Fraud Glossary

Essential Industry Terms Explained

Explore key financial crime, risk management and compliance terminology with our comprehensive glossary.

Whether you're navigating regulatory compliance, fighting financial crime, or simply enhancing your knowledge of fraud and anti-money laundering (AML) terms, this resource is for you.

#
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z

#

1st Party Fraud

Discover what 1st Party Fraud is, how it impacts businesses and consumers, and explore effective strategies to detect and prevent this rapidly growing type of financial deception.

3DS (3D Secure)

Discover how 3D Secure (3DS) adds an extra layer of protection to online payments, reduces fraud, and builds trust for businesses and shoppers. Learn how it works and why it matters for e-commerce!

3rd Party Fraud

Discover how 3rd Party Fraud threatens individuals and businesses, its warning signs, and top strategies for prevention—plus how technology is helping fight back. Stay informed and protect yourself!

419 Fraud

Discover what 419 Fraud is, how these advance-fee scams work, common warning signs, and expert tips to protect yourself from financial deception in today’s digital world.

A

A/B Testing

Discover how A/B testing helps businesses optimize websites and apps, improve user experience, and prevent fraud with data-driven insights, practical use cases, and the latest industry stats.

ACH Fraud

Discover how ACH fraud happens, its financial impact, real-world examples, and key prevention tips. Learn how to protect yourself and your business from electronic payment threats in this helpful guide.

AI (Artificial Intelligence)

Discover how AI is transforming industries with advanced learning, reasoning, and fraud prevention. Explore key concepts, use cases, recent stats, and FAQs in this beginner-friendly guide!

AI Explainability

Discover why AI explainability matters! Learn how transparent AI builds trust, ensures compliance, and empowers users—plus real-world use cases, stats, and FAQs to help you navigate ethical AI.

AI Model Bias

Curious about AI model bias? Learn what it is, why it matters, real-world examples, and how to tackle it for fairer, more reliable AI. Dive in for key insights and practical solutions!

AI-powered Fraud Detection

Discover how AI-powered fraud detection uses machine learning to spot suspicious activity in real time, reduce false positives, and help businesses stay ahead of evolving fraud threats.

AI-powered Identity Verification

Discover how AI-powered identity verification is transforming security and efficiency across industries—boosting fraud detection, streamlining onboarding, and keeping your data safe in the digital age.

AML (Anti-Money-Laundering)

Learn how Anti-Money Laundering (AML) protects financial systems, what compliance involves, current trends, and how advanced technology like FraudNet helps businesses stay secure and compliant.

API Injection Fraud

Discover how API Injection Fraud threatens data security, the latest attack trends, and practical prevention strategies to help protect your business in an increasingly vulnerable digital landscape.

AVS (Address Verification System)

Discover how Address Verification System (AVS) helps protect online transactions by matching billing addresses, reducing fraud, and ensuring secure payments for merchants and customers.

Account Chaining

Discover how account chaining connects multiple accounts across platforms, streamlining operations, boosting security, and helping businesses detect and prevent fraud with advanced technology.

Account Enumeration Attack

Learn how Account Enumeration Attacks work, why they're a threat, and discover key strategies to protect your business from cybercriminals targeting your login systems. Stay secure with expert tips!

Account Opening Fraud

Discover how fraudsters open accounts using stolen or fake identities, the risks involved, and key strategies to detect and prevent account opening fraud in today’s digital financial landscape.

Account Takeover (ATO)

Learn how Account Takeover (ATO) fraud works, its impact, and ways to protect your accounts. Explore real-world examples, prevention tips, and the latest trends in online security.

Account Takeover Fraud (ATO)

Discover how Account Takeover Fraud (ATO) threatens individuals and businesses, its latest trends, and practical steps to protect your online accounts in this comprehensive, easy-to-read guide.

Account Velocity Monitoring

Discover how Account Velocity Monitoring helps detect fraud and secure your accounts by tracking unusual transaction patterns, ensuring both safety and trust in your financial activities.

Acquirer (Acquiring Bank)

Discover how acquirers (acquiring banks) process card payments for merchants, ensure secure transactions, manage risks, and leverage technology to prevent fraud and streamline payment operations.

Active Authentication

Discover how Active Authentication uses continuous behavioral biometrics to boost security, prevent fraud, and protect user privacy—making authentication smarter and safer for businesses and users alike.

Ad Hoc Fraud Reporting

Discover how Ad Hoc Fraud Reporting enables flexible, real-time detection of suspicious activities, helping organizations quickly respond to evolving fraud threats with customized data insights.

