{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/bank-drop/","url":"https://seon.io/resources/dictionary/bank-drop/","name":"What Is a Bank Drop? | How Does It Work? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/dictionary/bank-drop/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2022/02/Money-Mule-1024x586.png","datePublished":"2022-02-22T14:19:13+00:00","dateModified":"2025-10-27T16:27:20+00:00","description":"What’s a bank drop and how do criminals and money mules use it in money laundering? How can banks and financial organizations protect themselves?","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/dictionary/bank-drop/#primaryimage","url":"https://seon.io/wp-content/uploads/2022/02/Money-Mule.png","contentUrl":"https://seon.io/wp-content/uploads/2022/02/Money-Mule.png","width":3450,"height":1974}
{"@context":"https://schema.org","@type":"WebSite","@id":"https://seon.io/#website","url":"https://seon.io/","name":"SEON","description":"Fraud Prevention &amp; AML Compliance","publisher":{"@id":"https://seon.io/#organization"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Organization","@id":"https://seon.io/#organization","name":"SEON","alternateName":"seon.io","url":"https://seon.io/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/#/schema/logo/image/","url":"https://seon.io/wp-content/uploads/2024/08/seon-full-1.svg","contentUrl":"https://seon.io/wp-content/uploads/2024/08/seon-full-1.svg","width":94,"height":32,"caption":"SEON"},"image":{"@id":"https://seon.io/#/schema/logo/image/"},"sameAs":["https://www.facebook.com/SEON.FraudFighters/","https://x.com/seon_tech"],"description":"SEON is the AI-powered fraud prevention platform for AML, KYC, and identity verification. Leveraging 900+ real-time data signals, SEON provides a unified platform to detect risk, automate decisions, and onboard customers with confidence. Serving fintech, eCommerce, and iGaming, SEON goes live in 14 days on average with the data depth and expert support that resellers and orchestrators can't match.","email":"info@seon.io","legalName":"SEON Technologies Ltd","foundingDate":"2017-01-01","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"201","maxValue":"500"}}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/3d-secure/","url":"https://seon.io/resources/dictionary/3d-secure/","name":"What Is 3-D Secure (3DS) - How Does It Work? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/dictionary/3d-secure/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2022/02/Fraud-Dictionary_3-d-secure-dictionary-entry_Illustration-1024x869-min.png","datePublished":"2022-02-18T09:59:33+00:00","dateModified":"2025-08-12T15:19:07+00:00","description":"Everything you need to know about 3-D Secure as a business owner, card issuer or consumer. How is it linked to SCA and how does it benefit merchants?","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/dictionary/3d-secure/#primaryimage","url":"https://seon.io/wp-content/uploads/2022/02/Fraud-Dictionary_3-d-secure-dictionary-entry_Illustration-1024x869-min.png","contentUrl":"https://seon.io/wp-content/uploads/2022/02/Fraud-Dictionary_3-d-secure-dictionary-entry_Illustration-1024x869-min.png","width":700,"height":594}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/matched-betting/","url":"https://seon.io/resources/dictionary/matched-betting/","name":"What Is Matched Betting & How Does It Work? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/dictionary/matched-betting/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2022/02/main-image-bonus2.png","datePublished":"2022-02-22T08:31:44+00:00","dateModified":"2025-05-16T15:33:19+00:00","description":"What is matched betting and how can iGaming companies protect themselves? Find out why it is considered fraud and how to avoid it.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/dictionary/matched-betting/#primaryimage","url":"https://seon.io/wp-content/uploads/2022/02/main-image-bonus2.png","contentUrl":"https://seon.io/wp-content/uploads/2022/02/main-image-bonus2.png","width":600,"height":615}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/manual-reviews/","url":"https://seon.io/resources/dictionary/manual-reviews/","name":"Manual Reviews: When & How to Use Them | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/dictionary/manual-reviews/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2022/02/Manual-Review-1024x621.png","datePublished":"2022-02-22T08:33:51+00:00","dateModified":"2025-10-17T13:45:41+00:00","description":"Explore when manual reviews are needed in AML workflows and strategies to balance automation with expert analysis.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/dictionary/manual-reviews/#primaryimage","url":"https://seon.io/wp-content/uploads/2022/02/Manual-Review.png","contentUrl":"https://seon.io/wp-content/uploads/2022/02/Manual-Review.png","width":3520,"height":2134}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/mobile-proxy/","url":"https://seon.io/resources/dictionary/mobile-proxy/","name":"What Is a Mobile Proxy - How Do They Work? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/dictionary/mobile-proxy/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2022/03/Mobile-Proxy-1024x370.png","datePublished":"2022-02-22T08:34:08+00:00","dateModified":"2024-06-27T16:43:36+00:00","description":"What’s a mobile proxy? How does it differ from other types of proxies? See how are mobile proxies used in fraud and how to protect against them.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/dictionary/mobile-proxy/#primaryimage","url":"https://seon.io/wp-content/uploads/2022/03/Mobile-Proxy.png","contentUrl":"https://seon.io/wp-content/uploads/2022/03/Mobile-Proxy.png","width":3512,"height":1269,"caption":"Mobile Proxy"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/reshipping/","url":"https://seon.io/resources/dictionary/reshipping/","name":"What Is Reshipping (Fake Address Fraud)? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"datePublished":"2022-02-22T08:34:23+00:00","dateModified":"2024-03-25T14:29:44+00:00","description":"What is reshipping, aka delivery address fraud or fake address fraud? Find out how fraudsters use the reshipping scam and how to stop them in their tracks.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/money-mule/","url":"https://seon.io/resources/dictionary/money-mule/","name":"What Is a Money Mule? Key Detection Signs","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/dictionary/money-mule/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2022/02/money-mule-illustration_v2-1024x586.png","datePublished":"2022-02-22T08:34:58+00:00","dateModified":"2025-11-24T15:19:12+00:00","description":"What are money mules? How does money laundering via mules work and how do you stop it? Which companies are at risk and how to stop it.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/dictionary/money-mule/#primaryimage","url":"https://seon.io/wp-content/uploads/2022/02/money-mule-illustration_v2.png","contentUrl":"https://seon.io/wp-content/uploads/2022/02/money-mule-illustration_v2.png","width":1726,"height":987}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/sca/","url":"https://seon.io/resources/dictionary/sca/","name":"What Is SCA (Strong Customer Authentication)? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/dictionary/sca/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2022/02/Strong-Customer-Authentication-SCA-1024x749.png","datePublished":"2022-02-22T08:36:20+00:00","dateModified":"2025-08-12T15:22:18+00:00","description":"What is SCA and how does it help ensure safer transactions? What does strong customer authentication entail for merchants & buyers? SCA vs PSD2 vs 3DS","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/dictionary/sca/#primaryimage","url":"https://seon.io/wp-content/uploads/2022/02/Strong-Customer-Authentication-SCA.png","contentUrl":"https://seon.io/wp-content/uploads/2022/02/Strong-Customer-Authentication-SCA.png","width":2584,"height":1890}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/tor/","url":"https://seon.io/resources/dictionary/tor/","name":"What Is Tor and the Tor Browser? How Does It Work? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/dictionary/tor/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2017/05/1280px-Tor-logo-2011-flat.svg_-1024x619.png","datePublished":"2022-02-22T08:36:32+00:00","dateModified":"2023-11-15T12:21:19+00:00","description":"A simple explainer of Tor, onion routing and the Tor browser. Is Tor illegal? Who uses it and what for? And how can companies prevent Tor-related fraud?","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/dictionary/tor/#primaryimage","url":"https://seon.io/wp-content/uploads/2017/05/1280px-Tor-logo-2011-flat.svg_.png","contentUrl":"https://seon.io/wp-content/uploads/2017/05/1280px-Tor-logo-2011-flat.svg_.png","width":1280,"height":774,"caption":"Tor browser"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/whitebox-machine-learning/","url":"https://seon.io/resources/dictionary/whitebox-machine-learning/","name":"What Is Whitebox Machine Learning - How Does It Work? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/dictionary/whitebox-machine-learning/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-light.png","datePublished":"2022-02-22T08:36:45+00:00","dateModified":"2024-11-26T14:03:15+00:00","description":"Whitebox machine learning explanation. How is it different from blackbox machine learning? Why is it better for fraud detection & prevention?","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/dictionary/whitebox-machine-learning/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-light.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-08-light.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/velocity-check/","url":"https://seon.io/resources/dictionary/velocity-check/","name":"Velocity Check: Fraud Prevention Technique | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/dictionary/velocity-check/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2022/02/Elaborate-graphic-or-infographic-for-velocity-rules-checking-V2-1024x387.png","datePublished":"2022-02-22T08:36:55+00:00","dateModified":"2025-12-08T15:24:11+00:00","description":"Learn about velocity checks, how they detect rapid transaction patterns, and implementation tips for fraud prevention.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/dictionary/velocity-check/#primaryimage","url":"https://seon.io/wp-content/uploads/2022/02/Elaborate-graphic-or-infographic-for-velocity-rules-checking-V2.png","contentUrl":"https://seon.io/wp-content/uploads/2022/02/Elaborate-graphic-or-infographic-for-velocity-rules-checking-V2.png","width":1303,"height":493,"caption":"velocity rules checking"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/canvas-fingerprinting/","url":"https://seon.io/resources/dictionary/canvas-fingerprinting/","name":"What Is Canvas Fingerprinting - How Does It Work? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/dictionary/canvas-fingerprinting/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2022/02/Canvas-Fingerprinting_FraudDictionary_Illustration-1024x663.png","datePublished":"2022-02-22T08:37:07+00:00","dateModified":"2023-11-22T09:40:35+00:00","description":"How do sites use HTML canvas fingerprinting to find out more about their visitors, and how can canvas fingerprinting help prevent fraud and malicious attacks?","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/dictionary/canvas-fingerprinting/#primaryimage","url":"https://seon.io/wp-content/uploads/2022/02/Canvas-Fingerprinting_FraudDictionary_Illustration.png","contentUrl":"https://seon.io/wp-content/uploads/2022/02/Canvas-Fingerprinting_FraudDictionary_Illustration.png","width":1400,"height":906}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/smurfing/","url":"https://seon.io/resources/dictionary/smurfing/","name":"What Is Smurfing? Definition & Prevention | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/dictionary/smurfing/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2021/06/SEON-Infographic-A-Better-KYC-Procedure-with-Frictionless-User-Verification-page-001-376x1024.jpg","datePublished":"2022-02-22T14:08:58+00:00","dateModified":"2025-07-18T08:44:33+00:00","description":"Understand smurfing in money laundering, its warning signs, and prevention techniques with illustrative examples.