Essential Industry Terms Explained
Explore key financial crime, risk management and compliance terminology with our comprehensive glossary.

Whether you're navigating regulatory compliance, fighting financial crime, or simply enhancing your knowledge of fraud and anti-money laundering (AML) terms, this resource is for you.
#
1st Party Fraud
First-party fraud occurs when an individual intentionally misrepresents their identity, financial situation, or intentions to gain financial benefits or avoid obligations. Unlike third-party fraud, where external actors exploit stolen information, first-party fraud is...
3DS (3D Secure)
3D Secure is an authentication method designed to reduce fraud and increase security for online card transactions. Originally sponsored by Visa under the 'Verified by Visa' brand, Mastercard and...
3rd Party Fraud
What is 3rd Party Fraud? Refers to any fraud committed against a financial institution or merchant by an unrelated or unknown third-party. While there are many different kinds of fraud, there are 3...
419 Fraud
419 Fraud is a type of advance-fee fraud in which individuals or companies receive unsolicited emails or letters promising a percentage of a large sum of money in return for allowing funds to pass...
A
A/B Testing
A/B testing is a research method in which two groups, a control group (representing the current strategy) and an alternate group (representing a hypothesis for an improved strategy), are tested...
ACH Fraud
Discover how ACH fraud happens, its financial impact, real-world examples, and key prevention tips. Learn how to protect yourself and your business from electronic payment threats in this helpful guide.
AI (Artificial Intelligence)
AI or Artificial Intelligence is broadly used to describe the simulation of the processes of human intelligence by computer systems. The processes simulate human learning in that the systems start...
AI Explainability
Discover why AI explainability matters! Learn how transparent AI builds trust, ensures compliance, and empowers users—plus real-world use cases, stats, and FAQs to help you navigate ethical AI.
AI Model Bias
Curious about AI model bias? Learn what it is, why it matters, real-world examples, and how to tackle it for fairer, more reliable AI. Dive in for key insights and practical solutions!
AI-powered Fraud Detection
Discover how AI-powered fraud detection uses machine learning to spot suspicious activity in real time, reduce false positives, and help businesses stay ahead of evolving fraud threats.
AI-powered Identity Verification
Discover how AI-powered identity verification is transforming security and efficiency across industries—boosting fraud detection, streamlining onboarding, and keeping your data safe in the digital age.
AML (Anti-Money-Laundering)
Discover the essentials of Anti-Money Laundering (AML): its importance, techniques, challenges, use cases, and the role of technology in fighting financial crime across industries. Read on to learn more!
API Injection Fraud
Discover how API Injection Fraud threatens data security, the latest attack trends, and practical prevention strategies to help protect your business in an increasingly vulnerable digital landscape.
AVS (Address Verification System)
AVS or Address Verification System is a payment processing system comparison of the numerical portions of billing and shipping addresses with the addresses on file at the credit card-issuing bank. A...
Account Chaining
Discover how account chaining connects multiple accounts across platforms, streamlining operations, boosting security, and helping businesses detect and prevent fraud with advanced technology.
Account Enumeration Attack
Learn how Account Enumeration Attacks work, why they're a threat, and discover key strategies to protect your business from cybercriminals targeting your login systems. Stay secure with expert tips!
Account Opening Fraud
Discover how fraudsters open accounts using stolen or fake identities, the risks involved, and key strategies to detect and prevent account opening fraud in today’s digital financial landscape.
Account Takeover (ATO)
Learn how Account Takeover (ATO) fraud works, its impact, and ways to protect your accounts. Explore real-world examples, prevention tips, and the latest trends in online security.
Account Takeover Fraud (ATO)
Account Takeover (ATO) is a form of fraud where a malicious actor gains unauthorized access to a user’s online account. This is typically achieved through stolen login credentials obtained via phishing, data breaches...
Account Velocity Monitoring
Discover how Account Velocity Monitoring helps detect fraud and secure your accounts by tracking unusual transaction patterns, ensuring both safety and trust in your financial activities.
Acquirer (Acquiring Bank)
The Acquiring Bank, also known as the merchant acquirer or the merchant bank, is the bank that is responsible for settling credit and debit card transactions on behalf of the merchant. Its...
Active Authentication
Active Authentication is a security and authentication method in which the user is challenged with questions about what he/she knows (knowledge-based), has (possession-based) or is (biometric-based).
Ad Hoc Fraud Reporting
Discover how Ad Hoc Fraud Reporting enables flexible, real-time detection of suspicious activities, helping organizations quickly respond to evolving fraud threats with customized data insights.
