A comprehensive guide to security terminology
3-D Secure (3DS)
6AMLD (6th Anti Money Laundering Directive)
Accidental Friendly Fraud
Account Farming
Account Takeover
Active Authentication
Address Verification Service (AVS)
Age Verification
AML (Anti-Money Laundering)
Arbitrage in Sports Betting
Auction Fraud
Bank Drop
Behavioral Analysis
BIN Attack
Biometric Authentication
Biometric Verification
Blackbox Machine Learning
Blended Threat
Bonus Abuse
Botnet
Browser Hash
Business Email Compromise (BEC)
Business Verification Services
Canvas Fingerprinting
Card Cloning
Card Cracking
Card Purchase Authorization
Card Testing
Carding
Casino Whoring (Bonus Whoring)
Certificate Fraud
Chargeback Rate
Chargeback Recovery
Chargebacks
Chip Dumping
Clean Fraud
CNAM (Caller ID Name)
Compliance as a Service (CaaS)
Cookie Hash
Cookie Stuffing
Credit Card Decline Codes
Cross Site Scripting
Cross-Browser Fingerprinting
Cryptojacking
Customer Identification Program (CIP)
Customer Identity and Access Management
Customer Screening
Data Sovereignty
Datacenter Proxy
Deepfake
Defaulting Customers
Device Hash
Disposable Email
Double Dipping
Doxxing & Digital Risk
Drop Address
Emulator
Enhanced Due Diligence
Evercookie
False Declines
False Negatives
False Positives
First Party Fraud
Flagging
Fraud as a Service
Fullz
Graph Neural Network (GNN)
Heuristic Rules
Home Location Register
Identity Theft & Identity Fraud
Identity Threat Detection and Response
Initial Fraud Alert
IP Address
Jamming Attacks
Job Scams
KYB (Know Your Business)
KYC
Link Analysis
Machine Reasoning
Man-in-the-Middle (MitM) Attack
Manual Review
Masquerade Attack
Matched Betting
Mobile Proxy
Money Mule
OFAC
One Ring Scam
P2P Fraud
Passive Authentication
Payment Authentication
Payment Conversion Rate
Payment Reversal
Personally Identifiable Information (PII)
Phishing
Politically Exposed Person (PEP)
Promo Abuse
Proof of Address
Recovery Scams
Refund Rate
Reshipping
Sanctioned Entity
SCA
Scareware
Second Party Fraud
Self-Sovereign Identity
Smurfing
Sneaker Bot
Social Media Profiling
SOCMINT (Social Media Intelligence)
Source of Funds
Spear-Phishing
SSL Inspection
Supervised Machine Learning
Suspicious Activity Report (SAR)
Third Party Fraud
Threatware
Ticket Scalping
Tor
Trading Bot Scams
Triangulation Fraud
Unsupervised Machine Learning
Velocity Checks
Vendor Email Compromise (VEC)
Virtual Asset Service Providers
Visa Dispute Monitoring Program (VDMP)
Vishing
Wangiri Fraud (Wangiri Scam)
What Is eKYC?
Whitebox Machine Learning
Wire Fraud
Yield Farming Scams
Zero Day Attack
Zombie Networks