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/dictionary/smurfing/#primaryimage","url":"https://seon.io/wp-content/uploads/2021/06/SEON-Infographic-A-Better-KYC-Procedure-with-Frictionless-User-Verification-page-001-scaled.jpg","contentUrl":"https://seon.io/wp-content/uploads/2021/06/SEON-Infographic-A-Better-KYC-Procedure-with-Frictionless-User-Verification-page-001-scaled.jpg","width":939,"height":2560,"caption":"SEON Infographic - A Better KYC Procedure with Frictionless User Verification-page-001"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/social-media-profiling/","url":"https://seon.io/resources/dictionary/social-media-profiling/","name":"What Is Social Media Profiling - How It Works? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/dictionary/social-media-profiling/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2022/02/image-removebg-preview.png","datePublished":"2022-02-22T14:09:39+00:00","dateModified":"2025-01-03T17:19:54+00:00","description":"Social media profiling is incredibly useful in the fight against fraud. Learn how it works and how it can protect your company from scams, crime and fraud.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/dictionary/social-media-profiling/#primaryimage","url":"https://seon.io/wp-content/uploads/2022/02/image-removebg-preview.png","contentUrl":"https://seon.io/wp-content/uploads/2022/02/image-removebg-preview.png","width":723,"height":345,"caption":"social media platforms"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/ssl-inspection/","url":"https://seon.io/resources/dictionary/ssl-inspection/","name":"What Is SSL Inspection - How Does It Work? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/dictionary/ssl-inspection/#primaryimage"},"thumbnailUrl":"https://lh5.googleusercontent.com/WTECtWB8o6yqNRkQR7MmBCOMC1PE38JqGjP5UgzaETu08UVXYz0UktuMUiZRTk60ZkZ9a_efVVK_HgXlRYs_B2Mb8rz_llyEIPlehAWGIv9MOu80fJtrSxxtlQ-kpCzn9YpPRETC","datePublished":"2022-02-22T14:09:54+00:00","dateModified":"2023-11-22T09:41:57+00:00","description":"The Secure Socket Layer (SSL) is a cornerstone of safety online. Find out the whats and whys of SSL inspection and SSL interception.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/dictionary/ssl-inspection/#primaryimage","url":"https://lh5.googleusercontent.com/WTECtWB8o6yqNRkQR7MmBCOMC1PE38JqGjP5UgzaETu08UVXYz0UktuMUiZRTk60ZkZ9a_efVVK_HgXlRYs_B2Mb8rz_llyEIPlehAWGIv9MOu80fJtrSxxtlQ-kpCzn9YpPRETC","contentUrl":"https://lh5.googleusercontent.com/WTECtWB8o6yqNRkQR7MmBCOMC1PE38JqGjP5UgzaETu08UVXYz0UktuMUiZRTk60ZkZ9a_efVVK_HgXlRYs_B2Mb8rz_llyEIPlehAWGIv9MOu80fJtrSxxtlQ-kpCzn9YpPRETC"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/cookie-stuffing/","url":"https://seon.io/resources/dictionary/cookie-stuffing/","name":"What Is Cookie Stuffing - How Does It Work? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/dictionary/cookie-stuffing/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2022/01/Browser-Fingerprinting-Illustration-2-1-1024x589.png","datePublished":"2022-02-22T14:10:09+00:00","dateModified":"2024-06-26T16:08:41+00:00","description":"Cookie stuffing is one of the most common types of affiliate fraud. Find out more as well as how to stop it and protect your business.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/dictionary/cookie-stuffing/#primaryimage","url":"https://seon.io/wp-content/uploads/2022/01/Browser-Fingerprinting-Illustration-2-1.png","contentUrl":"https://seon.io/wp-content/uploads/2022/01/Browser-Fingerprinting-Illustration-2-1.png","width":1602,"height":922}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/bin-attack/","url":"https://seon.io/resources/dictionary/bin-attack/","name":"What Is a BIN Attack & How to Prevent It | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/dictionary/bin-attack/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2022/02/BIN-Attack-1024x791.png","datePublished":"2022-02-22T14:10:38+00:00","dateModified":"2024-10-16T15:39:22+00:00","description":"Find out what are BIN attacks and how they can affect everyone from consumers to banks and online merchants. How do you protect against BIN attack fraud?","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/dictionary/bin-attack/#primaryimage","url":"https://seon.io/wp-content/uploads/2022/02/BIN-Attack.png","contentUrl":"https://seon.io/wp-content/uploads/2022/02/BIN-Attack.png","width":1183,"height":914,"caption":"bin attack credit card"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/emulator/","url":"https://seon.io/resources/dictionary/emulator/","name":"What Are Emulators in Fraud - How Do They Work? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/dictionary/emulator/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2022/02/Emulator-1024x918.png","datePublished":"2022-02-22T14:11:39+00:00","dateModified":"2025-05-15T10:25:15+00:00","description":"Emulators are a device spoofing method used by criminals to conduct fraud, appearing more legitimate and fooling basic detection software. Read more.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/dictionary/emulator/#primaryimage","url":"https://seon.io/wp-content/uploads/2022/02/Emulator.png","contentUrl":"https://seon.io/wp-content/uploads/2022/02/Emulator.png","width":1524,"height":1366}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/blackbox-machine-learning/","url":"https://seon.io/resources/dictionary/blackbox-machine-learning/","name":"What Is Blackbox Machine Learning - How Does It Work? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/dictionary/blackbox-machine-learning/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-06-dark.png","datePublished":"2022-02-22T14:12:25+00:00","dateModified":"2025-11-25T09:45:06+00:00","description":"Blackbox machine learning vs whitebox machine learning: What are the differences and why do they matter? And which is better for fraud detection?","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/dictionary/blackbox-machine-learning/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-06-dark.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-06-dark.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/kyc/","url":"https://seon.io/resources/dictionary/kyc/","name":"What Is KYC (Know Your Customer) & Why It's Crucial | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/dictionary/kyc/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2022/02/KYC-Know-Your-Customer-1024x788.png","datePublished":"2022-02-22T14:13:54+00:00","dateModified":"2026-02-04T12:26:33+00:00","description":"Why do banks ask for KYC checks? Who needs to use them and how do KYC regulations stop fraud? Find out the different KYC types and methods.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/dictionary/kyc/#primaryimage","url":"https://seon.io/wp-content/uploads/2022/02/KYC-Know-Your-Customer.png","contentUrl":"https://seon.io/wp-content/uploads/2022/02/KYC-Know-Your-Customer.png","width":2254,"height":1734,"caption":"KYC"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/heuristic-rules/","url":"https://seon.io/resources/dictionary/heuristic-rules/","name":"What Are Heuristic Rules - How Do They Work? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/dictionary/heuristic-rules/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2022/02/Heuristic-Rules-1024x565.png","datePublished":"2022-02-22T14:14:11+00:00","dateModified":"2026-04-13T15:58:56+00:00","description":"What are heuristics in computing? How are they used in fraud detection? Pros and cons of heuristic rules and examples of heuristics.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/dictionary/heuristic-rules/#primaryimage","url":"https://seon.io/wp-content/uploads/2022/02/Heuristic-Rules.png","contentUrl":"https://seon.io/wp-content/uploads/2022/02/Heuristic-Rules.png","width":3996,"height":2206}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/cookie-hash/","url":"https://seon.io/resources/dictionary/cookie-hash/","name":"What Is a Cookie Hash - How Does It Work? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/dictionary/cookie-hash/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2022/02/Cookie-Hash-1024x506.png","datePublished":"2022-02-22T14:14:29+00:00","dateModified":"2023-08-11T16:23:26+00:00","description":"What’s a cookie hash and how does it help in the fight against fraud and cybercrime? Is it an effective method to stop fraudulent activity?","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/dictionary/cookie-hash/#primaryimage","url":"https://seon.io/wp-content/uploads/2022/02/Cookie-Hash.png","contentUrl":"https://seon.io/wp-content/uploads/2022/02/Cookie-Hash.png","width":3422,"height":1692,"caption":"Cookie Hash"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/avs-address-verification-service/","url":"https://seon.io/resources/dictionary/avs-address-verification-service/","name":"What Is the Address Verification Service (AVS)? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"datePublished":"2022-02-22T14:15:41+00:00","dateModified":"2025-07-29T11:13:18+00:00","description":"Address Verification System or Service: Why is AVS important and what does this mean for consumers and organizations in ecommerce and online payments?","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/fullz/","url":"https://seon.io/resources/dictionary/fullz/","name":"What Are Fullz - How Do Fullz Work? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/dictionary/fullz/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2022/07/Fullz_2-562x1024-1.png","datePublished":"2022-02-22T14:16:10+00:00","dateModified":"2023-11-22T13:56:28+00:00","description":"Fullz or fulls: What are they? Where does the word come from? What is their purpose and how can consumers and businesses protect themselves?","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/dictionary/fullz/#primaryimage","url":"https://seon.io/wp-content/uploads/2022/07/Fullz_2-562x1024-1.png","contentUrl":"https://seon.io/wp-content/uploads/2022/07/Fullz_2-562x1024-1.png","width":444,"height":809}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/false-positives/","url":"https://seon.io/resources/dictionary/false-positives/","name":"What Are False Positives in Fraud? What Causes Them? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/dictionary/false-positives/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2022/02/Purchase-Authorization-Process_Workflow-1024x337.png","datePublished":"2022-02-22T14:16:18+00:00","dateModified":"2025-08-07T08:19:57+00:00","description":"What happens when anti-fraud platforms return false positives? How are false declines caused and what can be done about them?","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/dictionary/false-positives/#primaryimage","url":"https://seon.io/wp-content/uploads/2022/02/Purchase-Authorization-Process_Workflow.png","contentUrl":"https://seon.io/wp-content/uploads/2022/02/Purchase-Authorization-Process_Workflow.png","width":4060,"height":1338}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/false-declines/","url":"https://seon.io/resources/dictionary/false-declines/","name":"What Are False Declines in Fraud? What Causes Them? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/dictionary/false-declines/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2022/02/Purchase-Authorization-Process_Workflow-1024x337.png","datePublished":"2022-02-22T14:16:54+00:00","dateModified":"2025-07-18T12:24:29+00:00","description":"What causes false declines? Why are they bad for ecommerce businesses? Read how to get efficient fraud prevention without false declines.