Address Manipulation Fraud
Discover how fraudsters manipulate addresses to intercept goods, mislead billing, and commit identity theft—and learn key strategies to protect your business and personal data from these schemes.
Advance-Fee Fraud
Advance-Fee Fraud is a common fraud scheme generally involving a criminal tricking a victim into paying an up-front fee with the promise of a larger reward paid out later.
Adversarial AI
Discover how adversarial AI manipulates machine learning models, its real-world risks, and the strategies businesses can use to detect, prevent, and defend against these sophisticated cyber threats.
Adverse Media Screening
Discover how Adverse Media Screening helps businesses manage risk, ensure compliance, and protect their reputation by identifying negative news about clients and partners. Learn methods, challenges, and trends.
Affiliate Fraud
Discover how affiliate fraud threatens brands, common scam tactics, recent statistics, and effective solutions to protect your business and maximize ROI. Learn how to safeguard your affiliate programs today!
Algorithmic Trading Fraud
Discover how algorithmic trading fraud works, its impact on markets, and how advanced AI solutions help detect and prevent manipulative practices to ensure fair, secure trading for all participants.
Alternative Credit Scoring Fraud
Discover how fraudsters exploit non-traditional credit data, the risks to financial institutions, and key strategies to prevent alternative credit scoring fraud in today’s evolving digital lending landscape.
Alternative Data
Discover how alternative data—like social media, geolocation, and web traffic—offers deeper insights, boosts fraud prevention, and enhances decision-making across industries. Explore the benefits and challenges!
Anomaly Detection
Discover how anomaly detection uses AI and machine learning to spot unusual patterns, boost security, and prevent fraud in finance and e-commerce. Learn its importance, uses, and future trends.
Anonymous Proxy Fraud
Discover how fraudsters use anonymous proxies to hide their identity, bypass security, and commit online fraud. Learn risks, detection methods, and strategies to protect your business from proxy-based threats.
Application Fraud
Application fraud occurs when a person provides false, stolen, or manipulated information in a formal application process to obtain products, services, or credit. Commonly seen in industries such as financial services, telecommunications...
Application Spoofing
Discover how application spoofing works, the risks it poses to users, key real-world examples, and effective strategies to protect your data from fraudulent apps in this essential security guide.
Arbers
In the world of online betting and gambling, an arber is a person who takes advantage of discrepancies in gambling sites odds, so as to ensure that no matter what party wins a contest (i.e. a race),...
Asia/Pacific Group on Money Laundering (APG) Mutual Evaluations
Discover how APG Mutual Evaluations help Asia-Pacific countries strengthen anti-money laundering efforts, ensure compliance, and enhance regional financial security. Learn key stats and practical uses inside!
Australian AML/CTF Act
Discover how Australia’s AML/CTF Act protects the financial system from money laundering and terrorism financing, key compliance stats, use cases, and how smart technology can help businesses stay compliant.
Authorization Fraud
Discover how authorization fraud happens, its impact, and how to protect your business and personal accounts from unauthorized access. Stay informed with key stats, real-world examples, and expert tips.
Automated Clearing House (ACH) Risk
Discover the key risks in Automated Clearing House (ACH) payments—credit, fraud, and operational—and explore strategies to enhance security, ensure compliance, and protect your transactions.
Automated Decisioning
Discover how automated decisioning uses AI and data to boost accuracy, efficiency, and fraud detection—transforming business processes and empowering smarter, faster decisions across industries.
Autonomous Risk Decisioning
Discover how Autonomous Risk Decisioning uses AI to automate risk management, enhance decision speed and accuracy, and transform industries like finance, e-commerce, and more.
B
B2B (Business-to-Business)
B2B or Business-to-Business refers to a business that sells products or provides services to other businesses.
B2B Payment Fraud
Discover how B2B payment fraud impacts businesses, common tactics used by fraudsters, and practical strategies to protect your company from financial threats in this essential guide.
B2C (Business-to-Consumer)
B2C or Business-to-Consumer refers to a business that sells products or provides services to the end-user consumers. Another variation of this concept is D2C (direct to consumer) in which a...
BIN (Bank Identification Number)
Discover how Bank Identification Numbers (BINs) enhance payment security, streamline transactions, and help prevent fraud in today’s digital banking world. Learn more about their critical role!
Back Door
A route through which legitimate users or criminals can bypass security systems in order to access the data they’re after. Contrasts with a front door attack, where a virus or attack is done with...
Backdoor Attacks
Discover how backdoor attacks threaten machine learning and online systems, explore real-world cases, recent stats, and learn defense strategies to keep your business secure in today’s digital landscape.
Baiting
Baiting describes the situation where a fraudster leaves something out like a USB drive, enticing somebody to pick it up and see what content is on it. The fraudster loads the USB drive up with...
Balance Transfer Fraud
Learn how balance transfer fraud works, its impact, prevention tips, and how financial institutions and AI tools like FraudNet can help protect you from growing credit card scams.
Bank Account Verification APIs
Discover how Bank Account Verification APIs boost financial security, streamline verification, and reduce fraud in fintech and banking—enhancing trust and efficiency for modern digital transactions.
Bank Identification Number (BIN Number)
A BIN Number or Bank Identification Number is assigned to a bank for its own credit card issuance. The first six digits on a credit card constitute the Bank Identification Number, otherwise known as...
Bank Secrecy Act (BSA)
Discover how the Bank Secrecy Act (BSA) combats money laundering and fraud, and learn how financial institutions comply and protect the integrity of the financial system.
Bank for International Settlements (BIS) Guidelines
Discover how Bank for International Settlements (BIS) Guidelines strengthen global banking stability, manage risk, and shape safer financial systems for banks, businesses, and individuals worldwide.
Banking-as-a-Service (BaaS)
Discover how Banking-as-a-Service (BaaS) is transforming finance—enabling businesses to offer banking services, boosting innovation, and expanding access for consumers and startups alike.
Banknote Counterfeit Detection
Discover how modern technology and advanced tools are making banknote counterfeit detection more accurate, helping businesses and individuals stay protected from fake currency. Learn more inside!
Bankruptcy Fraud
Explore what bankruptcy fraud is, its common forms, legal consequences, and modern prevention strategies. Learn how technology and transparency can help protect against financial misconduct.
Behavioral Analytics
Discover how Behavioral Analytics helps businesses understand user actions, predict trends, prevent fraud, and optimize strategies for a better customer experience and smarter decision-making.
Behavioral Anomaly Detection
Discover how Behavioral Anomaly Detection uses AI and real-time monitoring to spot unusual behavior, helping organizations prevent fraud, enhance security, and stay ahead of emerging threats.
Beneficial Ownership Identification
Discover the importance of Beneficial Ownership Identification, its role in transparency, compliance, and fraud prevention, plus how technology streamlines the process for businesses and regulators.
Bin Attack
Discover what Bin Attacks are, how they expose hash function weaknesses, their impact on fraud and cybersecurity, and learn ways to protect your business and data from these evolving digital threats.
Biometric Authentication
Discover how biometric authentication boosts security and convenience using fingerprints, facial recognition, and more—plus, explore use cases, benefits, privacy concerns, and the latest industry stats.
Biometric Spoofing
Discover what biometric spoofing is, how it threatens security systems, real-world cases, and the latest stats—plus prevention tips to help you stay safe in an evolving digital landscape.
Bitcoin
The most famous and popular cryptocurrency. While it is often thought of as an anonymous payment method, bitcoin (BTC) is actually pseudonymous, which means it is possible to track someone’s payments...
Blacklists & Whitelists
Discover how blacklists and whitelists protect your systems, prevent fraud, and enhance cybersecurity. Learn key differences, challenges, and best practices for secure, efficient access control.
Blockchain Analytics
Discover how blockchain analytics enhances fraud detection, compliance, and market insights—empowering businesses to make smarter, safer decisions in the evolving world of digital assets.
Botnet Fraud
Discover how botnet fraud works, its impact, and ways to protect your business from evolving cyber threats. Learn key stats, real-world examples, and modern solutions for stronger security.
Bounty Scams
Discover how bounty scams trick participants with false reward promises, the tactics scammers use, recent trends, and tips to protect yourself—all in our comprehensive guide to bounty scams.
Breach Fatigue
Discover what breach fatigue is, why it happens, and its impact on individuals and businesses. Learn strategies to stay vigilant and protect yourself in today’s world of frequent data breaches.
Breach Notification Laws
Learn how Breach Notification Laws protect your data, why timely breach alerts matter, and what penalties organizations face for non-compliance. Stay informed and empowered in today’s digital world.
Burn(er) Phone
The term originates from the drug dealing world, and is used to describe inexpensive mobile phones designed for temporary use. It allows fraudsters and criminals to link an account to a disposable...
Business Continuity Planning (BCP)
Learn the essentials of Business Continuity Planning (BCP)—why it matters, key steps, real-world use cases, and how to keep your business resilient during disruptions. Start building your BCP today!
