Recent posts

Featured image for Bad Actors at Scale: The Real Cost of Fraud & Policy Abuse resource

Bad Actors at Scale: The Real Cost of Fraud & Policy Abuse

Explore how promo abuse at scale impacts businesses and the...
Featured image for How Fraudsters Find Quick Workarounds For Fraud Prevention Tools (And How to Stay Ahead) resource

How Fraudsters Find Quick Workarounds For Fraud Prevention Tools (And How to Stay Ahead)

Learn how fraudsters outfox fraud prevention’s industry...
Featured image for Communicating the Value of Fraud Prevention to Executives resource

Communicating the Value of Fraud Prevention to Executives

Learn how to communicate the value of fraud prevention to...
Featured image for Finding the Needle in the Haystack: Selecting a Vendor for Fraud Prevention resource

Finding the Needle in the Haystack: Selecting a Vendor for Fraud Prevention

Discover industry expert insights about finding the right...
Featured image for How to Overcome Fraudsters’ Speed Advantage and Stop Playing Catch Up resource

How to Overcome Fraudsters’ Speed Advantage and Stop Playing Catch Up

Discover how fraud prevention teams can overcome speed...
Featured image for Data Quality: The Missing Piece of the Build vs. Buy Fraud Prevention Debate resource

Data Quality: The Missing Piece of the Build vs. Buy Fraud Prevention Debate

Explore the build vs. buy dilemma in fraud prevention....
Featured image for Taking a closer look at driver fraud response strategy on food delivery apps resource

Taking a closer look at driver fraud response strategy on food delivery apps

Explore effective strategies to combat fraud on food...
Featured image for Understanding 3 Different Types of Collusion on Food Delivery Platforms resource

Understanding 3 Different Types of Collusion on Food Delivery Platforms

Explore collusion on food delivery industry. Learn about...
Featured image for Fraud on Restaurant Reservation Apps: How Bad Actors Are Ruining Dinner Plans & Stealing a Seat at the Table resource

Fraud on Restaurant Reservation Apps: How Bad Actors Are Ruining Dinner Plans & Stealing a Seat at the Table

Explore how bad actors are exploiting digital reservations,...
Featured image for Having Your Delivery and Eating it Too: Managing Food Delivery Fraud Without Causing Driver Churn resource

Having Your Delivery and Eating it Too: Managing Food Delivery Fraud Without Causing Driver Churn

Explore how food delivery platforms balance fraud...
Featured image for The Hidden Costs of Internal Fraud Prevention resource

The Hidden Costs of Internal Fraud Prevention

Should I invest in a third-party fraud prevention solution,...
Featured image for The UV Balancing Act: Under-the-Radar Things to Consider When Balancing Fraud Prevention and User Experience resource

The UV Balancing Act: Under-the-Radar Things to Consider When Balancing Fraud Prevention and User Experience

Learn keen insights related to balancing strong user...
Featured image for 3 Signs Your User Verification Friction is Too High resource

3 Signs Your User Verification Friction is Too High

Explore signs that your user verification friction might be...
Featured image for Unveiling the Hidden Threat: Tackling 'Off-line Rides' in Ride-Hailing Apps resource

Unveiling the Hidden Threat: Tackling 'Off-line Rides' in Ride-Hailing Apps

Explore how offline rides impact ride-hailing platforms and...
Featured image for Incognia: Strategic Expansion & Focus on Device and Location Data for Fraud Prevention resource

Incognia: Strategic Expansion & Focus on Device and Location Data for Fraud Prevention

Learn about Incognia's $31M Series B funding round, our...
Featured image for How & Why Driver Account Sharing Happens (And How Food Delivery Apps Can Prevent It) resource

How & Why Driver Account Sharing Happens (And How Food Delivery Apps Can Prevent It)

Explore techniques to combat unauthorized account sharing...
Featured image for Exploring 3 Different Location Spoofing Methods Used By Fraudsters resource