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/dictionary/false-declines/#primaryimage","url":"https://seon.io/wp-content/uploads/2022/02/Purchase-Authorization-Process_Workflow.png","contentUrl":"https://seon.io/wp-content/uploads/2022/02/Purchase-Authorization-Process_Workflow.png","width":4060,"height":1338}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/drop-address/","url":"https://seon.io/resources/dictionary/drop-address/","name":"What Is a Drop Address - How Do They Work? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"datePublished":"2022-02-22T14:17:00+00:00","dateModified":"2023-11-10T15:55:01+00:00","description":"What are drop addresses and how do they relate to reshipping fraud and money laundering? Is it illegal to own or run a drop address and why? Find out in this explainer.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/device-hash/","url":"https://seon.io/resources/dictionary/device-hash/","name":"What Is a Device Hash - How Does It Work? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/dictionary/device-hash/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2022/02/Cookie-Hash-1024x506.png","datePublished":"2022-02-22T14:17:05+00:00","dateModified":"2026-04-13T15:57:22+00:00","description":"What is a Device Hash and how can be used? How is it useful in the Fraud Fight and What it's the connection to Digital Footprint?","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/dictionary/device-hash/#primaryimage","url":"https://seon.io/wp-content/uploads/2022/02/Cookie-Hash.png","contentUrl":"https://seon.io/wp-content/uploads/2022/02/Cookie-Hash.png","width":3422,"height":1692,"caption":"Cookie Hash"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/deepfakes/","url":"https://seon.io/resources/dictionary/deepfakes/","name":"What Is a Deepfake - How Do Deepfakes Work? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/dictionary/deepfakes/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2022/03/audio-deepfake-1024x1024.png","datePublished":"2022-02-22T14:17:11+00:00","dateModified":"2026-02-19T14:09:03+00:00","description":"What are deepfakes and why does it matter to businesses and consumers? How are deepfakes used in fraud and what’s going to happen in the future?","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/dictionary/deepfakes/#primaryimage","url":"https://seon.io/wp-content/uploads/2022/03/audio-deepfake.png","contentUrl":"https://seon.io/wp-content/uploads/2022/03/audio-deepfake.png","width":1200,"height":1200,"caption":"audio deepfake"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/clean-fraud/","url":"https://seon.io/resources/dictionary/clean-fraud/","name":"What Is Clean Fraud - How Does It Work? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/dictionary/clean-fraud/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2022/08/Fraud_chart_3.png","datePublished":"2022-02-22T14:17:57+00:00","dateModified":"2023-11-17T10:50:36+00:00","description":"What is clean fraud? How does it work and how do you stop it? Detection and prevention of clean fraud is difficult but possible, using various tools and methods.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/dictionary/clean-fraud/#primaryimage","url":"https://seon.io/wp-content/uploads/2022/08/Fraud_chart_3.png","contentUrl":"https://seon.io/wp-content/uploads/2022/08/Fraud_chart_3.png","width":1600,"height":1085}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/carding/","url":"https://seon.io/resources/dictionary/carding/","name":"What Is Carding - How Does It Work? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"datePublished":"2022-02-22T14:18:03+00:00","dateModified":"2025-05-16T15:11:39+00:00","description":"What is carding? How is it done and how does it affect organizations and consumers? What steps can prevent it and keep funds and data safe from fraud?","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/card-cloning/","url":"https://seon.io/resources/dictionary/card-cloning/","name":"What Is Card Cloning - How Does It Work? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"datePublished":"2022-02-22T14:18:16+00:00","dateModified":"2023-07-14T10:41:15+00:00","description":"How do thieves clone credit cards and how is card cloning prevented? What is card skimming and what’s a skimmer machine? And how do you protect from it?","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/browser-hash/","url":"https://seon.io/resources/dictionary/browser-hash/","name":"What Is a Browser Hash - How Does It Work? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/dictionary/browser-hash/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2022/02/Cookie-Hash-1024x506.png","datePublished":"2022-02-22T14:18:23+00:00","dateModified":"2024-01-31T16:44:50+00:00","description":"What is a browser hash and how does it help organizations fight fraud and cybercrime? Find out about the browser hash aspect of fingerprinting here.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/dictionary/browser-hash/#primaryimage","url":"https://seon.io/wp-content/uploads/2022/02/Cookie-Hash.png","contentUrl":"https://seon.io/wp-content/uploads/2022/02/Cookie-Hash.png","width":3422,"height":1692,"caption":"Cookie Hash"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/biometric-verification/","url":"https://seon.io/resources/dictionary/biometric-verification/","name":"What Is Biometric Verification - How Does It Work? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/dictionary/biometric-verification/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2022/10/Types_of_Biometrics_used_for_authentication-min.png","datePublished":"2022-02-22T14:19:08+00:00","dateModified":"2025-11-11T14:30:51+00:00","description":"How do biometrics help verify a person is who they claim to be? Read biometric examples & how biometrics help fight cyber fraud right here.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/dictionary/biometric-verification/#primaryimage","url":"https://seon.io/wp-content/uploads/2022/10/Types_of_Biometrics_used_for_authentication-min.png","contentUrl":"https://seon.io/wp-content/uploads/2022/10/Types_of_Biometrics_used_for_authentication-min.png","width":645,"height":525}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/auction-fraud/","url":"https://seon.io/resources/dictionary/auction-fraud/","name":"What Is Auction Fraud? | How Does it Work? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/dictionary/auction-fraud/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2022/02/Auction-Fraud-1024x726.png","datePublished":"2022-02-22T16:41:51+00:00","dateModified":"2024-01-31T11:19:43+00:00","description":"Auction fraud is one of the oldest types of online fraud, but that does not make it less dangerous. Find out how it’s done, what forms it takes and how to stop it.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/dictionary/auction-fraud/#primaryimage","url":"https://seon.io/wp-content/uploads/2022/02/Auction-Fraud.png","contentUrl":"https://seon.io/wp-content/uploads/2022/02/Auction-Fraud.png","width":2966,"height":2104}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/card-testing/","url":"https://seon.io/resources/dictionary/card-testing/","name":"What Is Card Testing - How Does It Work? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/dictionary/card-testing/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2022/02/BIN-Attack-1-1024x812.png","datePublished":"2022-02-22T16:43:13+00:00","dateModified":"2025-08-12T15:19:34+00:00","description":"What is this type of fraud? Why do fraudsters do card testing? What are the consequences for merchants and how do you prevent testing?","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/dictionary/card-testing/#primaryimage","url":"https://seon.io/wp-content/uploads/2022/02/BIN-Attack-1.png","contentUrl":"https://seon.io/wp-content/uploads/2022/02/BIN-Attack-1.png","width":2330,"height":1848,"caption":"BIN Attack"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/chargeback-recovery/","url":"https://seon.io/resources/dictionary/chargeback-recovery/","name":"What Is Chargeback Recovery – How Does It Work? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/dictionary/chargeback-recovery/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2022/10/Fraud-Dictionary_Chargeback-Illustration-657x1024.png","datePublished":"2022-04-29T10:18:26+00:00","dateModified":"2023-11-10T11:02:54+00:00","description":"Online merchants are plagued by chargebacks. Chargeback disputes and recovery can help prevent this – as can being proactive in preventing them.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/dictionary/chargeback-recovery/#primaryimage","url":"https://seon.io/wp-content/uploads/2022/10/Fraud-Dictionary_Chargeback-Illustration.png","contentUrl":"https://seon.io/wp-content/uploads/2022/10/Fraud-Dictionary_Chargeback-Illustration.png","width":3200,"height":4986}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/card-purchase-authorization/","url":"https://seon.io/resources/dictionary/card-purchase-authorization/","name":"What Is Card Purchase Authorization? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/dictionary/card-purchase-authorization/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2022/10/machine_C_-1.png","datePublished":"2022-05-10T08:03:04+00:00","dateModified":"2025-07-18T12:28:53+00:00","description":"What’s a card purchase authorization and why use it? What can go wrong during a card sale online or at POS? Read useful info for merchants.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/dictionary/card-purchase-authorization/#primaryimage","url":"https://seon.io/wp-content/uploads/2022/10/machine_C_-1.png","contentUrl":"https://seon.io/wp-content/uploads/2022/10/machine_C_-1.png","width":667,"height":1182}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/ticket-scalping/","url":"https://seon.io/resources/dictionary/ticket-scalping/","name":"What Is Ticket Scalping? Risks & Prevention | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/dictionary/ticket-scalping/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2022/05/Ticket-Scalping_corrected.png","datePublished":"2022-05-23T07:35:01+00:00","dateModified":"2025-07-18T09:12:51+00:00","description":"Learn what ticket scalping is, how bots exploit sales, and prevention strategies to protect your platform.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/dictionary/ticket-scalping/#primaryimage","url":"https://seon.io/wp-content/uploads/2022/05/Ticket-Scalping_corrected.png","contentUrl":"https://seon.io/wp-content/uploads/2022/05/Ticket-Scalping_corrected.png","width":595,"height":842}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/evercookie/","url":"https://seon.io/resources/dictionary/evercookie/","name":"What is an Evercookie? How Does it Work? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/dictionary/evercookie/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2022/02/machine_E.png","datePublished":"2022-06-07T11:20:32+00:00","dateModified":"2023-04-19T12:57:51+00:00","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/dictionary/evercookie/#primaryimage","url":"https://seon.io/wp-content/uploads/2022/02/machine_E.png","contentUrl":"https://seon.io/wp-content/uploads/2022/02/machine_E.png","width":2292,"height":3330,"caption":"Letter E"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/casino-whoring/","url":"https://seon.io/resources/dictionary/casino-whoring/","name":"What Is Casino Whoring? – How Does Casino Whoring Work? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/dictionary/casino-whoring/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2022/06/Casino-whoring-1024x665.png","datePublished":"2022-06-16T09:06:46+00:00","dateModified":"2025-05-16T15:33:42+00:00","description":"What is casino whoring? Is it the same as bonus whoring? Is it a kind of fraud? Is this kind of gambling illegal?","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/dictionary/casino-whoring/#primaryimage","url":"https://seon.io/wp-content/uploads/2022/06/Casino-whoring.png","contentUrl":"https://seon.io/wp-content/uploads/2022/06/Casino-whoring.png","width":1600,"height":1039,"caption":"Casino whoring"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/scareware/","url":"https://seon.io/resources/dictionary/scareware/","name":"What Is Scareware? – How Does It Work? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/dictionary/scareware/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2022/02/8_type_of_soccialE-1024x721.png","datePublished":"2022-06-29T09:55:46+00:00","dateModified":"2024-05-23T10:42:33+00:00","description":"Find out what scareware is, how it works, and what to do to protect yourself and your company against malicious popup adverts.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/dictionary/scareware/#primaryimage","url":"https://seon.io/wp-content/uploads/2022/02/8_type_of_soccialE.png","contentUrl":"https://seon.io/wp-content/uploads/2022/02/8_type_of_soccialE.png","width":1600,"height":1126}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/datacenter-proxy/","url":"https://seon.io/resources/dictionary/datacenter-proxy/","name":"What Is a Datacenter Proxy? – How Does It Work? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/dictionary/datacenter-proxy/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2022/06/Datacenterproxxy_flower-1024x633.png","datePublished":"2022-07-04T09:03:49+00:00","dateModified":"2023-04-19T12:56:15+00:00","description":"What is a datacenter proxy? How are they different from mobile or residential proxies? How can they be used for fraud – and how do you stop it?","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/dictionary/datacenter-proxy/#primaryimage","url":"https://seon.io/wp-content/uploads/2022/06/Datacenterproxxy_flower.png","contentUrl":"https://seon.io/wp-content/uploads/2022/06/Datacenterproxxy_flower.png","width":1780,"height":1100,"caption":"Datacenter Proxy"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/triangulation-fraud/","url":"https://seon.io/resources/dictionary/triangulation-fraud/","name":"What Is Triangulation Fraud & How Does It Work? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/dictionary/triangulation-fraud/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2022/02/machine_T.png","datePublished":"2022-07-11T11:54:12+00:00","dateModified":"2026-03-26T17:06:02+00:00","description":"Triangulation fraud uses stolen cards to intercept transactions, affecting buyers and sellers. Learn how it works to stop it.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/dictionary/triangulation-fraud/#primaryimage","url":"https://seon.io/wp-content/uploads/2022/02/machine_T.png","contentUrl":"https://seon.io/wp-content/uploads/2022/02/machine_T.png","width":1476,"height":2576,"caption":"Letter T"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/enhanced-due-diligence/","url":"https://seon.io/resources/dictionary/enhanced-due-diligence/","name":"What Is Enhanced Due Diligence (EDD) & How It Works | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/dictionary/enhanced-due-diligence/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2022/02/machine_E.png","datePublished":"2022-07-18T07:41:52+00:00","dateModified":"2024-02-28T16:10:15+00:00","description":"EDD is an extension of Customer Due Diligence (CDD), which itself is the foundation of the Know Your Customer (KYC) mandates. Find out more here.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/dictionary/enhanced-due-diligence/#primaryimage","url":"https://seon.io/wp-content/uploads/2022/02/machine_E.png","contentUrl":"https://seon.io/wp-content/uploads/2022/02/machine_E.png","width":2292,"height":3330,"caption":"Letter E"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/double-dipping/","url":"https://seon.io/resources/dictionary/double-dipping/","name":"What Is Double Dipping in Fraud? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/dictionary/double-dipping/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2022/08/Double_dipping-1-1024x548.png","datePublished":"2022-08-11T10:53:24+00:00","dateModified":"2023-04-19T12:51:20+00:00","description":"Double dipping in fraud is a popular scam that comes at a heavy cost to businesses. Find out how it works and how to combat it.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/dictionary/double-dipping/#primaryimage","url":"https://seon.io/wp-content/uploads/2022/08/Double_dipping-1.png","contentUrl":"https://seon.io/wp-content/uploads/2022/08/Double_dipping-1.png","width":1600,"height":856,"caption":"Double Dipping"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/wire-fraud/","url":"https://seon.io/resources/dictionary/wire-fraud/","name":"What Is Wire Fraud? How Does It Work? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/dictionary/wire-fraud/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2022/06/Multi-Accounting-Users.gif","datePublished":"2022-08-17T14:46:12+00:00","dateModified":"2025-05-16T15:06:57+00:00","description":"What is wire fraud? The answer is more complex than you may imagine, as the term covers a multitude of different crimes. Discover how it works.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/dictionary/wire-fraud/#primaryimage","url":"https://seon.io/wp-content/uploads/2022/06/Multi-Accounting-Users.gif","contentUrl":"https://seon.io/wp-content/uploads/2022/06/Multi-Accounting-Users.gif","width":1009,"height":607,"caption":"Multi-Accounting Users"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/age-verification/","url":"https://seon.io/resources/dictionary/age-verification/","name":"What Is Age Verification? How Does it Work? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/dictionary/age-verification/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2022/04/Heavy-vs-Light-KYC-Check.png","datePublished":"2022-08-24T13:40:11+00:00","dateModified":"2024-10-17T14:11:40+00:00","description":"Age verification is a key way for businesses to prevent fraud, ensure legal compliance, and keep younger users safe. Learn how it works & avoid fines here.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/dictionary/age-verification/#primaryimage","url":"https://seon.io/wp-content/uploads/2022/04/Heavy-vs-Light-KYC-Check.png","contentUrl":"https://seon.io/wp-content/uploads/2022/04/Heavy-vs-Light-KYC-Check.png","width":1024,"height":499,"caption":"Heavy vs Light KYC Check"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/proof-of-address/","url":"https://seon.io/resources/dictionary/proof-of-address/","name":"What Is Proof of Address? How Does It Work? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/dictionary/proof-of-address/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-dark.png","datePublished":"2022-09-01T11:56:39+00:00","dateModified":"2026-01-19T14:01:32+00:00","description":"What is proof of address and why is it such an important part of preventing fraud and verifying customer identity? This article explains.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/dictionary/proof-of-address/#primaryimage","url":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-dark.png","contentUrl":"https://seon.io/wp-content/uploads/2024/06/tn-article-11-dark.png","width":832,"height":468}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/pep/","url":"https://seon.io/resources/dictionary/pep/","name":"What Is a Politically Exposed Person (PEP)? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/dictionary/pep/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2022/09/PEP.png","datePublished":"2022-09-15T13:32:14+00:00","dateModified":"2025-06-16T17:25:34+00:00","description":"Read about politically exposed persons, whose position makes them more likely to be involved in corruption or bribery, requiring additional due diligence from companies.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/dictionary/pep/#primaryimage","url":"https://seon.io/wp-content/uploads/2022/09/PEP.png","contentUrl":"https://seon.io/wp-content/uploads/2022/09/PEP.png","width":645,"height":445}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/ip-address/","url":"https://seon.io/resources/dictionary/ip-address/","name":"What Is an IP Address? – How Does It Work? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/dictionary/ip-address/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2022/03/Mobile-Proxy-1024x370.png","datePublished":"2022-10-06T15:26:13+00:00","dateModified":"2024-11-01T08:44:06+00:00","description":"An IP address is a unique set of characters that identifies a device on a network or the internet. Read everything you wanted to know about them.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/dictionary/ip-address/#primaryimage","url":"https://seon.io/wp-content/uploads/2022/03/Mobile-Proxy.png","contentUrl":"https://seon.io/wp-content/uploads/2022/03/Mobile-Proxy.png","width":3512,"height":1269,"caption":"Mobile Proxy"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/suspicious-activity-report/","url":"https://seon.io/resources/dictionary/suspicious-activity-report/","name":"What Is a Suspicious Activity Report (SAR)? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"datePublished":"2022-10-13T16:09:12+00:00","dateModified":"2026-02-24T14:23:25+00:00","description":"Discover how SARs and real-time transaction monitoring help detect fraud, prevent money laundering, and ensure AML compliance.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/biometric-authentication/","url":"https://seon.io/resources/dictionary/biometric-authentication/","name":"What Is Biometric Authentication? – How Does It Work? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/dictionary/biometric-authentication/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2022/10/Types_of_Biometrics_used_for_authentication-min.png","datePublished":"2022-10-20T07:22:00+00:00","dateModified":"2024-12-11T12:51:24+00:00","description":"Biometric authentication uses someone's unique biological characteristics to prove their identity for security purposes. How? Learn all about it here.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/dictionary/biometric-authentication/#primaryimage","url":"https://seon.io/wp-content/uploads/2022/10/Types_of_Biometrics_used_for_authentication-min.png","contentUrl":"https://seon.io/wp-content/uploads/2022/10/Types_of_Biometrics_used_for_authentication-min.png","width":645,"height":525}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/link-analysis/","url":"https://seon.io/resources/dictionary/link-analysis/","name":"Understanding Link Analysis & Network Visualisation | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/dictionary/link-analysis/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2022/05/customer_connections_GIF_db8e69da9f.gif","datePublished":"2022-10-31T14:38:30+00:00","dateModified":"2023-11-29T15:30:20+00:00","description":"Link analysis is a visual data analysis technique that analyzes the connections between network nodes. Read how it works and who can benefit.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/dictionary/link-analysis/#primaryimage","url":"https://seon.io/wp-content/uploads/2022/05/customer_connections_GIF_db8e69da9f.gif","contentUrl":"https://seon.io/wp-content/uploads/2022/05/customer_connections_GIF_db8e69da9f.gif","width":1009,"height":607,"caption":"Customer conections"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/6amld/","url":"https://seon.io/resources/dictionary/6amld/","name":"What Is 6AMLD? – How Does It Work? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"datePublished":"2022-11-09T10:56:49+00:00","dateModified":"2023-08-04T11:10:34+00:00","description":"6AMLD is the EU’s 6th Anti Money Laundering Directive. Read what it says, who it applies to and why it's important. How do you stay compliant?","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/identity-theft/","url":"https://seon.io/resources/dictionary/identity-theft/","name":"What Is Identity Theft & Fraud | How to Protect Yourself | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/dictionary/identity-theft/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2022/08/4.-Protect-fraud-against-individuals.png","datePublished":"2022-11-16T09:42:29+00:00","dateModified":"2025-12-30T16:09:44+00:00","description":"Identity theft causes billions in annual losses worldwide. Find examples, what ID theft involves and how to stop it as a company or person.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/dictionary/identity-theft/#primaryimage","url":"https://seon.io/wp-content/uploads/2022/08/4.-Protect-fraud-against-individuals.png","contentUrl":"https://seon.io/wp-content/uploads/2022/08/4.-Protect-fraud-against-individuals.png","width":645,"height":592,"caption":"How to Protect Against Fraud for Individuals"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/botnet/","url":"https://seon.io/resources/dictionary/botnet/","name":"What Is a Botnet? How Do They Work? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/dictionary/botnet/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2023/01/Botnet-1.svg","datePublished":"2022-11-28T17:04:27+00:00","dateModified":"2025-12-30T16:06:13+00:00","description":"Read our botnet 101: what they are, how they attack, what they can do and how to stop them. Also find here examples and types.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/dictionary/botnet/#primaryimage","url":"https://seon.io/wp-content/uploads/2023/01/Botnet-1.svg","contentUrl":"https://seon.io/wp-content/uploads/2023/01/Botnet-1.svg","caption":"botnet attack"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/graph-neural-network-gnn/","url":"https://seon.io/resources/dictionary/graph-neural-network-gnn/","name":"What Is a GNN? How Do Graph Neural Networks Work? - SEON","isPartOf":{"@id":"https://seon.io/#website"},"datePublished":"2022-11-29T17:12:19+00:00","dateModified":"2025-11-12T17:09:12+00:00","description":"Learn about what graph neural networks are, how they work, and what their many applications and benefits are.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/flagging/","url":"https://seon.io/resources/dictionary/flagging/","name":"What Is Flagging? AML Definition & Use Cases | SEON","isPartOf":{"@id":"https://seon.io/#website"},"datePublished":"2022-12-02T10:46:43+00:00","dateModified":"2025-07-18T08:45:15+00:00","description":"An in-depth look at flagging in AML: how it works, when to use it, and its role in an effective compliance program.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/behavioral-analysis/","url":"https://seon.io/resources/dictionary/behavioral-analysis/","name":"Behavioral Analysis in Fraud Detection | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/dictionary/behavioral-analysis/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2022/02/machine_B.png","datePublished":"2022-12-13T09:59:16+00:00","dateModified":"2026-03-26T17:07:24+00:00","description":"Discover how behavioral analysis uses AI to detect fraud, protect users, and adapt to evolving threats—all seamlessly and securely.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/dictionary/behavioral-analysis/#primaryimage","url":"https://seon.io/wp-content/uploads/2022/02/machine_B.png","contentUrl":"https://seon.io/wp-content/uploads/2022/02/machine_B.png","width":2347,"height":3190,"caption":"Letter B"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/business-email-compromise/","url":"https://seon.io/resources/dictionary/business-email-compromise/","name":"What is Business Email Compromise? (BEC) | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/dictionary/business-email-compromise/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2022/11/ceo-fraud-email-e1667298593595.png","datePublished":"2022-12-19T10:02:12+00:00","dateModified":"2024-11-01T08:45:50+00:00","description":"Business email compromise (BEC) is where a fraudster convinces staff to give them money or information by posing as a colleague or upper management.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/dictionary/business-email-compromise/#primaryimage","url":"https://seon.io/wp-content/uploads/2022/11/ceo-fraud-email-e1667298593595.png","contentUrl":"https://seon.io/wp-content/uploads/2022/11/ceo-fraud-email-e1667298593595.png","width":860,"height":359,"caption":"ceo fraud email example"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/chip-dumping/","url":"https://seon.io/resources/dictionary/chip-dumping/","name":"What Is Chip Dumping? How Does It Work? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/dictionary/chip-dumping/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2022/10/machine_C_-1.png","datePublished":"2022-12-19T15:29:50+00:00","dateModified":"2024-06-27T16:42:25+00:00","description":"Chip dumping is a fraudulent act where a gambler intentionally loses chips to another player. Read why this is bad for your iGaming site & how to stop it.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/dictionary/chip-dumping/#primaryimage","url":"https://seon.io/wp-content/uploads/2022/10/machine_C_-1.png","contentUrl":"https://seon.io/wp-content/uploads/2022/10/machine_C_-1.png","width":667,"height":1182}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/payment-conversion-rate/","url":"https://seon.io/resources/dictionary/payment-conversion-rate/","name":"What Is the Payment Conversion Rate? How Does It Work? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"datePublished":"2022-12-28T10:47:20+00:00","dateModified":"2025-12-30T15:35:29+00:00","description":"This SEON Fraud Dictoinary entry explains how payment conversion rates are calculated, how they can be leveraged and how to improve them without risk.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/payment-reversal/","url":"https://seon.io/resources/dictionary/payment-reversal/","name":"What Is Payment Reversal? – How Does It Work?  | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/dictionary/payment-reversal/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2022/02/machine_P.png","datePublished":"2023-01-03T10:23:58+00:00","dateModified":"2025-08-12T15:09:28+00:00","description":"Reversed payments occur when a customer's paid funds have to be returned or reimbursed. What kinds of reversal there, and what is the difference?","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/dictionary/payment-reversal/#primaryimage","url":"https://seon.io/wp-content/uploads/2022/02/machine_P.png","contentUrl":"https://seon.io/wp-content/uploads/2022/02/machine_P.png","width":1658,"height":2702,"caption":"Letter P"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/phishing/","url":"https://seon.io/resources/dictionary/phishing/","name":"What Is Phishing and How Does It Work? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/dictionary/phishing/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2022/02/machine_P.png","datePublished":"2023-01-05T13:02:00+00:00","dateModified":"2023-11-22T09:42:47+00:00","description":"Phishing involves cybercriminals attempting to fraudulently obtain sensitive information. Read definitions, types, methods, prevention and more.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/dictionary/phishing/#primaryimage","url":"https://seon.io/wp-content/uploads/2022/02/machine_P.png","contentUrl":"https://seon.io/wp-content/uploads/2022/02/machine_P.png","width":1658,"height":2702,"caption":"Letter P"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/cross-browser-fingerprinting/","url":"https://seon.io/resources/dictionary/cross-browser-fingerprinting/","name":"What Is Cross-Browser Fingerprinting? – How Does It Work?  | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/dictionary/cross-browser-fingerprinting/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2022/10/machine_C_-1.png","datePublished":"2023-01-09T09:38:08+00:00","dateModified":"2024-01-31T16:19:42+00:00","description":"Read about cross-browser fingerprinting as a way to identify a user over multiple browsers, using multiple data points as unique identifiers.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/dictionary/cross-browser-fingerprinting/#primaryimage","url":"https://seon.io/wp-content/uploads/2022/10/machine_C_-1.png","contentUrl":"https://seon.io/wp-content/uploads/2022/10/machine_C_-1.png","width":667,"height":1182}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/socmint/","url":"https://seon.io/resources/dictionary/socmint/","name":"What Is SOCMINT? How Does It Work? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/dictionary/socmint/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2022/02/machine_S.png","datePublished":"2023-01-11T15:54:47+00:00","dateModified":"2024-10-21T12:04:09+00:00","description":"Learn about SOCMINT, who uses it and how. We explore the challenges, benefits and issues surrounding social media intelligence.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/dictionary/socmint/#primaryimage","url":"https://seon.io/wp-content/uploads/2022/02/machine_S.png","contentUrl":"https://seon.io/wp-content/uploads/2022/02/machine_S.png","width":1718,"height":2617,"caption":"Letter S"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/doxxing/","url":"https://seon.io/resources/dictionary/doxxing/","name":"What Is Doxxing? How Does It Work? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"datePublished":"2023-01-16T10:37:29+00:00","dateModified":"2025-03-15T09:12:27+00:00","description":"Doxxing is a surprisingly popular practice that can have serious consequences for perpetrators and cause great harm to victims. Read more here.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/kyb/","url":"https://seon.io/resources/dictionary/kyb/","name":"What Is (KYB) Know Your Business | SEON","isPartOf":{"@id":"https://seon.io/#website"},"datePublished":"2023-01-17T07:26:00+00:00","dateModified":"2023-08-04T11:37:09+00:00","description":"Know Your Business protocols, also known as KYB, are mandated for banks and other money services to be AML compliant, but what do they require? SEON dives in.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/man-in-the-middle-attack/","url":"https://seon.io/resources/dictionary/man-in-the-middle-attack/","name":"What Is a Man-in-the-Middle Attack? How Does It Work? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"datePublished":"2023-01-18T12:16:27+00:00","dateModified":"2023-11-22T13:55:11+00:00","description":"MitM attacks are involved in a significant proportion of online exploitation. Find out how to protect yourself or your company.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/sanctioned-entity/","url":"https://seon.io/resources/dictionary/sanctioned-entity/","name":"What Is a Sanctioned Entity? – How Do They Work? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/dictionary/sanctioned-entity/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2022/03/AML-Regulators-around-the-world-min.png","datePublished":"2023-01-23T10:38:30+00:00","dateModified":"2025-05-24T09:14:50+00:00","description":"Countries can impose sanctions on organizations and individuals, but why are there sanctioned entities, and when does this happen? SEON explains in-depth.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/dictionary/sanctioned-entity/#primaryimage","url":"https://seon.io/wp-content/uploads/2022/03/AML-Regulators-around-the-world-min.png","contentUrl":"https://seon.io/wp-content/uploads/2022/03/AML-Regulators-around-the-world-min.png","width":645,"height":440,"caption":"Infograpic illustrating the AML regulators around the world"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/blended-threat/","url":"https://seon.io/resources/dictionary/blended-threat/","name":"What Is a Blended Threat? – How Does It Work? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"datePublished":"2023-01-24T15:59:53+00:00","dateModified":"2024-03-07T15:17:36+00:00","description":"A blended threat is an attack that uses a range of different malware and different types of attack, often resulting in a more severe and effective result. Read more here.