Industry •

9 Device Fingerprinting Solutions for Developers

As the availability of unique IPs and user agents wanes and cookie reliability remains half-baked at best, device fingerprinting has emerged as a serious contender in the battle against online fraud and abuse....

7 Proxy Piercing Techniques: What Works in 2023?

Introduction With the rise of online tracking, proxy and VPN services have become a popular way to protect people's privacy. However, these digital shields also provide an opportunity for bad act...

Product •

Swiftly identify fraud rings with instant link analysis

Castle is a real-time rules engine designed to manage fraud and risk across all touchpoints, including onboarding, login, payment, and content sharing experiences. We're excited to announce a new...

Enhanced User Activity Monitoring

When risk, product, and customer teams work together to prevent unwanted users from using their service, they usually lack the necessary information needed to make a quick determination between good o...

Industry •

CyberNews Interview: Online businesses that handle money will be a target

Feeling like doing some quick online shopping through an attractive ad or signing up for a lucrative deal with a bank? Be wary: cybercriminals are lurking to exploit your personal information by setti...

Product •

A behavioral approach to device fingerprinting

Background Online businesses connect with their customers over the internet through a device, like a laptop or phone, using a web browser or an app. Having insights into these devices can help a busin...