Exploring 3 Different Location Spoofing Methods Used By Fraudsters

Dive into the 3 different location spoofing methods...
Featured image for The Importance and Challenges of Listing Verification for Online Marketplaces resource

The Importance and Challenges of Listing Verification for Online Marketplaces

Explore how to enhance listing verification in P2P...
Featured image for How Fraud Prevention and Marketing Can Work Together Against Promo Abuse resource

How Fraud Prevention and Marketing Can Work Together Against Promo Abuse

Explore how promo abuse impacts your digital marketing...
Featured image for What’s Mine is Yours? How Ban Evasion and Account Sharing Are Costing Food Delivery Apps Money resource

What’s Mine is Yours? How Ban Evasion and Account Sharing Are Costing Food Delivery Apps Money

Discover how food delivery platforms can combat fraudsters'...
Featured image for Using Location Data to Detect Mule Accounts resource

Using Location Data to Detect Mule Accounts

Explore strategies to detect mule accounts in real-time...
Featured image for Reduce fraud losses, increase profits: how fraud prevention functions as a profit center resource

Reduce fraud losses, increase profits: how fraud prevention functions as a profit center

Discover how fraud prevention makes important impact on the...
Featured image for Optimizing Your Fraud Prevention Stack resource

Optimizing Your Fraud Prevention Stack

Learn how to build the ideal fraud prevention stack, and...
Featured image for Real-Time Fraud Prevention in the Age of Faster Payments resource

Real-Time Fraud Prevention in the Age of Faster Payments

Explore how real-time payment systems impact fraud...
Featured image for Off-the-shelf device ID could be sabotaging your fraud prevention efforts resource

Off-the-shelf device ID could be sabotaging your fraud prevention efforts

Explore the significance of device IDs in fraud prevention...
Featured image for User Verification: The Importance of Achieving Real-time and Accurate Results resource

User Verification: The Importance of Achieving Real-time and Accurate Results

Dive deep into the core of user verification and learn how...
Featured image for Marketplace Fraud: A Comprehensive Guide to Protect Your Platform and Customers resource

Marketplace Fraud: A Comprehensive Guide to Protect Your Platform and Customers

Explore how location intelligence can enhance fraud...
Featured image for How to choose the best identity verification software resource

How to choose the best identity verification software

Explore identity verification software, how to choose the...
Featured image for The Power of Location Verification: Strengthening Business Defenses Against Fraud resource

The Power of Location Verification: Strengthening Business Defenses Against Fraud

Discover how location verification safeguards businesses...
Featured image for Incognia's advanced geolocation solution resource

Incognia's advanced geolocation solution

Explore the evolution, benefits, and key aspects of...
Featured image for Fighting ATOs with next generation device recognition resource

Fighting ATOs with next generation device recognition

Explore insights from industry experts on the role of...
Featured image for GPS verification: how is GPS used in security? resource

GPS verification: how is GPS used in security?

Discover how GPS verification enhances security and...
Featured image for Fraud in Draw Games: How to Prevent iLottery Fraud resource

Fraud in Draw Games: How to Prevent iLottery Fraud

Explore the prevalent types of iLottery fraud, from payment...
Featured image for Fraud prevention examples from along Incognia's journey [Podcast] resource

Fraud prevention examples from along Incognia's journey [Podcast]

Dig into the recap of an interview with André Ferraz in...
Featured image for The role of IP Address Verification in fraud prevention resource

The role of IP Address Verification in fraud prevention

Explore how IP address verification aids in fraud...
Featured image for Identity verification is make-or-break for your platform's growth resource

Identity verification is make-or-break for your platform's growth

Learn why identity is the cornerstone for trust & safety on...
Featured image for Gambling Compliance: How to Add Extra Layer of Protection resource

Gambling Compliance: How to Add Extra Layer of Protection

Discover how multiple layers of security can ensure safer...
Featured image for Device authentication for fighting fraud: when your phone is your new password resource

Device authentication for fighting fraud: when your phone is your new password

Learn about device authentication as a security measure,...
Featured image for Detecting suspicious environments is a paradigm shift resource

Detecting suspicious environments is a paradigm shift

Discover how detecting suspicious environments reveals new...
Featured image for A Comprehensive Analysis of Device Fingerprint Spoofing Techniques resource

A Comprehensive Analysis of Device Fingerprint Spoofing Techniques

Read to understand the evolution of device fingerprinting...
Featured image for The Current State of Fraud Prevention and Detection resource

The Current State of Fraud Prevention and Detection

Protect your business from fraud with effective prevention...
Featured image for Cutting Through the Noise: 2 generative AI threats to prepare for resource

Cutting Through the Noise: 2 generative AI threats to prepare for

Discover the two generative AI threats that fraud...
Featured image for 4 strategies for mitigating fraud risks on your P2P marketplace resource

4 strategies for mitigating fraud risks on your P2P marketplace

Discover four robust strategies to mitigate fraud risks on...
Featured image for Using Seller Fraud Detection to Prevent Marketplace Scams resource

Using Seller Fraud Detection to Prevent Marketplace Scams

Discover how to detect risk signals and prevent potential...
Featured image for Gaming fraud: How fraudsters stack the deck against iGaming operators (and what can be done about it) resource

Gaming fraud: How fraudsters stack the deck against iGaming operators (and what can be done about it)

Learn about different types of gaming fraud and how a...
Featured image for Location Fingerprinting: A new era in fraud prevention resource

Location Fingerprinting: A new era in fraud prevention

Learn how cutting-edge location fingerprinting technology...
Featured image for 5 best practices for preventing refund fraud in food delivery resource

5 best practices for preventing refund fraud in food delivery

Safeguard the integrity of your food delivery service!...
Featured image for Ban Evasion: How can it be detected and prevented? resource

Ban Evasion: How can it be detected and prevented?

Struggling with ban evasion on your platform? Learn how you...
Featured image for Key takeaways from the 2023 Marketplace Risk Management Conference resource

Key takeaways from the 2023 Marketplace Risk Management Conference

Discover key takeaways from the 2023 Marketplace Risk...
Featured image for Main policy violations & scams in food delivery apps resource

Main policy violations & scams in food delivery apps

Are you a food or grocery delivery app? Find out what...
Featured image for The next generation of device fingerprinting resource

The next generation of device fingerprinting

Get ahead of fraudsters with Location Fingerprint. This...
Featured image for As device fingerprinting becomes more challenging new risk signals emerge resource

As device fingerprinting becomes more challenging new risk signals emerge

Bringing new behavioral signals to the market, and...
Featured image for GPS tracking for delivery drivers is only as effective as its tamper-resistance technology resource

GPS tracking for delivery drivers is only as effective as its tamper-resistance technology

Maximize GPS tracking for delivery drivers with...
Featured image for How to Reduce Bonus and Promo Code Abuse in Food Delivery [Guide] resource

How to Reduce Bonus and Promo Code Abuse in Food Delivery [Guide]

Prevent promo code abuse in food delivery apps: Learn about...
Featured image for Player Location Check resource

Player Location Check

Read this blog now and learn about challenges and solutions...
Featured image for The Shared Account Challenge: Best Practices for Securing Food Delivery Apps resource

The Shared Account Challenge: Best Practices for Securing Food Delivery Apps

Are you a food delivery app struggling to prevent...
Featured image for Courier Scams: How Location Verification Can Uncover Them resource

Courier Scams: How Location Verification Can Uncover Them

Find out what scams couriers commit and how location...
Featured image for How to detect multiple accounts in food delivery apps? resource

How to detect multiple accounts in food delivery apps?

Protect your app's integrity and avoid revenue losses with...
Featured image for When to Use Address Verification Instead of Address Validation Software resource

When to Use Address Verification Instead of Address Validation Software

Get up to speed on the difference between address...
Featured image for Why Online Identity Verification is Critical for Peer-to-Peer Marketplaces resource

Why Online Identity Verification is Critical for Peer-to-Peer Marketplaces

Find out why online identity verification should be an...
Featured image for The State of User Verification for Peer-to-peer Marketplaces resource

The State of User Verification for Peer-to-peer Marketplaces

For online marketplaces, efficient user verification...
Featured image for Machine Learning: How Incognia Data Makes the Difference resource

Machine Learning: How Incognia Data Makes the Difference

In this article, we take a closer look at how Machine...
Featured image for How Real-Time Address Verification Can Improve User Acquisition resource

How Real-Time Address Verification Can Improve User Acquisition

Learn how Real-Time Address Verification can help save...
Featured image for A Better Way To Do International Address Verification resource

A Better Way To Do International Address Verification

Discover the challenges of international address...
Featured image for The Fundamentals of Real-Time Address Verification resource

The Fundamentals of Real-Time Address Verification

In this article, we take a closer look at the fundamentals...
Featured image for 5 Challenges Address Validators Solve for P2P Marketplaces resource

5 Challenges Address Validators Solve for P2P Marketplaces

Address validators can help P2P marketplaces improve the...
Featured image for How Delivery Platforms Can Detect Coupon Scams resource

How Delivery Platforms Can Detect Coupon Scams

Learn how to detect promotion and coupon scams to protect...
Featured image for Top 5 Most Common Address Verification Software resource

Top 5 Most Common Address Verification Software

Find out which five types of address verification software...
Featured image for Privacy and Data Protection: 3 global trends for 2023 resource

Privacy and Data Protection: 3 global trends for 2023

Find out what are some of the global trends in the privacy...
Featured image for How to detect and block the location of Fraudsters and Bad Actors resource

How to detect and block the location of Fraudsters and Bad Actors

Understand why you should leverage Incognia’s new...
Featured image for What will the digital identity space look like in 2023? resource

What will the digital identity space look like in 2023?

Find out what the predictions are for digital identity in...
Featured image for How long does it take to establish a user’s 'Trusted Location'? resource

How long does it take to establish a user’s 'Trusted Location'?

Understand how long does it take to Incognia establish a...
Featured image for The Pragmatist’s Approach to the Application of Facial Recognition resource

The Pragmatist’s Approach to the Application of Facial Recognition

Biometric authentication has benefits and drawbacks. A...
Featured image for The Science Behind Incognia's Location Identity resource

The Science Behind Incognia's Location Identity

From academic research to a powerful digital identity...
Featured image for Scams pose a threat to the gig economy apps resource

Scams pose a threat to the gig economy apps

Fraud and policy abuse on gig economy apps hurt the user...
Featured image for Who is faking location? resource

Who is faking location?

Location spoofing poses a threat to apps that rely on...
Featured image for How Location Technology Can Make Trust & Safety More Cost Effective resource

How Location Technology Can Make Trust & Safety More Cost Effective

Building a trust and safety team is expensive, and...
Featured image for Fraud farms - Identifying where fraudsters are resource

Fraud farms - Identifying where fraudsters are

Fraud farms are massive operations wherein fraudsters use...
Featured image for Incognia is featured in the best authentication solutions on Cybernews resource

Incognia is featured in the best authentication solutions on Cybernews

The experts from Cybernews recently took notice of our...
Featured image for Recognizing and Solving Trust & Safety Challenges for Food Delivery resource

Recognizing and Solving Trust & Safety Challenges for Food Delivery

What are the main Trust & Safety challenges for Food...
Featured image for 5 Industries Location Identity Can Help Increase Trust & Safety resource

5 Industries Location Identity Can Help Increase Trust & Safety

Location identity is a powerful tool for fraud detection...
Featured image for Fraudsters Use Location Spoofing to Take a Bite from Food Delivery Apps resource

Fraudsters Use Location Spoofing to Take a Bite from Food Delivery Apps

Fraudsters Use Location Spoofing to Take a Bite from Food...
Featured image for Spoofing-resistant location data - the missing piece to addressing digital trust and safety resource

Spoofing-resistant location data - the missing piece to addressing digital trust and safety

Location data is essential for digital trust and safety,...
Featured image for The Rise of the Super App and the Role of Location resource

The Rise of the Super App and the Role of Location

In location-based apps, such as food delivery, all users...
Featured image for Geolocation [An updated definition for identity, authentication, and fraud prevention] resource

Geolocation [An updated definition for identity, authentication, and fraud prevention]

The definition of what geolocation is, and what it can do...
Featured image for Swipe Left for Location Spoofing resource

Swipe Left for Location Spoofing

Study of 24 leading dating Apps shows 37% can be location...
Featured image for A Review of the New Federal American Privacy Bill resource

A Review of the New Federal American Privacy Bill

New Federal American Privacy Bill - This bill represents...
Featured image for Incognia appoints new DPO and reinforces its commitment to privacy resource

Incognia appoints new DPO and reinforces its commitment to privacy

New DPO reinforces Incognia's values and mission related to...
Featured image for Incognia introduces new Location-based Liveness Spoofing Detection Solution resource

Incognia introduces new Location-based Liveness Spoofing Detection Solution

Today we announced a new Incognia identity fraud detection...
Featured image for How to Achieve High Opt-in Rate When Requesting User Location Permissions resource

How to Achieve High Opt-in Rate When Requesting User Location Permissions

What is the secret to achieving high opt-in rates for...
Featured image for Incognia Closes $15.5M Series A Funding Round resource

Incognia Closes $15.5M Series A Funding Round

Incognia announces the closing of our $15.5M Series A...
Featured image for How to block users playing outside of licensed jurisdictions resource

How to block users playing outside of licensed jurisdictions

Online gambling is regulated, limiting individuals to...
Featured image for Fraud farms take advantage of location spoofing to swindle mobile gaming apps resource

Fraud farms take advantage of location spoofing to swindle mobile gaming apps

With fraud farms, fraudsters are able to mechanize and...
Featured image for Apple announces use of location for fraud prevention resource

Apple announces use of location for fraud prevention

Apple Pay is now using location for fraud prevention. This...
Featured image for Incognia introduces Location-based Device Authorization Solution resource

Incognia introduces Location-based Device Authorization Solution

Incognia announces a new identity fraud detection module to...
Featured image for Cybernews Interview with André Ferraz resource

Cybernews Interview with André Ferraz

Cybernews interview with André Ferraz on the need for...
Featured image for Why is device fingerprinting useless when fintech apps need it most? resource

Why is device fingerprinting useless when fintech apps need it most?

Device fingerprinting will not recognize the login of a new...
Featured image for Authentication Mobile App Friction Report - Crypto Edition resource

Authentication Mobile App Friction Report - Crypto Edition

A review of authentication friction in top crypto apps at...
Featured image for Incognia Introduces New Location Identity Fraud Detection Tools resource

Incognia Introduces New Location Identity Fraud Detection Tools

Incognia announces new location identity fraud detection...
Featured image for Detecting Location Spoofing Used to Evade Russian Sanctions resource

Detecting Location Spoofing Used to Evade Russian Sanctions

Location spoofing has been increasing across the board....
Featured image for New Crypto Edition of Mobile App Friction Report resource

New Crypto Edition of Mobile App Friction Report

Incognia releases Crypto edition of Mobile App Friction...
Featured image for Thoughts about location data privacy and consent resource

Thoughts about location data privacy and consent

Lucas Martins, Incognia CSO, shares insights and...
Featured image for What lies beneath a highly precise fraud risk assessment? resource

What lies beneath a highly precise fraud risk assessment?

Learn how location behavior and device intelligence power...
Featured image for Could OTP security get any worse? Yes. Bots. resource

Could OTP security get any worse? Yes. Bots.