Address Manipulation Fraud

Discover how fraudsters manipulate addresses to intercept goods, mislead billing, and commit identity theft—and learn key strategies to protect your business and personal data from these schemes.

Advance-Fee Fraud

Curious about advance-fee fraud? Discover how these scams work, their impact, real-world examples, and tips to protect yourself from financial loss in our latest guide. Stay informed and stay safe!

Adversarial AI

Discover how adversarial AI manipulates machine learning models, its real-world risks, and the strategies businesses can use to detect, prevent, and defend against these sophisticated cyber threats.

Adverse Media Screening

Discover how Adverse Media Screening helps businesses manage risk, ensure compliance, and protect their reputation by identifying negative news about clients and partners. Learn methods, challenges, and trends.

Affiliate Fraud

Discover how affiliate fraud threatens brands, common scam tactics, recent statistics, and effective solutions to protect your business and maximize ROI. Learn how to safeguard your affiliate programs today!

Algorithmic Trading Fraud

Discover how algorithmic trading fraud works, its impact on markets, and how advanced AI solutions help detect and prevent manipulative practices to ensure fair, secure trading for all participants.

Alternative Credit Scoring Fraud

Discover how fraudsters exploit non-traditional credit data, the risks to financial institutions, and key strategies to prevent alternative credit scoring fraud in today’s evolving digital lending landscape.

Alternative Data

Discover how alternative data—like social media, geolocation, and web traffic—offers deeper insights, boosts fraud prevention, and enhances decision-making across industries. Explore the benefits and challenges!

Anomaly Detection

Discover how anomaly detection uses AI and machine learning to spot unusual patterns, boost security, and prevent fraud in finance and e-commerce. Learn its importance, uses, and future trends.

Anonymous Proxy Fraud

Discover how fraudsters use anonymous proxies to hide their identity, bypass security, and commit online fraud. Learn risks, detection methods, and strategies to protect your business from proxy-based threats.

Anti-Money Laundering Directive

Discover how the EU’s Anti-Money Laundering Directive fights financial crime, its impact across industries, key stats, and how businesses can ensure compliance with cutting-edge solutions.

Application Fraud

Application fraud occurs when a person provides false, stolen, or manipulated information in a formal application process to obtain products, services, or credit. Commonly seen in industries such as financial services, telecommunications...

Application Layer Attacks

Discover how application layer attacks target software vulnerabilities, threaten user data, and what organizations can do to defend against these evolving cyber risks in today’s digital world.

Application Spoofing

Discover how application spoofing works, the risks it poses to users, key real-world examples, and effective strategies to protect your data from fraudulent apps in this essential security guide.

Arbers

Discover how arbers use technology and math to profit from price differences in markets, the risks involved, and how businesses can detect and prevent arbitrage with advanced tools.

Asia/Pacific Group on Money Laundering (APG) Mutual Evaluations

Discover how APG Mutual Evaluations help Asia-Pacific countries strengthen anti-money laundering efforts, ensure compliance, and enhance regional financial security. Learn key stats and practical uses inside!

Australian AML/CTF Act

Discover how Australia’s AML/CTF Act protects the financial system from money laundering and terrorism financing, key compliance stats, use cases, and how smart technology can help businesses stay compliant.

Authorization Fraud

Discover how authorization fraud happens, its impact, and how to protect your business and personal accounts from unauthorized access. Stay informed with key stats, real-world examples, and expert tips.

Authorized Push Payment Fraud

Discover how Authorized Push Payment (APP) fraud works, its impact, real-world examples, and practical tips to protect yourself from this growing online scam. Stay informed and secure your finances!

Automated Clearing House (ACH) Risk

Discover the key risks in Automated Clearing House (ACH) payments—credit, fraud, and operational—and explore strategies to enhance security, ensure compliance, and protect your transactions.

Automated Decisioning

Discover how automated decisioning uses AI and data to boost accuracy, efficiency, and fraud detection—transforming business processes and empowering smarter, faster decisions across industries.

Autonomous Risk Decisioning

Discover how Autonomous Risk Decisioning uses AI to automate risk management, enhance decision speed and accuracy, and transform industries like finance, e-commerce, and more.

B

B2B (Business-to-Business)

Discover what B2B (Business-to-Business) means, why it’s essential, key trends for 2025, and how advanced solutions like FraudNet empower businesses to thrive securely in the evolving digital landscape.

B2B Payment Fraud

Discover how B2B payment fraud impacts businesses, common tactics used by fraudsters, and practical strategies to protect your company from financial threats in this essential guide.