Business Identity Theft
Discover how business identity theft happens, its impact, and how to protect your company from fraud. Learn key prevention tips, real-world examples, and the latest industry statistics in our guide.
Business Logic Fraud
Discover how Business Logic Fraud exploits process loopholes, real-world examples, and strategies to protect your business from hidden threats. Learn prevention tips and industry insights in this guide.
Buy Now, Pay Later (BNPL) Fraud
Discover how Buy Now, Pay Later (BNPL) fraud works, its impact on consumers and businesses, and the latest trends and prevention tips to help you stay protected in the evolving payments landscape.
C
CC
The fraudster term for stolen credit card data. A full CC contains the original cardholder’s name and address, expiration date, and CCV. It becomes a Fullz when other personal data points are added...
CNP (Card-Not-Present) Fraud
Curious about Card-Not-Present (CNP) fraud? Learn what it is, its impact, real-world examples, and the latest prevention tips to keep your online transactions safe from digital threats.
CVV (Card Verification Value)
What is a CVV? The card verification value (CVV), is a three- or four-digit code on the back of a debit or credit card. It is sometimes referred to as a CID, or card identification number. This...
Canadian Proceeds of Crime (AML/CTF Act)
Discover how Canada’s AML/CTF Act combats money laundering and terrorist financing, what it means for businesses, and how to ensure compliance for a safer, more secure financial environment.
Card BIN Attacks
Learn how Card BIN attacks exploit credit card numbers, the risks they pose to businesses and consumers, and discover effective prevention strategies to safeguard against this growing fraud trend.
Card Cloning
Discover how card cloning works, its risks, and the latest prevention tips. Learn how to protect yourself from fraud and stay secure with expert insights and actionable advice.
Card Not Received Fraud
Discover how Card Not Received Fraud happens, why it’s a growing threat, and the latest solutions to keep your finances safe. Learn key prevention tips and industry insights in this quick guide.
Card Skimming
Learn how card skimming works, its impact, and how to protect yourself. Discover the latest prevention strategies and statistics in this essential guide to staying safe from card fraud.
Card-Not-Present Fraud
Card-not-present (CNP) fraud occurs when a payment card is used to make a purchase without the cardholder being physically present. This type of fraud typically takes place in online, phone, or mail transactions...
Carding
What is carding? Carding is the general fraudster term for using stolen credit card data, whether it’s used for direct purchases, or charging prepaid or gift store cards, which fraudsters then...
Cash App Scams
Discover how Cash App scams work, common tactics used by fraudsters, recent statistics, prevention tips, and how to protect yourself from financial loss. Stay safe with our expert insights!
Cash Transaction Monitoring
Discover how cash transaction monitoring keeps your money safe by detecting suspicious activity, ensuring regulatory compliance, and preventing fraud with advanced technology and smart analytics.
Catfishing
A form of social engineering where fraudsters and criminals create fake online identities to lure people into emotional or romantic relationships for personal or financial gain. Online seduction and...
Certified Fraud Examiner
The Certified Fraud Examiner (CFE) is a qualification issued by the Association of Certified Fraud Examiners (ACFE). The ACFE organization is a provider of anti-fraud education and training. CFE...
Chargeback Abuse Analytics
Discover how Chargeback Abuse Analytics empowers businesses to detect and prevent fraudulent chargebacks, streamline dispute management, and protect revenue with advanced data-driven insights.
Chargeback Fraud
Chargeback fraud, sometimes referred to as "friendly fraud," occurs when a consumer disputes a legitimate transaction with their bank or payment provider and requests a chargeback—reversing the payment—claiming the transaction was...
Chargeback Management
Explore the essentials of chargeback management, its importance, key strategies, industry stats, and how AI tools like FraudNet help businesses reduce losses and improve dispute resolution.
Charity Fraud
Learn how to spot and prevent charity fraud. Discover common scams, real impacts, practical tips for safe giving, and ways technology can help protect your donations and support genuine causes.
Click Fraud
What is Click Fraud? Click fraud is a form of marketing fraud that occurs when pay-per-click (PPC) online ads are illegally clicked to increase site revenue or exhaust a company's budget. It is...
Clickjacking
What is Clickjacking? In summary, clickjacking is when a fraudster targets someone to click a link, either to get them to install malware or to try to 'phish' them, a related term that involves...
Clustering Fraudulent Transactions
Discover how clustering algorithms help group and detect fraudulent transactions, revealing hidden patterns and boosting fraud prevention. Learn key techniques and real-world applications in our latest blog!
Get Started Today
Experience how FraudNet can help you reduce fraud, stay compliant, and protect your business and bottom line