Search Keyword: Phone Scoring

Beyond the Credit Score: A Technical Playbook for Using Email, Phone, and IP Signals to Detect Synthetic Identity Fraud in Lending
Beyond the Credit Score: A Technical Playbook for Using Email, Phone, and IP Signals to Detect Synthetic Identity Fraud in Lending
Synthetic identity fraud is a sophisticated and rapidly growing threat in the lending industry. Unlike traditional identity theft, where a fraudster steals a real person's identity, synthetic identi...
6 Reader,
5m reading
Fintech Account Takeover: A Playbook for Correlating Phone, IP, and IBAN Signals in Real-Time
Fintech Account Takeover: A Playbook for Correlating Phone, IP, and IBAN Signals in Real-Time
Account Takeover (ATO) fraud is a significant threat to the financial technology sector, where criminals gain unauthorized access to user accounts to steal funds and sensitive data. The speed and di...
8 Reader,
18m reading
Unmasking Sock Puppet Armies: A Marketplace’s Playbook for Linking Phone Scoring and IP Intelligence
Unmasking Sock Puppet Armies: A Marketplace’s Playbook for Linking Phone Scoring and IP Intelligence
Fake reviews, manipulated ratings, and widespread spam can quickly erode the trust you've built with your users. If you run an online marketplace, you're not just managing transactions; you're culti...
13 Reader,
11m reading
The Bust-Out Fraud Playbook: How to Link BIN, Email, and Phone Data to Predict Hit-and-Run Scammers
The Bust-Out Fraud Playbook: How to Link BIN, Email, and Phone Data to Predict Hit-and-Run Scammers
Bust-out fraud is a calculated, deceptive scheme where a criminal builds a seemingly normal history with a business before maxing out their credit line and vanishing without a trace. This "hit-and-r...
29 Reader,
11m reading
Anatomy of a Bust-Out: How to Detect Planned Credit Fraud Using Transaction, Email, and Phone Scoring APIs
Anatomy of a Bust-Out: How to Detect Planned Credit Fraud Using Transaction, Email, and Phone Scoring APIs
Bust-out fraud is a calculated, long-con scheme where a fraudster (or a ring of them) establishes a seemingly legitimate credit history with the sole intention of maxing out the credit line and vani...
39 Reader,
13m reading
Beyond 2FA: A Technical Guide to Detecting SIM Swap Fraud with Phone, IP, and Transaction APIs
Beyond 2FA: A Technical Guide to Detecting SIM Swap Fraud with Phone, IP, and Transaction APIs
Two-factor authentication (2FA) has long been the gold standard for securing online accounts, providing a crucial second layer of defense beyond a simple password. However, what happens when the "so...
59 Reader,
13m reading




Related Articles