B2C (Business-to-Consumer)

Discover how B2C businesses connect directly with consumers, leverage technology, and tackle challenges in today’s digital marketplace. Explore use cases, key stats, and tips for success in B2C!

BIN (Bank Identification Number)

Discover how Bank Identification Numbers (BINs) enhance payment security, streamline transactions, and help prevent fraud in today’s digital banking world. Learn more about their critical role!

Back Door

Discover what back doors are, how they threaten digital security, real-world risks, and ways to protect your systems. Learn practical tips and recent trends to keep your organization safe from hidden threats.

Backdoor Attacks

Discover how backdoor attacks threaten machine learning and online systems, explore real-world cases, recent stats, and learn defense strategies to keep your business secure in today’s digital landscape.

Baiting

Discover how baiting scams use enticing offers to trick individuals and businesses, the psychology behind them, real-world examples, and tips to stay protected from these deceptive cyber threats.

Balance Transfer Fraud

Learn how balance transfer fraud works, its impact, prevention tips, and how financial institutions and AI tools like FraudNet can help protect you from growing credit card scams.

Bank Account Verification APIs

Discover how Bank Account Verification APIs boost financial security, streamline verification, and reduce fraud in fintech and banking—enhancing trust and efficiency for modern digital transactions.

Bank Identification Number (BIN Number)

Discover how Bank Identification Numbers (BINs) help secure card transactions, prevent fraud, and enable global payments. Learn their role, use cases, and future trends in financial security.

Bank Secrecy Act (BSA)

Discover how the Bank Secrecy Act (BSA) combats money laundering and fraud, and learn how financial institutions comply and protect the integrity of the financial system.

Bank for International Settlements (BIS) Guidelines

Discover how Bank for International Settlements (BIS) Guidelines strengthen global banking stability, manage risk, and shape safer financial systems for banks, businesses, and individuals worldwide.

Banking-as-a-Service (BaaS)

Discover how Banking-as-a-Service (BaaS) is transforming finance—enabling businesses to offer banking services, boosting innovation, and expanding access for consumers and startups alike.

Banknote Counterfeit Detection

Discover how modern technology and advanced tools are making banknote counterfeit detection more accurate, helping businesses and individuals stay protected from fake currency. Learn more inside!

Bankruptcy Fraud

Explore what bankruptcy fraud is, its common forms, legal consequences, and modern prevention strategies. Learn how technology and transparency can help protect against financial misconduct.

Basel III Framework

Discover how the Basel III Framework strengthens global banking with enhanced capital, liquidity, and risk management standards to ensure financial stability and resilience. Learn more in our latest article!

Behavioral Analytics

Discover how Behavioral Analytics helps businesses understand user actions, predict trends, prevent fraud, and optimize strategies for a better customer experience and smarter decision-making.

Behavioral Anomaly Detection

Discover how Behavioral Anomaly Detection uses AI and real-time monitoring to spot unusual behavior, helping organizations prevent fraud, enhance security, and stay ahead of emerging threats.

Beneficial Ownership Identification

Discover the importance of Beneficial Ownership Identification, its role in transparency, compliance, and fraud prevention, plus how technology streamlines the process for businesses and regulators.

Bin Attack

Discover what Bin Attacks are, how they expose hash function weaknesses, their impact on fraud and cybersecurity, and learn ways to protect your business and data from these evolving digital threats.

Biometric Authentication

Discover how biometric authentication boosts security and convenience using fingerprints, facial recognition, and more—plus, explore use cases, benefits, privacy concerns, and the latest industry stats.

Biometric Spoofing

Discover what biometric spoofing is, how it threatens security systems, real-world cases, and the latest stats—plus prevention tips to help you stay safe in an evolving digital landscape.

Bitcoin

Discover what Bitcoin is, how it works, its key uses, risks, and future outlook. Explore the latest stats and compliance tips to navigate the world of decentralized digital currency confidently.

Blacklists & Whitelists

Discover how blacklists and whitelists protect your systems, prevent fraud, and enhance cybersecurity. Learn key differences, challenges, and best practices for secure, efficient access control.

Blockchain Analytics

Discover how blockchain analytics enhances fraud detection, compliance, and market insights—empowering businesses to make smarter, safer decisions in the evolving world of digital assets.

Botnet Fraud

Discover how botnet fraud works, its impact, and ways to protect your business from evolving cyber threats. Learn key stats, real-world examples, and modern solutions for stronger security.

Bounty Scams

Discover how bounty scams trick participants with false reward promises, the tactics scammers use, recent trends, and tips to protect yourself—all in our comprehensive guide to bounty scams.