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/supervised-machine-learning/","url":"https://seon.io/resources/dictionary/supervised-machine-learning/","name":"What Is Supervised Machine Learning? How Does It Work? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"datePublished":"2023-01-25T14:25:08+00:00","dateModified":"2023-08-04T10:53:13+00:00","description":"Supervised machine learning is proving increasingly useful in fraud prevention and many other areas. Learn what it is and much more.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/threatware/","url":"https://seon.io/resources/dictionary/threatware/","name":"What Is Threatware? How Can You Prevent It? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"datePublished":"2023-01-26T13:52:55+00:00","dateModified":"2025-12-19T11:33:37+00:00","description":"Threatware refers to software tools that are intended to be used with malicious purpose, inclusive of things like malware, worms, and keyloggers.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/unsupervised-machine-learning/","url":"https://seon.io/resources/dictionary/unsupervised-machine-learning/","name":"What Is Unsupervised Machine Learning? How Does It Work? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"datePublished":"2023-02-01T14:01:18+00:00","dateModified":"2023-08-04T10:54:30+00:00","description":"Unsupervised machine learning is a software solution that helps automate data-driven decision-making. Read up on what it is and how it works.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/account-farming/","url":"https://seon.io/resources/dictionary/account-farming/","name":"What Is Account Farming? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/dictionary/account-farming/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2022/05/Velocity-Rules-1024x387.png","datePublished":"2023-02-02T10:39:06+00:00","dateModified":"2024-03-07T15:09:13+00:00","description":"What is account farming? Learn how this popular technique works and the ways that fraudsters use it for financial gain.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/dictionary/account-farming/#primaryimage","url":"https://seon.io/wp-content/uploads/2022/05/Velocity-Rules.png","contentUrl":"https://seon.io/wp-content/uploads/2022/05/Velocity-Rules.png","width":1303,"height":493,"caption":"Velocity Rules"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/machine-reasoning/","url":"https://seon.io/resources/dictionary/machine-reasoning/","name":"What Is Machine Reasoning? How Does It Work? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"datePublished":"2023-02-06T10:52:06+00:00","dateModified":"2025-11-25T09:21:12+00:00","description":"Machine reasoning plays a crucial role in decision-making and predictive modeling. Learn how it informs fraud prevention and more activities.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/chargeback-rate/","url":"https://seon.io/resources/dictionary/chargeback-rate/","name":"What Is Chargeback Rate? – How Does It Work? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/dictionary/chargeback-rate/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2022/12/chargebacks_to_transactions_ratio.svg","datePublished":"2023-02-07T09:36:51+00:00","dateModified":"2024-07-10T17:28:14+00:00","description":"Chargeback rate is a metric that retailers use to compare their total number of transactions with their total number of chargebacks","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/dictionary/chargeback-rate/#primaryimage","url":"https://seon.io/wp-content/uploads/2022/12/chargebacks_to_transactions_ratio.svg","contentUrl":"https://seon.io/wp-content/uploads/2022/12/chargebacks_to_transactions_ratio.svg","caption":"chargeback rate or chargeback ratio"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/spear-phishing/","url":"https://seon.io/resources/dictionary/spear-phishing/","name":"What Is Spear-Phishing? How Does It Work?","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/dictionary/spear-phishing/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2023/02/Spear-Fishing-Example-Text-min.png","datePublished":"2023-02-08T09:46:16+00:00","dateModified":"2023-08-04T10:52:30+00:00","description":"Spear phishing is an ever-growing threat to businesses. Read about what it is, how it works and how to best protect your organization.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/dictionary/spear-phishing/#primaryimage","url":"https://seon.io/wp-content/uploads/2023/02/Spear-Fishing-Example-Text-min.png","contentUrl":"https://seon.io/wp-content/uploads/2023/02/Spear-Fishing-Example-Text-min.png","width":544,"height":888}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/hlr/","url":"https://seon.io/resources/dictionary/hlr/","name":"What Is HLR? How Does It Work? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"datePublished":"2023-02-09T17:20:16+00:00","dateModified":"2023-08-18T09:13:00+00:00","description":"This article is an explainer of the global HLR database, a rich source of information on cellphone numbers. Read up on the Home Location Register.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/masquerade-attack/","url":"https://seon.io/resources/dictionary/masquerade-attack/","name":"What Is a Masquerade Attack? How Does It Work? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"datePublished":"2023-02-13T08:00:00+00:00","dateModified":"2024-12-11T12:46:04+00:00","description":"What is a masquerade attack? Read about a type of cyber attack that often plays a part in security breaches both large and small, and how to mitigate it.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/refund-rate/","url":"https://seon.io/resources/dictionary/refund-rate/","name":"What Is Refund Rate? – How Does It Work? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"image":{"@id":"https://seon.io/resources/dictionary/refund-rate/#primaryimage"},"thumbnailUrl":"https://seon.io/wp-content/uploads/2023/02/Refund_Rate_product.png","datePublished":"2023-02-20T10:17:04+00:00","dateModified":"2025-07-18T12:20:19+00:00","description":"Read up about the definition of this financial and quality assurance metric used in retail, how it relates to revenue and how it relates to fraud.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"ImageObject","inLanguage":"en-US","@id":"https://seon.io/resources/dictionary/refund-rate/#primaryimage","url":"https://seon.io/wp-content/uploads/2023/02/Refund_Rate_product.png","contentUrl":"https://seon.io/wp-content/uploads/2023/02/Refund_Rate_product.png","width":645,"height":424,"caption":"Refund Rate Product"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/personally-identifiable-information/","url":"https://seon.io/resources/dictionary/personally-identifiable-information/","name":"What Is Personally Identifiable Information? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"datePublished":"2023-02-23T12:57:17+00:00","dateModified":"2024-02-21T11:49:24+00:00","description":"What is Personally Identifiable Information (PII)? Read about which data comes under the banner of PII and how it can be best protected.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/cnam/","url":"https://seon.io/resources/dictionary/cnam/","name":"What Is CNAM? How Does Caller ID Name Work? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"datePublished":"2023-02-28T10:23:24+00:00","dateModified":"2025-05-16T15:08:28+00:00","description":"What is CNAM? This article explains how this caller ID technology works, and how it can be both utilized and exploited.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/defaulting-customers/","url":"https://seon.io/resources/dictionary/defaulting-customers/","name":"What Are Defaulting Customers & Why It Happens? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"datePublished":"2023-03-03T10:40:08+00:00","dateModified":"2023-11-29T14:39:43+00:00","description":"Defaulting customers are those who fail to make an agreed payment on a debt. They can be individuals, businesses or even entire countries.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/ofac/","url":"https://seon.io/resources/dictionary/ofac/","name":"Who Is OFAC? – What Does It Do? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"datePublished":"2023-03-03T10:53:38+00:00","dateModified":"2023-05-17T13:03:08+00:00","description":"The OFAC – Office of Foreign Assets Control – is the US regulatory authority on economic and trade sanctions. Read about OFAC.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/data-sovereignty/","url":"https://seon.io/resources/dictionary/data-sovereignty/","name":"What Is Data Sovereignty? – How Does It Work? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"datePublished":"2023-03-08T17:13:01+00:00","dateModified":"2023-05-17T13:04:20+00:00","description":"Data sovereignty refers to the concept that data is subject to the laws and governance of the country/region in which it is processed.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/cryptojacking/","url":"https://seon.io/resources/dictionary/cryptojacking/","name":"Cryptojacking: What Is It and How Does it Work? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"datePublished":"2023-03-14T09:47:04+00:00","dateModified":"2026-04-15T08:51:58+00:00","description":"Cryptojacking is a type of cybercrime where a criminal uses a victim's computer power to mine cryptocurrency. Read about cryptojacking.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/promo-abuse/","url":"https://seon.io/resources/dictionary/promo-abuse/","name":"What Is Promo Abuse? – How Does It Work? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"datePublished":"2023-03-14T11:33:57+00:00","dateModified":"2024-06-27T16:44:29+00:00","description":"Promo abuse is a fraudulent practice where consumers use promotional offers such as sign-up and referral bonuses multiple times.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/fraud-as-a-service/","url":"https://seon.io/resources/dictionary/fraud-as-a-service/","name":"What Is Fraud as a Service? – How Does It Work? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"datePublished":"2023-03-21T08:05:00+00:00","dateModified":"2023-11-29T14:11:39+00:00","description":"Fraud as a service is when fraudsters sell their tools, services, and expertise in order to carry out fraud on behalf of paying clients.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/self-sovereign-identity/","url":"https://seon.io/resources/dictionary/self-sovereign-identity/","name":"What Is Self-Sovereign Identity? – How Does It Work? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"datePublished":"2023-03-23T10:31:27+00:00","dateModified":"2023-05-17T13:14:58+00:00","description":"Self-sovereign identity is a digital identity that an individual manages in a decentralized manner, without third parties storing their data.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/false-negatives/","url":"https://seon.io/resources/dictionary/false-negatives/","name":"What Are False Negatives in Fraud? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"datePublished":"2023-03-28T07:48:00+00:00","dateModified":"2025-07-18T12:21:12+00:00","description":"False negatives in fraud can be costly and may have far-reaching implications. Find out what they are and how to avoid them.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/certificate-fraud/","url":"https://seon.io/resources/dictionary/certificate-fraud/","name":"What Is Certificate Fraud? – How Does It Work? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"datePublished":"2023-04-05T08:09:00+00:00","dateModified":"2023-08-04T11:01:52+00:00","description":"Certificate fraud is where someone fakes evidence of having one or more qualifications. It is also known as qualification fraud.