Fraud Glossary

Essential Industry Terms Explained

Explore key financial crime, risk management and compliance terminology with our comprehensive glossary.

Whether you're navigating regulatory compliance, fighting financial crime, or simply enhancing your knowledge of fraud and anti-money laundering (AML) terms, this resource is for you.

#
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z

#

1st Party Fraud

First-party fraud involves real customers abusing credit or services. See how to detect it early and cut financial losses fast.

3DS (3D Secure)

3D Secure adds protection to online payments. Learn how it reduces fraud and builds trust for businesses and shoppers.

3rd Party Fraud

Learn how 3rd Party Fraud targets victims, warning signs to watch, and top tech-driven strategies to stay secure and protected.

419 Fraud

Learn how 419 advance-fee scams work, key warning signs, and expert tips to protect yourself from financial deception online.

A

ACH Fraud

ACH fraud targets electronic transfers with account manipulation. Discover protection measures to keep payments secure.

AI (Artificial Intelligence)

Artificial Intelligence is reshaping everything from finance to fraud defense. Explore real use cases and beginner-friendly insights.

AI Explainability

AI explainability makes algorithms transparent and accountable. Learn how clarity builds trust and supports ethical decision-making.

AI Model Bias

AI model bias produces unfair or inaccurate outcomes. Reduce it to build more ethical, reliable systems users can trust.

AI-powered Fraud Detection

AI-powered fraud tools flag threats in real time to cut losses. Explore how machine learning keeps businesses ahead of scams.

AI-powered Identity Verification

AI identity verification automates secure onboarding and checks. Discover how it cuts fraud while speeding business growth.

AML (Anti-Money-Laundering)

Anti-Money Laundering rules fight criminal financial flows. Learn how high-tech tools help firms stay secure and compliant.

API Injection Fraud

API injection fraud exploits security gaps in connected systems. Learn how to spot threats and lock down your business data.

AVS (Address Verification System)

AVS checks billing addresses to secure online payments. Learn how it works to reduce fraud and protect merchants and buyers.

Account Chaining

Account chaining links multiple user IDs into broader networks. Learn how this helps detect fraud while improving insights.

Account Enumeration Attack

Account Enumeration Attacks test usernames to breach logins. Use layered defenses to stop this growing cyber threat.

Account Opening Fraud

Account opening fraud creates new accounts with stolen IDs. Learn warning signs and how to stop it before damage is done.

Account Takeover (ATO)

ATO fraud hijacks user accounts for financial gain. Explore examples and preventative steps to protect all digital access points.

Account Takeover Fraud (ATO)

Account Takeover Fraud steals user access to exploit funds. Learn key tactics and vital tips to secure your online accounts.

Account Velocity Monitoring

Account Velocity Monitoring flags rapid transaction behavior. Learn how banks use it to halt suspicious account activity.

Acquirer (Acquiring Bank)

Acquirers manage card payments for merchants, reduce risk, and use tech to secure transactions and streamline operations.

Active Authentication

Active Authentication analyzes user behavior in real time to block fraud, protect privacy, and make logins more secure.

Ad Hoc Fraud Reporting

Ad Hoc Fraud Reporting delivers flexible, real-time alerts. Learn how custom insights help organizations react fast to new threats.

Address Manipulation Fraud

Address manipulation targets deliveries and billing to commit theft. Discover how to secure your systems from this rising fraud trend.

Advance-Fee Fraud

Advance-fee scams promise rewards but steal money upfront. Spot common red flags and prevent losses before they happen.

Adversarial AI

Adversarial AI tricks machine learning models into mistakes. Discover defense strategies that protect smart systems.

Adverse Media Screening

Adverse Media Screening checks negative news on clients or partners to protect your brand and ensure regulatory compliance.

Affiliate Fraud

Affiliate fraud siphons revenue with fake traffic and scams. Spot common tactics and protect your program’s ROI from abuse.

Algorithmic Trading Fraud

Algorithmic trading fraud manipulates financial markets at high speed. AI tools now help catch these hidden schemes early.

Alternative Credit Scoring Fraud

Explore how alternative credit data can be abused by fraudsters. Financial firms use new strategies to safeguard lending systems.

Alternative Data

Alternative data improves decisions using web, social, and geo clues. Learn how it boosts fraud prevention beyond credit scores.

Anomaly Detection

Anomaly detection uses AI to flag unusual patterns fast. Learn how it keeps finance and e-commerce safer from fraud.

Anonymous Proxy Fraud

Anonymous proxy fraud masks real users to bypass controls. Explore detection methods to protect against hidden attacks.

Anti-Money Laundering Directive

The AML Directive strengthens Europe’s fight against dirty money. Learn its impact and how businesses can remain compliant.

Application Fraud

Application fraud uses false data to get credit or services. Learn where it happens most and how to detect and prevent it.

Application Layer Attacks

Application layer attacks exploit software flaws to steal data. Discover how strong defenses block these cyber threats.

Application Spoofing

Application spoofing disguises fake apps as real ones. Learn to spot them and protect users from stealthy data theft.

Arbers

Discover how arbers profit from pricing gaps in betting, crypto, and e-commerce—and how tech helps manage arbitrage risks.

Asia/Pacific Group on Money Laundering (APG) Mutual Evaluations

Discover how APG Evaluations strengthen AML systems across Asia-Pacific. Learn key insights that help enhance financial security.

Australian AML/CTF Act

Australia’s AML/CTF Act targets money laundering in finance. Learn how smart tools help firms meet today’s compliance demands.

Authorization Fraud

Authorization fraud gives criminals access to secure accounts. Learn how to protect both business systems and personal logins.