Breach Fatigue

Discover what breach fatigue is, why it happens, and its impact on individuals and businesses. Learn strategies to stay vigilant and protect yourself in today’s world of frequent data breaches.

Breach Notification Laws

Learn how Breach Notification Laws protect your data, why timely breach alerts matter, and what penalties organizations face for non-compliance. Stay informed and empowered in today’s digital world.

Burn(er) Phone

Discover what burner phones are, why people use them for privacy, and how they impact security and compliance. Learn key use cases, trends, and tips for staying safe in the digital world.

Business Continuity Planning (BCP)

Learn the essentials of Business Continuity Planning (BCP)—why it matters, key steps, real-world use cases, and how to keep your business resilient during disruptions. Start building your BCP today!

Business Email Compromise

Discover how Business Email Compromise (BEC) threatens companies, typical attack tactics, real-world impacts, and key prevention tips to keep your business secure from costly email fraud.

Business Identity Theft

Discover how business identity theft happens, its impact, and how to protect your company from fraud. Learn key prevention tips, real-world examples, and the latest industry statistics in our guide.

Business Logic Fraud

Discover how Business Logic Fraud exploits process loopholes, real-world examples, and strategies to protect your business from hidden threats. Learn prevention tips and industry insights in this guide.

Buy Now, Pay Later (BNPL) Fraud

Discover how Buy Now, Pay Later (BNPL) fraud works, its impact on consumers and businesses, and the latest trends and prevention tips to help you stay protected in the evolving payments landscape.

C

CC

Discover the many meanings of CC—from email and measurements to fraud prevention and education. Learn how CC impacts communication, science, security, and community colleges in this comprehensive guide!

CNP (Card-Not-Present) Fraud

Curious about Card-Not-Present (CNP) fraud? Learn what it is, its impact, real-world examples, and the latest prevention tips to keep your online transactions safe from digital threats.

CVV (Card Verification Value)

Learn how CVV codes protect your online transactions, their role in fraud prevention, and key trends in payment security. Discover tips and FAQs to keep your card and personal info safe!

Canadian Proceeds of Crime (AML/CTF Act)

Discover how Canada’s AML/CTF Act combats money laundering and terrorist financing, what it means for businesses, and how to ensure compliance for a safer, more secure financial environment.

Card BIN Attacks

Learn how Card BIN attacks exploit credit card numbers, the risks they pose to businesses and consumers, and discover effective prevention strategies to safeguard against this growing fraud trend.

Card Cloning

Discover how card cloning works, its risks, and the latest prevention tips. Learn how to protect yourself from fraud and stay secure with expert insights and actionable advice.

Card Not Received Fraud

Discover how Card Not Received Fraud happens, why it’s a growing threat, and the latest solutions to keep your finances safe. Learn key prevention tips and industry insights in this quick guide.

Card Skimming

Learn how card skimming works, its impact, and how to protect yourself. Discover the latest prevention strategies and statistics in this essential guide to staying safe from card fraud.

Card-Not-Present Fraud

Card-not-present (CNP) fraud occurs when a payment card is used to make a purchase without the cardholder being physically present. This type of fraud typically takes place in online, phone, or mail transactions...

Carding

Discover how carding fraud works, its impact on businesses and consumers, and learn practical tips for staying safe from credit card scams in our comprehensive, easy-to-understand guide.

Cash App Scams

Discover how Cash App scams work, common tactics used by fraudsters, recent statistics, prevention tips, and how to protect yourself from financial loss. Stay safe with our expert insights!

Cash Transaction Monitoring

Discover how cash transaction monitoring keeps your money safe by detecting suspicious activity, ensuring regulatory compliance, and preventing fraud with advanced technology and smart analytics.

Catfishing

Catfishing is online deception where fake identities are used to manipulate or scam people. Learn the signs, motivations, and how to protect yourself in this essential guide to catfishing awareness.

Central Bank Digital Currency Fraud

Explore the risks and trends in Central Bank Digital Currency (CBDC) fraud, including common scams, vulnerabilities, and tips to protect yourself in the evolving digital currency landscape.

Certified Fraud Examiner

Discover what a Certified Fraud Examiner (CFE) does, key skills, real-world use cases, and how CFEs help organizations prevent, detect, and investigate fraud in today’s fast-changing business world.

Chargeback Abuse Analytics

Discover how Chargeback Abuse Analytics empowers businesses to detect and prevent fraudulent chargebacks, streamline dispute management, and protect revenue with advanced data-driven insights.

Get Started Today

Experience how FraudNet can help you reduce fraud, stay compliant, and protect your business and bottom line