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/vendor-email-compromise-vec/","url":"https://seon.io/resources/dictionary/vendor-email-compromise-vec/","name":"What Is Vendor Email Compromise (VEC)? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"datePublished":"2023-04-06T08:20:00+00:00","dateModified":"2024-12-11T12:49:04+00:00","description":"Vendor email compromise is when a fraudster gains access to the email account of a trusted vendor via account takeover fraud.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/recovery-scams/","url":"https://seon.io/resources/dictionary/recovery-scams/","name":"What Are Recovery Scams? – How Do They Work? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"datePublished":"2023-04-12T08:00:00+00:00","dateModified":"2023-08-09T10:24:12+00:00","description":"Recovery scams are a type of advanced fee fraud that targets victims of fraud, with the fraudsters cheating the victims out of further money.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/wangiri-scam-fraud/","url":"https://seon.io/resources/dictionary/wangiri-scam-fraud/","name":"Wangiri Fraud: What Is It – How Does It Work? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"datePublished":"2023-04-18T08:20:31+00:00","dateModified":"2023-08-18T09:47:36+00:00","description":"Wagiri Fraud is a type of financial scam that targets businesses and individuals through fake invoices or payment requests. Learn how to protect yourself.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/virtual-asset-service-providers/","url":"https://seon.io/resources/dictionary/virtual-asset-service-providers/","name":"What Are Virtual Asset Service Providers? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"datePublished":"2023-04-19T08:04:00+00:00","dateModified":"2023-08-04T10:54:45+00:00","description":"Virtual asset service providers carry out exchanges between different forms of virtual assets or between virtual assets and fiat currencies.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/vishing/","url":"https://seon.io/resources/dictionary/vishing/","name":"What Is Vishing? – How Does It Work? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"datePublished":"2023-04-24T07:55:00+00:00","dateModified":"2025-12-30T16:10:45+00:00","description":"Vishing is where a fraudster makes phone calls or leaves voicemails for their victims to try and obtain their personal information.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/one-ring-scam/","url":"https://seon.io/resources/dictionary/one-ring-scam/","name":"What Is The One Ring Scam? - How Does It Work? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"datePublished":"2023-04-27T08:05:00+00:00","dateModified":"2025-12-30T15:21:51+00:00","description":"A one ring scam is where your phone rings once, to lure you into calling back. Returning the call connects you to an expensive service.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/disposable-email/","url":"https://seon.io/resources/dictionary/disposable-email/","name":"What Is Disposable Email? – How Does It Work? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"datePublished":"2023-05-02T08:01:00+00:00","dateModified":"2024-10-21T14:06:28+00:00","description":"A disposable email is a unique email address that is temporary. It expires after a set amount of time or after a set number of uses.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/zombie-networks/","url":"https://seon.io/resources/dictionary/zombie-networks/","name":"What Is Zombie Network? - How Does It Work? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"datePublished":"2023-05-03T08:04:00+00:00","dateModified":"2023-08-04T10:56:21+00:00","description":"A zombie network is a collection of internet-connected computers that a cybercriminal has compromised through hacking and malware.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/zero-day-attack/","url":"https://seon.io/resources/dictionary/zero-day-attack/","name":"Zero Day Attacks: What Are They - How Do They Work | SEON","isPartOf":{"@id":"https://seon.io/#website"},"datePublished":"2023-05-08T13:59:57+00:00","dateModified":"2024-07-10T17:29:27+00:00","description":"Zero Day attacks are malicious cyber-attacks that exploit unknown software vulnerabilities. They can cause significant damage to systems and data.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/sneaker-bot/","url":"https://seon.io/resources/dictionary/sneaker-bot/","name":"What Is a Sneaker Bot? – How Does It Work? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"datePublished":"2023-05-10T08:03:00+00:00","dateModified":"2023-05-31T10:56:57+00:00","description":"A sneaker bot is software created to help people purchase sneakers, enabling them to buy sought-after sneakers ahead of the masses.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/yield-farming-scams/","url":"https://seon.io/resources/dictionary/yield-farming-scams/","name":"Yield Farming Scams: What Are They? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"datePublished":"2023-05-16T08:03:00+00:00","dateModified":"2025-05-19T12:15:39+00:00","description":"Yield farming scams are a growing threat to investors in the DeFi space. Learn to identify and steer clear of these scams to keep your investments secure.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/credit-card-decline-codes/","url":"https://seon.io/resources/dictionary/credit-card-decline-codes/","name":"What Are Credit Card Decline Codes? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"datePublished":"2023-05-17T08:02:00+00:00","dateModified":"2025-12-30T15:24:37+00:00","description":"Credit card decline codes are messages that reveal why a card issuer, payment processor, or gateway has declined a transaction.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/second-party-fraud/","url":"https://seon.io/resources/dictionary/second-party-fraud/","name":"What is Second Party Fraud - How Does it Work? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"datePublished":"2023-05-24T08:08:00+00:00","dateModified":"2023-10-20T15:20:31+00:00","description":"Second party fraud is when a person gives their personal information to someone to use for fraudulent activity. Learn more with SEON.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/accidental-friendly-fraud/","url":"https://seon.io/resources/dictionary/accidental-friendly-fraud/","name":"What Is Accidental Friendly Fraud? – How Does It Work? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"datePublished":"2023-05-25T08:04:00+00:00","dateModified":"2025-10-15T12:29:36+00:00","description":"Accidental friendly fraud is a growing problem for businesses. Find out why it occurs and how to reduce the risks.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/source-of-funds/","url":"https://seon.io/resources/dictionary/source-of-funds/","name":"What Is the Source of Funds? – How Does It Work? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"datePublished":"2023-05-30T07:53:50+00:00","dateModified":"2026-02-04T12:26:04+00:00","description":"Source of funds refers to the origin of funds used in a transaction, including the account used and the source of the money in it.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/job-scam/","url":"https://seon.io/resources/dictionary/job-scam/","name":"What Is a Job Scam? – How Does It Work? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"datePublished":"2023-05-31T08:01:00+00:00","dateModified":"2023-08-04T10:50:40+00:00","description":"Job scams are where a fraudster exploits an individual seeking employment. Learn how to spot and avoid job scams.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/cross-site-scripting/","url":"https://seon.io/resources/dictionary/cross-site-scripting/","name":"What Is Cross Site Scripting? – How Does It Work? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"datePublished":"2023-06-06T08:00:00+00:00","dateModified":"2024-10-17T16:12:43+00:00","description":"Cross site scripting (XSS) is the injection of malicious scripts into trusted websites, which then send the script to genuine users.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/first-party-fraud/","url":"https://seon.io/resources/dictionary/first-party-fraud/","name":"First-Party Fraud: Definition & Detection | SEON","isPartOf":{"@id":"https://seon.io/#website"},"datePublished":"2023-06-07T08:02:00+00:00","dateModified":"2025-08-15T15:33:07+00:00","description":"Understand first-party fraud and how SEON’s platform identifies suspicious behavior. Find out more!","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/dictionary/visa-dispute-monitoring-program-vdmp/","url":"https://seon.io/resources/dictionary/visa-dispute-monitoring-program-vdmp/","name":"What Is the Visa Dispute Fraud Monitoring Program? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"datePublished":"2023-06-13T08:01:00+00:00","dateModified":"2025-08-12T15:23:51+00:00","description":"The Visa Dispute Monitoring Program is used by Visa for card merchants that consistently generate an excessive number of disputed transactions.","mainEntity":[{"@id":"https://seon.io/resources/dictionary/visa-dispute-monitoring-program-vdmp/#faq-question-1686151831941"},{"@id":"https://seon.io/resources/dictionary/visa-dispute-monitoring-program-vdmp/#faq-question-1686151844375"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/dictionary/visa-dispute-monitoring-program-vdmp/#faq-question-1686151831941","position":1,"url":"https://seon.io/resources/dictionary/visa-dispute-monitoring-program-vdmp/#faq-question-1686151831941","name":"What Does Chargebacks Over Threshold Mean?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"<br/>Chargebacks over threshold means that a merchant is generating more chargebacks and/or disputes than is normally expected (and accepted) by a card network such as Visa and MasterCard.<br/><br/>In the case of Visa, the usual consequence of chargebacks being over threshold is entry into the Visa Dispute Monitoring Program (VDMP). This can result in fines and potential disqualification from accepting Visa payments, should the situation not be rectified.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/dictionary/visa-dispute-monitoring-program-vdmp/#faq-question-1686151844375","position":2,"url":"https://seon.io/resources/dictionary/visa-dispute-monitoring-program-vdmp/#faq-question-1686151844375","name":"What Is TC40 Data?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"<br/>TC40 data refers to the information that Visa collects when processing a cardholder fraud claim. When a bank sends a dispute claim to Visa, it uses a TC40 report form. TC40 data is often used as part of the chargeback process. <br/><br/>The data collected includes details of the disputed transaction and both bank and merchant information.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/trading-bot-scams/","url":"https://seon.io/resources/dictionary/trading-bot-scams/","name":"What Are Trading Bot Scams? How Do They Work? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"datePublished":"2023-06-14T08:02:00+00:00","dateModified":"2026-04-15T08:53:32+00:00","description":"Trading bot scams are a type of cryptocurrency fraud. They abuse legitimate trading bots to steal investors’ money. Learn more with SEON.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/third-party-fraud/","url":"https://seon.io/resources/dictionary/third-party-fraud/","name":"What Is Third Party Fraud? How Does It Work? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"datePublished":"2023-06-20T07:58:00+00:00","dateModified":"2024-05-24T09:54:13+00:00","description":"Third party fraud, often referred to as identity theft, involves fraudsters using a victim’s details or accounts without their consent.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/customer-identity-access-management/","url":"https://seon.io/resources/dictionary/customer-identity-access-management/","name":"What Is Customer Identity and Access Management? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"datePublished":"2023-06-21T08:02:00+00:00","dateModified":"2024-12-11T12:46:55+00:00","description":"Customer identity and access management (CIAM) is a way for companies to provide users with easy, secure access to their digital properties.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/jamming-attacks/","url":"https://seon.io/resources/dictionary/jamming-attacks/","name":"What Are Jamming Attacks? How Do They Work? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"datePublished":"2023-06-27T07:30:00+00:00","dateModified":"2025-10-09T10:02:22+00:00","description":"Jamming attacks involve malicious interference with wireless communication systems. Learn about preventing jamming attacks with SEON.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/initial-fraud-alert/","url":"https://seon.io/resources/dictionary/initial-fraud-alert/","name":"What Is an Initial Fraud Alert? – How Does It Work? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"datePublished":"2023-06-29T07:07:20+00:00","dateModified":"2024-07-10T17:25:25+00:00","description":"An initial fraud alert is a notice to a credit reporting bureau that an individual’s identity may have been stolen. Learn more with SEON.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/p2p-fraud/","url":"https://seon.io/resources/dictionary/p2p-fraud/","name":"What Is P2P Fraud? – How Does It Work? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"datePublished":"2023-07-05T08:01:00+00:00","dateModified":"2023-11-16T12:07:47+00:00","description":"Peer-to-peer (P2P) fraud is when fraudsters use P2P payment apps to steal users’ funds. Find out more with SEON.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/sports-betting-arbitrage/","url":"https://seon.io/resources/dictionary/sports-betting-arbitrage/","name":"Arbitrage in Sports Betting: What Is It & How It Works | SEON","isPartOf":{"@id":"https://seon.io/#website"},"datePublished":"2023-07-06T07:52:00+00:00","dateModified":"2025-10-09T10:21:08+00:00","description":"Sports betting arbitrage exploits odds gaps for profit. Learn how it works and how SEON helps detect and prevent it.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/compliance-as-a-service/","url":"https://seon.io/resources/dictionary/compliance-as-a-service/","name":"What Is Compliance as a Service? – How Does It Work? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"datePublished":"2023-07-24T10:40:50+00:00","dateModified":"2023-08-04T11:02:50+00:00","description":"Compliance as a Service (CaaS) refers to the sale of expert compliance services to businesses by third parties. Learn more with SEON.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/business-verification-services/","url":"https://seon.io/resources/dictionary/business-verification-services/","name":"What Are Business Verification Services? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"datePublished":"2023-08-01T06:58:00+00:00","dateModified":"2023-08-04T11:01:35+00:00","description":"Business verification services enable companies to know who they are working with by gathering and verifying details about business entities.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/dictionary/chargebacks/","url":"https://seon.io/resources/dictionary/chargebacks/","name":"What Are Chargebacks ? – How Do They Work? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"datePublished":"2023-08-02T06:59:00+00:00","dateModified":"2025-11-13T15:15:56+00:00","description":"Chargebacks can prove costly for businesses and result in a stressful administrative burden. Learn what chargebacks are and how to avoid them.","mainEntity":[{"@id":"https://seon.io/resources/dictionary/chargebacks/#faq-question-1690205106230"},{"@id":"https://seon.io/resources/dictionary/chargebacks/#faq-question-1690207211788"},{"@id":"https://seon.io/resources/dictionary/chargebacks/#faq-question-1690207217962"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/dictionary/chargebacks/#faq-question-1690205106230","position":1,"url":"https://seon.io/resources/dictionary/chargebacks/#faq-question-1690205106230","name":"Who is responsible for chargebacks?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"The primary responsibility for administering, defending, and disputing chargebacks falls to the merchant who put the initial payment through. While both the issuing and acquiring banks are involved in the process, it is the merchant that bears the ultimate responsibility and the most significant risk of financial loss.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/dictionary/chargebacks/#faq-question-1690207211788","position":2,"url":"https://seon.io/resources/dictionary/chargebacks/#faq-question-1690207211788","name":"How much does a chargeback cost a business?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"It’s widely estimated that each dollar in chargebacks costs merchants $2.40. This means that a $100 chargeback can cost a business $240. Some estimates are even higher than this.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/dictionary/chargebacks/#faq-question-1690207217962","position":3,"url":"https://seon.io/resources/dictionary/chargebacks/#faq-question-1690207217962","name":"Can a merchant refuse a chargeback?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"While a merchant cannot outright refuse a chargeback, they can <em>dispute</em> one via a representment process. When this happens, the issuing and acquiring banks gather evidence and rule on whether the chargeback should stand. In some cases, this results in a full arbitration process and the involvement of the card network. A merchant cannot directly refuse a chargeback without participating in this process.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/passive-authentication/","url":"https://seon.io/resources/dictionary/passive-authentication/","name":"What Is Passive Authentication? – How Does It Work? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"datePublished":"2023-08-11T07:42:09+00:00","dateModified":"2024-03-07T15:17:22+00:00","description":"Passive authentication is a means of authenticating users with no friction, as it doesn’t require them to take any specific action.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/identity-threat-detection-and-response/","url":"https://seon.io/resources/dictionary/identity-threat-detection-and-response/","name":"Identity Threat Detection and Response - SEON","isPartOf":{"@id":"https://seon.io/#website"},"datePublished":"2023-09-04T19:40:16+00:00","dateModified":"2024-10-22T15:44:41+00:00","description":"Identity threat detection and response is the process of detecting and responding to security threats that relate to identity breaches. Learn more with SEON.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/card-cracking/","url":"https://seon.io/resources/dictionary/card-cracking/","name":"What Is Card Cracking & How Does It Work? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"datePublished":"2023-09-06T12:31:22+00:00","dateModified":"2023-11-29T14:29:41+00:00","description":"Learn how to avoid financial fraud and scams like card cracking with our guide – we cover what it is and how to prevent it.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/active-authentication/","url":"https://seon.io/resources/dictionary/active-authentication/","name":"What Is Active Authentication? – How Does It Work? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"datePublished":"2023-09-06T21:11:38+00:00","dateModified":"2024-12-11T12:49:10+00:00","description":"Active authentication is a way of securely authenticating a user through a challenge and response mechanism. Learn more with SEON.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":["WebPage","FAQPage"],"@id":"https://seon.io/resources/dictionary/customer-identification-program/","url":"https://seon.io/resources/dictionary/customer-identification-program/","name":"What is a Customer Identification Program (CIP)? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"datePublished":"2023-09-12T19:02:21+00:00","dateModified":"2023-09-12T19:02:22+00:00","description":"Discover what a customer identification program (CIP) is, why it’s important, and what factors you need to include in yours.","mainEntity":[{"@id":"https://seon.io/resources/dictionary/customer-identification-program/#faq-question-1694513018147"},{"@id":"https://seon.io/resources/dictionary/customer-identification-program/#faq-question-1694513024805"}],"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/dictionary/customer-identification-program/#faq-question-1694513018147","position":1,"url":"https://seon.io/resources/dictionary/customer-identification-program/#faq-question-1694513018147","name":"What are the requirements of a CIP?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"A CIP must establish a documented process to ensure that a business checks all its customers are who they purport to be. The core requirement is to verify names, addresses, and dates of birth alongside a formally issued government ID number (such as one from a driving license or passport). Additionally, a CIP should encompass how data are collected, checked, stored, and screened.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"Question","@id":"https://seon.io/resources/dictionary/customer-identification-program/#faq-question-1694513024805","position":2,"url":"https://seon.io/resources/dictionary/customer-identification-program/#faq-question-1694513024805","name":"Why does your business need a CIP?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Your business will often need a CIP because it’s a legal requirement. For example, a CIP is mandatory in the US for many businesses processing financial transactions, from small travel companies to large banks. Even in cases where having a CIP isn’t legally mandated, it pays dividends to implement one to reduce fraud risks and prove due diligence when onboarding new customers.","inLanguage":"en-US"},"inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/payment-authentication/","url":"https://seon.io/resources/dictionary/payment-authentication/","name":"What Is Payment Authentication? – How Does It Work? | SEON","isPartOf":{"@id":"https://seon.io/#website"},"datePublished":"2023-09-12T19:06:23+00:00","dateModified":"2024-12-11T12:52:44+00:00","description":"Payment authentication is the process of verifying that a payment is legitimate by verifying the customer’s identity during the transaction.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/what-is-customer-screening-aml/","url":"https://seon.io/resources/dictionary/what-is-customer-screening-aml/","name":"Customer Screening (AML): Definition, Meaning & Process","isPartOf":{"@id":"https://seon.io/#website"},"datePublished":"2025-03-10T09:26:00+00:00","dateModified":"2025-09-25T10:44:48+00:00","description":"Customer screening in AML verifies customers against sanctions lists and PEP databases to detect risks, ensure compliance, and prevent fraud.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/what-is-bonus-abuse/","url":"https://seon.io/resources/dictionary/what-is-bonus-abuse/","name":"What Is Bonus Abuse & How to Stop It | SEON","isPartOf":{"@id":"https://seon.io/#website"},"datePublished":"2025-04-16T17:32:41+00:00","dateModified":"2025-04-16T17:32:42+00:00","description":"Learn how bonus abuse happens, common tactics fraudsters use, and why it’s a growing threat in iGaming, fintech, and eCommerce.","inLanguage":"en-US"}
{"@context":"https://schema.org","@type":"WebPage","@id":"https://seon.io/resources/dictionary/what-is-ekyc/","url":"https://seon.io/resources/dictionary/what-is-ekyc/","name":"What Is eKYC and How It Works?","isPartOf":{"@id":"https://seon.io/#website"},"datePublished":"2025-05-06T09:47:56+00:00","dateModified":"2026-02-04T12:27:38+00:00","description":"eKYC is the digital process of verifying customer identities online. Learn how it speeds up onboarding and prevents fraud with biometric verification.","inLanguage":"en-US"}
