Breaking Down Fraud Flows -- Untangle the Fraudster's Journey of the Most Pervasive Fraud Use Cases
Fraud
Management/mitigation
Account Takeover
Bots
Emulators
New Account Fraud
Behavioral Analytics
Ran Shulkind -- SecuredTouch
May 26, 2020
Whitepapers
As online fraud has evolved, so has fraud detection, with an increasing number of companies turning to technologies to analyze user behavior instead of device-based analysis or static rules. In this paper, SecuredTouch examines five fraud attack methods within the context of three use cases, delving into the sequence of activity and how more traditional approaches compare against behavioral biometrics. A brief look at two non-fraud attacks is also included.
Some content is hidden, to be able to see it login here Login
Host a Webinar with the MRC
Help the MRC community stay current on relevant fraud, payments, and law enforcement topics.
Submit a Request
Publish Your Document with the MRC
Feature your case studies, surveys, and whitepapers in the MRC Resource Center.
Submit Your Document