Breaking Down Fraud Flows -- Untangle the Fraudster's Journey of the Most Pervasive Fraud Use Cases

Fraud
Management/mitigation
Account Takeover
Bots
Emulators
New Account Fraud
Behavioral Analytics
Ran Shulkind -- SecuredTouch
May 26, 2020
Whitepapers

As online fraud has evolved, so has fraud detection, with an increasing number of companies turning to technologies to analyze user behavior instead of device-based analysis or static rules. In this paper, SecuredTouch examines five fraud attack methods within the context of three use cases, delving into the sequence of activity and how more traditional approaches compare against behavioral biometrics. A brief look at two non-fraud attacks is also included.

Some content is hidden, to be able to see it login here Login

Blue-tinted background of a man watching a webinar

Host a Webinar with the MRC

Help the MRC community stay current on relevant fraud, payments, and law enforcement topics.
Submit a Request

Publish Your Document with the MRC

Feature your case studies, surveys, and whitepapers in the MRC Resource Center.
Submit Your Document

Related Resources

There are no related Events

X
Cookies help us improve your website experience.
By using our website, you agree to our use of cookies.
Confirm