Fraud techniques are changing rapidly. It’s more important than ever to stay informed to keep you and your customers safe.
The Fraud Bulletin is a bimonthly newsletter that shares the latest news, resources, and expert insights on both fraud trends and the technology that is fighting fraudsters on the front line.
In this edition: The rapid development of AI and other next-gen tech has led to an arms race between fraudsters and businesses.
FTC’s Khan Says Enforcers Need to Be ‘Vigilant Early’ With AI
Takeaway: AI is already being used to “turbocharge” fraud and scams, according to the FTC- and it’s now an urgent issue.
Navigating the Insurance Sector Through a Fraud Risk Lens
Takeaway: The insurance industry continues to be plagued by fraud as it experiences tremendous growth. Here's a look at the emerging threats and how companies are looking to move their fight against fraud forward.
Buy Now, Pay Later Apps Are Popular, but Are They Safe?
Takeaway: Consumer Reports evaluates BNPL apps, which are soaring in popularity- but their security and fraud monitoring standards aren’t always adequate, and they might collect more data than necessary. Get the pros, cons, and ratings in the article.
Data Orchestration Can Beat Fraudsters at Their GPT Identity-Theft Games
Takeaway: Tools like ChatGPT may be like a “steroid pill” for bad actors, but companies can stay ahead of fraudsters by using a multilayered approach to anti-fraud and risk controls.
How Does Synthetic Fraud Happen, and Why Is it So Hard to Stop?
Identity fraud isn’t new, but it is constantly reinventing itself. Synthetic identity fraud is sophisticated, hard to track, and even harder to stop. Continue reading...
Protect Your Business From These Three Rising Identity Fraud Tactics
With the right precautions in place, we can mitigate the risk of falling victim to these schemes and keep our businesses and customers safe. Continue reading...
Are you protecting against fraud threats throughout the user journey? Insufficient systems and vulnerabilities in processes provide an opportune playground for fraudsters. However, by implementing Step-Up Authentication, the risk of a breach by a malicious actor is minimized.
Read more in our step-up authentication help guide: