Recent posts

Featured image for Verified IP Location: Know Where Your Web Traffic is Actually Coming From resource

Verified IP Location: Know Where Your Web Traffic is Actually Coming From

Enhance security with Incognia's Cross Device...
Featured image for Cross Device Authentication: Verify the Right Person in the Right Place resource

Cross Device Authentication: Verify the Right Person in the Right Place

Enhance security with Incognia's Cross Device...
Featured image for AI Rule Builder: The Next Innovation in How Fraud Rules Get Built resource

AI Rule Builder: The Next Innovation in How Fraud Rules Get Built

Discover how Incognia's AI Rule Builder revolutionizes...
Featured image for Why Incognia’s AI-Powered Browser ID is the Next Standard for Web Identity resource

Why Incognia’s AI-Powered Browser ID is the Next Standard for Web Identity

Discover how Incognia's AI-powered Browser ID redefines web...
Featured image for Incognia’s Network Graph: Persistent Device ID for Faster Fraud Investigations resource

Incognia’s Network Graph: Persistent Device ID for Faster Fraud Investigations

Persistent and tamper-resistant device IDs in Incognia's...
Featured image for How Marketplaces Can Outsmart Seller Fraud in 2026 resource

How Marketplaces Can Outsmart Seller Fraud in 2026

Discover how to combat sophisticated seller fraud in 2026...
Featured image for Episode 4: How Rapido Balances Driver Supply with Fighting Fraud resource

Episode 4: How Rapido Balances Driver Supply with Fighting Fraud

Learn how Rapido balances driver supply and fraud...
Featured image for How App Cloners are Becoming a One-Stop-Shop for Fraudsters resource

How App Cloners are Becoming a One-Stop-Shop for Fraudsters

Take a deep dive into the rise of app cloners and what...
Featured image for Collusion on Gig Platforms: Trends, Types, and Solutions resource

Collusion on Gig Platforms: Trends, Types, and Solutions

Discover how gig platforms can detect and prevent collusion...
Featured image for The Gig Economy Fraud Trends to Know for 2026 resource

The Gig Economy Fraud Trends to Know for 2026

Stay informed about gig economy fraud trends to know for...
Featured image for 5 Ways Gig Economy Platforms Can Strengthen Fraud Prevention in 2026 resource

5 Ways Gig Economy Platforms Can Strengthen Fraud Prevention in 2026

Learn 5 effective ways delivery and ride sharing platforms...
Featured image for Episode 3: Fighting Back Against Promo Abuse resource

Episode 3: Fighting Back Against Promo Abuse

Learn how gig economy platforms combat promo abuse, detect...
Featured image for Ban Evasion: How Platforms Can Shut Out Repeat Offenders resource

Ban Evasion: How Platforms Can Shut Out Repeat Offenders

Struggling with ban evasion on your platform? Learn how you...
Featured image for Episode 2: Building Trust Scores to Fight Fraud and Reward Good Users resource

Episode 2: Building Trust Scores to Fight Fraud and Reward Good Users

Learn how how Rebel Foods uses data-driven trust scores to...
Featured image for Episode 1: Fighting Courier Fraud in Cash-on-Delivery Markets resource

Episode 1: Fighting Courier Fraud in Cash-on-Delivery Markets

Explore COD’s hidden risks in emerging markets—from courier...
Featured image for Promo Abuse: The Silent Fraud Hiding Behind Your Best Campaigns resource

Promo Abuse: The Silent Fraud Hiding Behind Your Best Campaigns

Learn how to detect and prevent promo abuse in the gig...
Featured image for Understanding 3 Different Types of Collusion on Food Delivery Platforms resource

Understanding 3 Different Types of Collusion on Food Delivery Platforms

Explore collusion on food delivery industry. Learn about...
Featured image for How to Make the Case for Fraud Prevention With Different Departments resource

How to Make the Case for Fraud Prevention With Different Departments

Learn how to communicate the value of fraud prevention more...
Featured image for 3 Ways Multi-Sided Platforms are Defeating Ban Evasion resource

3 Ways Multi-Sided Platforms are Defeating Ban Evasion

Explore how multi-sided marketplace platforms are tackling...
Featured image for Death by 1,000 Cuts: Why Even “Small-Time” Fraud Matters on Food Delivery Apps resource

Death by 1,000 Cuts: Why Even “Small-Time” Fraud Matters on Food Delivery Apps

Dive into the impacts of seemingly small-scale fraud on...
Featured image for ELF: The Persistent Signal Fraudsters Can't Erase resource

ELF: The Persistent Signal Fraudsters Can't Erase

Learn about the threat of recurring fraud and the...
Featured image for Why Solving Multi-Accounting Is Worth Your While resource

Why Solving Multi-Accounting Is Worth Your While

Learn about the return-on-investment potential of tackling...
Featured image for New Account Fraud: Are You Missing This Critical Ride-Hailing Fraud Problem? resource

New Account Fraud: Are You Missing This Critical Ride-Hailing Fraud Problem?

Learn about the impact new account fraud has on ride...
Featured image for Fraud Prevention Doesn’t Kill Growth, Multi-Accounting Does resource

Fraud Prevention Doesn’t Kill Growth, Multi-Accounting Does

Fraud prevention is sometimes seen as hurting growth, but...
Featured image for Fraud For Sale: Multi-accounting and Fraud on Gig Economy Apps resource

Fraud For Sale: Multi-accounting and Fraud on Gig Economy Apps

Take an insider look at the fraud-as-a-service tools used...
Featured image for The Fraud-as-a-Service Economy: How Fraudsters Make a Living Attacking Gig Economy Platforms resource

The Fraud-as-a-Service Economy: How Fraudsters Make a Living Attacking Gig Economy Platforms

Learn about the underground economy fueling fraud on gig...
Featured image for The Fraudster's Playbook: How Fraudsters Defraud Your Platform resource

The Fraudster's Playbook: How Fraudsters Defraud Your Platform

Learn about the step-by-step process fraudsters take to...
Featured image for Device ID Obfuscation: How Fraudsters Make 1 Device Look Like 300 resource

Device ID Obfuscation: How Fraudsters Make 1 Device Look Like 300

Learn about device ID obfuscation and how bad actors stop...
Featured image for 3 Fraud-as-a-Service Tools Every Food Delivery Platform Should Know About resource

3 Fraud-as-a-Service Tools Every Food Delivery Platform Should Know About

Learn about the Fraud-as-a-Service tools impacting food...
Featured image for You Are Who People Say You Are: Understanding the Reputational Impact of Courier Scams resource

You Are Who People Say You Are: Understanding the Reputational Impact of Courier Scams

Explore the real impact that courier scams can have on a...
Featured image for Stop Ban Evasion Even When Fraudsters Get Creative With Obfuscation resource

Stop Ban Evasion Even When Fraudsters Get Creative With Obfuscation

Prevent ban evasion by learning about fraudsters' tactics...
Featured image for Why Browser Intelligence Has to Evolve to Support Financial Institutions & Online Marketplaces resource

Why Browser Intelligence Has to Evolve to Support Financial Institutions & Online Marketplaces

Learn about threats facing online financial institutions...
Featured image for The Ban Evasion Toolkit: Techniques Fraudsters Use to Evade Bans resource

The Ban Evasion Toolkit: Techniques Fraudsters Use to Evade Bans

Learn how fraudsters evade bans and discover effective...
Featured image for Managing Friction and User Verification: Remembering the User’s Perspective resource

Managing Friction and User Verification: Remembering the User’s Perspective

Explore how effective communication and user collaboration...
Featured image for Smart Friction: Targeting Your Friction Toward Fraudsters, Not Good Users resource

Smart Friction: Targeting Your Friction Toward Fraudsters, Not Good Users

Explore how smart friction and passive signals can enhance...
Featured image for Playing the Numbers Game: Why Fraudsters Can Afford A 99% Failure Rate resource

Playing the Numbers Game: Why Fraudsters Can Afford A 99% Failure Rate

Explore how multi-accounting enables fraud, and how...
Featured image for The 4 Promotion Campaign Mistakes Fraudsters Feast On resource

The 4 Promotion Campaign Mistakes Fraudsters Feast On

Learn key mistakes to avoid in your promo campaigns to...
Featured image for Balancing Growth Tactics With Fraud Prevention: How to Protect Promo Campaigns From Abuse resource

Balancing Growth Tactics With Fraud Prevention: How to Protect Promo Campaigns From Abuse

Learn key strategies to protect your promotional campaigns...
Featured image for How Organized Fraudsters Run Their Operations Like a Business (And How Fraud Fighters Can Use That Against Them) resource

How Organized Fraudsters Run Their Operations Like a Business (And How Fraud Fighters Can Use That Against Them)

Explore how organized fraudsters exploit promotions and how...
Featured image for Churn or Burn? Telling the Difference Between Low Retention and Promo Abuse resource

Churn or Burn? Telling the Difference Between Low Retention and Promo Abuse

Learn how to tackle promo abuse with strategies on user...
Featured image for Bad Actors at Scale: The Real Cost of Fraud & Policy Abuse resource

Bad Actors at Scale: The Real Cost of Fraud & Policy Abuse

Explore how promo abuse at scale impacts businesses and the...
Featured image for How Fraudsters Find Quick Workarounds For Fraud Prevention Tools (And How to Stay Ahead) resource

How Fraudsters Find Quick Workarounds For Fraud Prevention Tools (And How to Stay Ahead)

Learn how fraudsters outfox fraud prevention’s industry...
Featured image for Communicating the Value of Fraud Prevention to Executives resource

Communicating the Value of Fraud Prevention to Executives

Learn how to communicate the value of fraud prevention to...
Featured image for How to Overcome Fraudsters’ Speed Advantage and Stop Playing Catch Up resource

How to Overcome Fraudsters’ Speed Advantage and Stop Playing Catch Up

Discover how fraud prevention teams can overcome speed...
Featured image for Data Quality: The Missing Piece of the Build vs. Buy Fraud Prevention Debate resource

Data Quality: The Missing Piece of the Build vs. Buy Fraud Prevention Debate

Explore the build vs. buy dilemma in fraud prevention....
Featured image for Fraud on Restaurant Reservation Apps: How Bad Actors Are Ruining Dinner Plans & Stealing a Seat at the Table resource

Fraud on Restaurant Reservation Apps: How Bad Actors Are Ruining Dinner Plans & Stealing a Seat at the Table

Explore how bad actors are exploiting digital reservations,...
Featured image for Having Your Delivery and Eating it Too: Managing Food Delivery Fraud Without Causing Driver Churn resource

Having Your Delivery and Eating it Too: Managing Food Delivery Fraud Without Causing Driver Churn

Explore how food delivery platforms balance fraud...
Featured image for The Hidden Costs of Internal Fraud Prevention resource

The Hidden Costs of Internal Fraud Prevention

Should I invest in a third-party fraud prevention solution,...
Featured image for Unveiling the Hidden Threat: Tackling 'Off-line Rides' in Ride-Hailing Apps resource

Unveiling the Hidden Threat: Tackling 'Off-line Rides' in Ride-Hailing Apps

Explore how offline rides impact ride-hailing platforms and...
Featured image for Incognia: Strategic Expansion & Focus on Device and Location Data for Fraud Prevention resource

Incognia: Strategic Expansion & Focus on Device and Location Data for Fraud Prevention

Learn about Incognia's $31M Series B funding round, our...
Featured image for How & Why Driver Account Sharing Happens (And How Food Delivery Apps Can Prevent It) resource

How & Why Driver Account Sharing Happens (And How Food Delivery Apps Can Prevent It)

Explore techniques to combat unauthorized account sharing...
Featured image for Exploring 3 Different Location Spoofing Methods Used By Fraudsters resource

Exploring 3 Different Location Spoofing Methods Used By Fraudsters

Dive into the 3 different location spoofing methods...
Featured image for The Importance and Challenges of Listing Verification for Online Marketplaces resource

The Importance and Challenges of Listing Verification for Online Marketplaces

Explore how to enhance listing verification in P2P...
Featured image for How Fraud Prevention and Marketing Can Work Together Against Promo Abuse resource

How Fraud Prevention and Marketing Can Work Together Against Promo Abuse

Explore how promo abuse impacts your digital marketing...
Featured image for What’s Mine is Yours? How Ban Evasion and Account Sharing Are Costing Food Delivery Apps Money resource

What’s Mine is Yours? How Ban Evasion and Account Sharing Are Costing Food Delivery Apps Money

Discover how food delivery platforms can combat fraudsters'...
Featured image for Using Location Data to Detect Mule Accounts resource

Using Location Data to Detect Mule Accounts

Explore strategies to detect mule accounts in real-time...
Featured image for Reduce fraud losses, increase profits: how fraud prevention functions as a profit center resource

Reduce fraud losses, increase profits: how fraud prevention functions as a profit center

Discover how fraud prevention makes important impact on the...
Featured image for Optimizing Your Fraud Prevention Stack resource

Optimizing Your Fraud Prevention Stack

Learn how to build the ideal fraud prevention stack, and...
Featured image for Real-Time Fraud Prevention in the Age of Faster Payments resource

Real-Time Fraud Prevention in the Age of Faster Payments

Explore how real-time payment systems impact fraud...
Featured image for Off-the-shelf device ID could be sabotaging your fraud prevention efforts resource

Off-the-shelf device ID could be sabotaging your fraud prevention efforts

Explore the significance of device IDs in fraud prevention...
Featured image for Fighting ATOs with next generation device recognition resource

Fighting ATOs with next generation device recognition

Explore insights from industry experts on the role of...
Featured image for Fraud in Draw Games: How to Prevent iLottery Fraud resource

Fraud in Draw Games: How to Prevent iLottery Fraud

Explore the prevalent types of iLottery fraud, from payment...
Featured image for Identity verification is make-or-break for your platform's growth resource

Identity verification is make-or-break for your platform's growth

Learn why identity is the cornerstone for trust & safety on...
Featured image for Gambling Compliance: How to Add Extra Layer of Protection resource

Gambling Compliance: How to Add Extra Layer of Protection

Discover how multiple layers of security can ensure safer...
Featured image for Detecting suspicious environments is a paradigm shift resource

Detecting suspicious environments is a paradigm shift

Discover how detecting suspicious environments reveals new...
Featured image for A Comprehensive Analysis of Device Intelligence Spoofing Techniques resource

A Comprehensive Analysis of Device Intelligence Spoofing Techniques

Read to understand the evolution of device intelligence and...
Featured image for Cutting Through the Noise: 2 generative AI threats to prepare for resource

Cutting Through the Noise: 2 generative AI threats to prepare for

Discover the two generative AI threats that fraud...
Featured image for Using Seller Fraud Detection to Prevent Marketplace Scams resource

Using Seller Fraud Detection to Prevent Marketplace Scams

Discover how to detect risk signals and prevent potential...
Featured image for 5 Best Practices for Preventing Refund Fraud in Food Delivery resource

5 Best Practices for Preventing Refund Fraud in Food Delivery

Safeguard the integrity of your food delivery service!...
Featured image for Main policy violations & scams in food delivery apps resource

Main policy violations & scams in food delivery apps

Are you a food or grocery delivery app? Find out what...
Featured image for As device intelligence becomes more challenging new risk signals emerge resource

As device intelligence becomes more challenging new risk signals emerge

Bringing new behavioral signals to the market, and...
Featured image for How to Reduce Bonus and Promo Code Abuse in Food Delivery [Guide] resource

How to Reduce Bonus and Promo Code Abuse in Food Delivery [Guide]

Prevent promo code abuse in food delivery apps: Learn about...
Featured image for The Shared Account Challenge: Best Practices for Securing Food Delivery Apps resource

The Shared Account Challenge: Best Practices for Securing Food Delivery Apps

Are you a food delivery app struggling to prevent...
Featured image for Courier Scams: How Location Verification Can Uncover Them resource

Courier Scams: How Location Verification Can Uncover Them

Find out what scams couriers commit and how location...
Featured image for Account creation fraud: How to detect multiple accounts in food delivery apps? resource

Account creation fraud: How to detect multiple accounts in food delivery apps?

Protect your app's integrity and avoid revenue losses with...
Featured image for Why Online Identity Verification is Critical for Peer-to-Peer Marketplaces resource

Why Online Identity Verification is Critical for Peer-to-Peer Marketplaces

Find out why online identity verification should be an...
Featured image for The State of User Verification for Peer-to-peer Marketplaces resource

The State of User Verification for Peer-to-peer Marketplaces

For online marketplaces, efficient user verification...
Featured image for Machine Learning: How Incognia Data Makes the Difference resource

Machine Learning: How Incognia Data Makes the Difference

In this article, we take a closer look at how Machine...
Featured image for The Fundamentals of Real-Time Address Verification resource

The Fundamentals of Real-Time Address Verification

In this article, we take a closer look at the fundamentals...
Featured image for How Delivery Platforms Can Detect Coupon Scams resource

How Delivery Platforms Can Detect Coupon Scams

Learn how to detect promotion and coupon scams to protect...
Featured image for Top 5 Most Common Address Verification Software resource

Top 5 Most Common Address Verification Software

Find out which five types of address verification software...
Featured image for The Science Behind Incognia's Location Identity resource

The Science Behind Incognia's Location Identity

From academic research to a powerful digital identity...
Featured image for Who is faking location? resource

Who is faking location?

Location spoofing poses a threat to apps that rely on...
Featured image for Fraud farms - Identifying where fraudsters are resource

Fraud farms - Identifying where fraudsters are

Fraud farms are massive operations wherein fraudsters use...
Featured image for Spoofing-resistant location data - the missing piece to addressing digital trust and safety resource

Spoofing-resistant location data - the missing piece to addressing digital trust and safety

Location data is essential for digital trust and safety,...
Featured image for Geolocation [An updated definition for identity, authentication, and fraud prevention] resource

Geolocation [An updated definition for identity, authentication, and fraud prevention]

The definition of what geolocation is, and what it can do...
Featured image for How to block users playing outside of licensed jurisdictions resource

How to block users playing outside of licensed jurisdictions

Online gambling is regulated, limiting individuals to...
Featured image for Fraud farms take advantage of location spoofing to swindle mobile gaming apps resource

Fraud farms take advantage of location spoofing to swindle mobile gaming apps

With fraud farms, fraudsters are able to mechanize and...
Featured image for Why is device intelligence useless when fintech apps need it most? resource

Why is device intelligence useless when fintech apps need it most?

Device intelligence will not recognize the login of a new...
Featured image for Why Incognia when considering behavioral biometrics resource

Why Incognia when considering behavioral biometrics

Location behavior offers a compelling authentication signal...
Featured image for Why OTPs Shouldn't Be Part of a Passwordless Strategy resource

Why OTPs Shouldn't Be Part of a Passwordless Strategy

A one time password (OTP) is a password that lasts for just...
Featured image for It's Time to Stop Blaming the User resource

It's Time to Stop Blaming the User

Social engineering is becoming increasingly sophisticated...
Featured image for What is zero-factor authentication? resource

What is zero-factor authentication?

Companies are looking to adopt passwordless authentication....
Featured image for Fintech Mobile App Friction Ranking [Login Authentication] resource

Fintech Mobile App Friction Ranking [Login Authentication]

Incognia Mobile App Study ranks Klover and eToro winners...
Featured image for Five Ways Fraudsters Spoof Location resource

Five Ways Fraudsters Spoof Location

Location spoofing is now a standard technique used by...
Featured image for How should location fit into a risk based authentication strategy? resource

How should location fit into a risk based authentication strategy?

How to implement frictionless risk based authentication...
Featured image for Account Takeover Prevention Using Location Behavior resource

Account Takeover Prevention Using Location Behavior

Strong Account Takeover Prevention could be achieved...
Featured image for Prevent Mobile App Fraud [The Most Expensive Form of Identity Theft] resource

Prevent Mobile App Fraud [The Most Expensive Form of Identity Theft]

Application fraud is a billion dollar problem for financial...