Keshia Rose photo

Keshia Rose

Role

Senior Developer Evangelist

Keshia Rose Articles

Keshia Rose's Articles

Canvas fingerprinting
May 8, 2024

Canvas fingerprinting: What it is and how it works

Learn how canvas fingerprinting works, its business applications, and how to generate unique identifiers using HTML5 Canvas.

[Tutorial] What Is SMS Fraud? How to Detect and Prevent SMS Pumping Fraud
April 24, 2024

How to Detect and Prevent SMS Pumping Fraud

Dive into SMS fraud prevention with our comprehensive guide, covering types, impacts, and detection methods.

How does Fingerprint’s device intelligence compare with Google Integrity API?
April 16, 2024

Fingerprint vs Google Integrity API: Device intelligence comparison

Learn why Google's Play Integrity API alone isn't enough and how Fingerprint's Smart Signals can ensure robust app protection.

Bot detection radar
March 26, 2024

Bot Detection: What It Is and How to Block Bad Bots

Bot detection is the process of identifying and blocking automated web traffic, typically used in cybersecurity to prevent malicious activities.

What is account creation fraud? How to prevent it
March 21, 2024

What is account creation fraud? How to prevent it

Protect your platform’s integrity by understanding and preventing fraudulent account creation.

Browser Spoofing: What it is and how to detect it
March 8, 2024

Browser Spoofing: What it is and how to detect it

Learn about browser tampering, its impact on security, user-driven changes to fingerprints, and advanced detection methods.

Privacy-Focused Browser Settings: What Businesses Need To Know
February 27, 2024

Privacy-Focused Browser Settings: What Businesses Need To Know

Learn about privacy-focused settings in fraud risk assessment and how these settings impact browser detection.

suspect score
February 23, 2024

Product Update: Flag suspicious activity fast with our new Suspect Score

Introducing our latest update: the Suspect Score aggregates multiple signals to enhance your fraud prevention efforts.

Detecting Suspicious Mobile Device Activity with Factory Reset Times
February 22, 2024

Detecting Suspicious Mobile Device Activity with Factory Reset Times

Understand how fraudsters exploit mobile device factory resets and how to detect suspicious patterns in this insightful article.

How to Prevent Mobile Fraud by Detecting Jailbroken Phones
February 22, 2024

How to Prevent Mobile Fraud by Detecting Jailbroken Phones

Understand the risks of jailbroken phones to mobile app security, why users jailbreak, and how to protect your services with detection.

The Comprehensive Guide to Preventing Digital Payment BIN Attacks
February 14, 2024

The Comprehensive Guide to Preventing Digital Payment BIN Attacks

Explore how Bank Identification Number (BIN) attacks work, their risks, and prevention strategies in digital payments.

How to Approach Assessing Trust in Peer-to-Peer (P2P) Lending Platforms
January 31, 2024

Assessing trust in peer-to-peer lending platforms

Understand how browser-based signals enhance trust assessments in peer-to-peer lending for improved platform security.