder to spot, businesses and individuals need to understand how BIN attacks work, what impact they have, and what it takes to prevent them.

    Published on:: 2024-08-10 18:29:56

  • The Fallacy of Evading Fingerprinting by Disabling JavaScript

    Disabling JavaScript does not stop fingerprinting. This article explains why that assumption fails, how no-JS fingerprinting works, and which browser signals still expose identifying data through normal HTTP requests.

    Published on:: 2024-08-10 18:29:56

  • Canvas Fingerprinting: A Quiet Method for Tracking Online Users

    Canvas fingerprinting uses the HTML5 canvas element to generate a repeatable device identifier based on how a browser renders graphics. This article explains how the technique works, its role in cross-site device fingerprinting, its practical limits, and common spoofing methods.

    Published on:: 2024-08-10 18:29:56

  • Why Case Management Matters in Anti-Fraud Work

    Fraud teams need more than detection. They need decision logic, case tracking, and a clear path from alert to resolution. This article explains why case management matters in anti-fraud work, which functions it should support, and how automation removes repetitive tasks without reducing control over the investigation.

    Published on:: 2024-08-10 18:29:56

  • Centauri: A New Approach to Device Fingerprinting - Decisimo

    Centauri uses a different method for device fingerprinting. Instead of relying on standard hardware and software signals, it looks at memory-level variation to identify devices with high accuracy and stable results. This article explains how the method works, why it differs from traditional approaches, and where it could fit in antifraud workflows.

    Published on:: 2024-08-10 18:29:56

  • The Conflict Between Data Minimization Techniques and the Rise of Fraudulent Synthetic Profiles

    Privacy controls reduce the data companies can collect, but they also make synthetic profile fraud harder to detect. This article explains where that tradeoff appears in online payments, how fraudsters use data minimization techniques to hide activity, and why stronger detection logic is needed when fewer signals are available.

    Published on:: 2024-08-10 18:29:56

  • How to Detect Potential Merchant Fraud

    Merchant fraud in BNPL and point of sale lending is rarely random. It usually leaves visible traces across phone numbers, welcome calls, payment channels, and account access patterns. This article explains how risk teams can spot those signals, investigate them, and put tighter controls around merchant behavior.

    Published on:: 2024-08-10 18:29:56

  • Event-Driven Antifraud in eCommerce

    Event-driven antifraud in eCommerce starts with a simple idea: collect the right events, then make fraud decisions based on what the data shows. This article covers bot prevention at the infrastructure layer, behavioral analytics, and the event signals a rule engine can use to flag suspicious purchases before they go through.

    Published on:: 2024-08-10 18:29:56