Bots are being used to automate the theft of one time...
Featured image for Why Incognia when considering behavioral biometrics resource

Why Incognia when considering behavioral biometrics

Location behavior offers a compelling authentication signal...
Featured image for Why it's time to stop relying on static credentials resource

Why it's time to stop relying on static credentials

Static credentials are vulnerable to exposure via social...
Featured image for Why OTPs shouldn't be part of a passwordless strategy resource

Why OTPs shouldn't be part of a passwordless strategy

A one time password (OTP) is a password that lasts for just...
Featured image for It's time to stop blaming the user resource

It's time to stop blaming the user

Social engineering is becoming increasingly sophisticated...
Featured image for Fintech Mobile App Friction Ranking [Device Change] resource

Fintech Mobile App Friction Ranking [Device Change]

Incognia Mobile App Friction report ranks Klover and...
Featured image for Buying a new smartphone is not a crime resource

Buying a new smartphone is not a crime

From time to time people switch devices, but this doesn't...
Featured image for Food Delivery Apps [Detecting Location Spoofing Fraud] resource

Food Delivery Apps [Detecting Location Spoofing Fraud]

Food delivery apps are now wildly popular and new fraud...
Featured image for MRC 2021 Global Fraud Survey [3 Key Takeaways] resource

MRC 2021 Global Fraud Survey [3 Key Takeaways]

Key takeaways from the 2021 MRC Global Fraud Survey.
Featured image for T-Mobile Breach - Expect Increased Mobile Fraud resource

T-Mobile Breach - Expect Increased Mobile Fraud

The T-Mobile data breach is expected to fuel increased SIM...
Featured image for Getting to passwordless login resource

Getting to passwordless login

Passwordless login for mobile applications can be achieved...
Featured image for Location as a shield for account security resource

Location as a shield for account security

Learn more about how Incognia’s award-winning location...
Featured image for What is zero-factor authentication? resource

What is zero-factor authentication?

Companies are looking to adopt passwordless authentication....
Featured image for Fintech Mobile App Friction Ranking [Login Authentication] resource

Fintech Mobile App Friction Ranking [Login Authentication]

Incognia Mobile App Study ranks Klover and eToro winners...
Featured image for Mobile Authentication - Security and Friction Rankings resource

Mobile Authentication - Security and Friction Rankings

Learn how the different types of mobile authentication rank...
Featured image for The secret of increasing the opt-in rate on your mobile application resource

The secret of increasing the opt-in rate on your mobile application

Learn 5 things to know about Location Permissions, an ebook...
Featured image for Solving the digital identity problem for mobile and beyond resource

Solving the digital identity problem for mobile and beyond

Digital identity is a challenging problem and far from...
Featured image for Why Location is Hard to Get Right resource

Why Location is Hard to Get Right

Applying location technology to mobile fraud prevention is...
Featured image for Why Precise Location Matters for Mobile Fraud Prevention resource

Why Precise Location Matters for Mobile Fraud Prevention

With 50% of transactions happening on mobile devices, and...
Featured image for New Developer Edition of Incognia for Mobile Developers resource

New Developer Edition of Incognia for Mobile Developers

Incognia offers free developer edition putting frictionless...
Featured image for Five Ways Fraudsters Spoof Location resource

Five Ways Fraudsters Spoof Location

Location spoofing is now a standard technique used by...
Featured image for How should location fit into a risk based authentication strategy? resource

How should location fit into a risk based authentication strategy?

How to implement frictionless risk based authentication...
Featured image for Retail Mobile App Ranking [Checkout Friction Index] resource

Retail Mobile App Ranking [Checkout Friction Index]

Incognia Mobile App Study ranks Lowe's, Home Depot, Bed,...
Featured image for Account Takeover Prevention Using Location Behavior resource

Account Takeover Prevention Using Location Behavior

Strong Account Takeover Prevention could be achieved...
Featured image for Incognia: A Great Place to Work resource

Incognia: A Great Place to Work

Incognia was recently certified as a great place to work by...
Featured image for Incognia Announces Auth0 Integrations resource

Incognia Announces Auth0 Integrations

Incognia announces new integrations for the Auth0...
Featured image for Real-time address verification for mobile resource

Real-time address verification for mobile

With increasing mobile adoption, use of real-time address...
Featured image for Global QSR Approves More Mobile Transactions with Incognia resource

Global QSR Approves More Mobile Transactions with Incognia

Incognia dramatically increases approval rates for mobile...
Featured image for Incognia Wins 2021 DEVIES Fintech Award resource

Incognia Wins 2021 DEVIES Fintech Award

The Incognia Mobile Antifraud SDK was chosen as the best...
Featured image for Fintech Mobile App Ranking [Onboarding Friction Index] resource

Fintech Mobile App Ranking [Onboarding Friction Index]

Incognia Mobile App Study ranks Chime, Robinhood and Credit...
Featured image for Hide and Seek [Mobile Emulators and Location Spoofing] resource

Hide and Seek [Mobile Emulators and Location Spoofing]

Detection of mobile emulators and location spoofing for...
Featured image for Mobile Payments Win the Popular Vote resource

Mobile Payments Win the Popular Vote

Consumers are increasingly voting in favor of contactless...
Featured image for [2020 Hot Trend] QR Code Contactless Payments resource

[2020 Hot Trend] QR Code Contactless Payments

Finally the QR Code has found its real purpose -...
Featured image for Frictionless Fraud Detection Meets Contactless Payments resource

Frictionless Fraud Detection Meets Contactless Payments

Contactless payments usage surges due to health concerns....
Featured image for iOS14 Location Access Update resource

iOS14 Location Access Update

iOS14 allows users to provide approximate location data to...
Featured image for Social engineering prevention with dynamic data resource

Social engineering prevention with dynamic data

Implement dynamic data into your risk decisioning to...
Featured image for Removing the Friction & Fraud from Mobile Financial Services resource

Removing the Friction & Fraud from Mobile Financial Services

Growing business means growing mobile accounts - learn how...
Featured image for Privacy by Design [ A Quick Recap of the 7 Principles ] resource

Privacy by Design [ A Quick Recap of the 7 Principles ]

Incognia follows the Privacy by Design framework which is a...
Featured image for How much Friction is too much Friction? [Balancing UX and Security] resource

How much Friction is too much Friction? [Balancing UX and Security]

Users are reaching the limits of how much friction they...
Featured image for Facial Recognition: What can possibly go wrong? resource

Facial Recognition: What can possibly go wrong?

Facial recognition technology is being questioned,...
Featured image for The True Cost of False Positives in The Battle to Prevent Fraud resource

The True Cost of False Positives in The Battle to Prevent Fraud

False positives are also a challenge in fraud prevention,...
Featured image for Twitter Attack - Was it SIM Swap Again? resource

Twitter Attack - Was it SIM Swap Again?

The Twitter attack illustrates how social engineering...
Featured image for Prevent Mobile App Fraud [The Most Expensive Form of Identity Theft] resource

Prevent Mobile App Fraud [The Most Expensive Form of Identity Theft]

Application fraud is a billion dollar problem for financial...
Featured image for Fraud During the Pandemic [5 Key Trends] resource

Fraud During the Pandemic [5 Key Trends]

COVID-19 has quickly changed consumer behavior allowing new...
Featured image for Recognize New Mobile Devices for Less Fraud and Friction resource

Recognize New Mobile Devices for Less Fraud and Friction

Leverage behavioral biometrics to recognize new devices...
Featured image for WhatsApp Payments canceled in Brazil [Was it security?] resource

WhatsApp Payments canceled in Brazil [Was it security?]

The recent news that WhatsApp would offer a peer-to-peer...
Featured image for Synthetic Identity Fraud [What You Need to Know] resource

Synthetic Identity Fraud [What You Need to Know]

Synthetic identity fraud is fueled by data breaches and...
Featured image for We Are Incognia resource

We Are Incognia

At Incognia we have created a private identity based on the...
Featured image for Protecting Location Data [5 Core Pillars] resource

Protecting Location Data [5 Core Pillars]

Collecting, storing and working with location data raises...
Featured image for Location Behavioral Biometrics [A New Type of Digital Identity] resource

Location Behavioral Biometrics [A New Type of Digital Identity]

Location-based behavioral biometrics offers the opportunity...