Authorized Push Payment Fraud

Authorized Push Payment fraud tricks victims into sending money willingly. Discover real-world risks and smarter protection tactics.

Automated Clearing House (ACH) Risk

ACH payments carry credit, operational, and fraud risks. Explore methods to secure transfers and improve compliance.

Automated Decisioning

Automated decisioning uses AI for instant, accurate risk calls. See how it cuts fraud and speeds smarter business outcomes.

Autonomous Risk Decisioning

Autonomous risk decisioning uses AI to automate complex fraud checks and speed safe decision-making across industries.

B

B2B Payment Fraud

Discover how B2B payment fraud threatens growing firms. Learn practical defenses to protect your cash flow and reputation.

B2C (Business-to-Consumer)

B2C companies sell directly to consumers in digital markets. Learn success tips and fraud-fighting tactics used today.

BIN (Bank Identification Number)

BINs protect digital payments by identifying cards and reducing fraud. See how they power secure, seamless transactions.

Back Door

Back-door hacks quietly bypass normal defenses. Explore risks to your systems and practical steps to block hidden intrusions.

Backdoor Attacks

Backdoor attacks corrupt systems or AI models from inside. Explore defenses to guard against these hidden threats.

Baiting

Baiting uses tempting offers to spread malware or steal data. Learn how to recognize scams and protect your organization.

Balance Transfer Fraud

Balance transfer fraud misuses credit offers to steal funds. Learn how AI and banks detect and prevent this growing scam.

Bank Account Verification APIs

Bank Account Verification APIs improve trust in fintech payments. Learn how they streamline onboarding and block fraud.

Bank Identification Number (BIN Number)

BINs secure global card transactions—discover how they prevent fraud, enable payments, and what trends shape future card security.

Bank Secrecy Act (BSA)

The Bank Secrecy Act helps detect money laundering across finance. Learn how institutions comply and stay safer from fraud.

Bank for International Settlements (BIS) Guidelines

BIS guidelines promote stability across international banking systems. Discover how they reduce risk and support long-term trust.

Banking-as-a-Service (BaaS)

Banking-as-a-Service lets brands embed financial tools to drive innovation, expand access, and reshape modern banking.

Banknote Counterfeit Detection

Modern banknote detection uses AI to identify fake currency fast. Explore how it protects businesses and consumers alike.

Bankruptcy Fraud

Bankruptcy fraud hides assets or debts illegally. Learn common schemes, penalties, and how tech helps stop financial abuse.

Basel III Framework

Basel III strengthens banks with tougher liquidity and risk rules. Explore how it builds global financial stability and trust.

Behavioral Analytics

Behavioral analytics predicts what users will do next. Discover how this insight stops fraud and powers smarter decisions.

Behavioral Anomaly Detection

Behavioral Anomaly Detection spots unusual actions in real time. Explore how AI keeps security ahead of emerging threats.

Beneficial Ownership Identification

Beneficial ownership checks expose who truly controls a company. This transparency helps regulators and businesses stop abuse.

Bin Attack

Bin attacks exploit hashing weaknesses to steal card data. Learn how they work and ways to protect your business from them.

Biometric Authentication

Biometric authentication uses traits like fingerprints or faces to verify identity. See how it balances security, convenience, and privacy concerns.

Biometric Spoofing

Biometric spoofing uses fake traits to bypass security checks. Learn how to block these attacks with modern detection methods.

Blacklists & Whitelists

Blacklists and whitelists control who can access your systems. Discover how both tools work together to block cyber threats.

Blockchain Analytics

Blockchain analytics uncovers suspicious activity in digital assets. Gain visibility that drives safer, smarter decisions.

Botnet Fraud

Botnet fraud hijacks devices to run massive automated attacks. Explore how to defend systems against these cyber assaults.

Bounty Scams

Bounty scams lure victims with fake reward offers. Explore tactics and protect yourself from these deceptive schemes.

Breach Fatigue

Breach fatigue reduces awareness amid constant data leaks. Learn how to stay alert and shield yourself from major losses.

Breach Notification Laws

Breach Notification Laws require fast alerts after data leaks. Discover how timely responses protect reputations and avoid fines.

Business Continuity Planning (BCP)

Business Continuity Planning prepares firms for unexpected crises. Explore key steps for resilient operations during disruption.

Business Email Compromise

BEC scams impersonate executives via email to steal funds. Learn tactics and tips to prevent this costly business threat.

Business Identity Theft

Business identity theft steals company credentials for crime. Explore prevention tips and protect your brand from major losses.

Business Logic Fraud

Business logic fraud exploits hidden flaws in everyday processes. Find out how to detect loopholes and safeguard your workflows.

Buy Now, Pay Later (BNPL) Fraud

BNPL fraud abuses flexible payment services. Prevent losses with better identity checks and smarter transaction monitoring.

C

CC

Explore the many meanings of CC—from email and science to fraud prevention and education—in this quick, informative guide.

CNP (Card-Not-Present) Fraud

CNP fraud strikes online transactions without physical cards. Learn top defenses to keep e-commerce payments secure.

CVV (Card Verification Value)

CVV codes secure online payments—learn how they reduce fraud, key security trends, and tips to keep your card and data protected.

Canadian Proceeds of Crime (AML/CTF Act)

Canada’s AML/CTF Act targets dirty money in finance. Learn key business requirements for safer regulatory compliance.

Card BIN Attacks

Card BIN attacks test stolen card numbers for active use. Discover detection strategies that keep merchants and shoppers safe.

Card Cloning

Card cloning copies your card data for fraud. Find out how it happens, the risks involved, and what you can do to stay protected.

Card Not Received Fraud

Card Not Received Fraud steals mailed cards before delivery. Learn tips to keep your finances safe from this growing threat.

Card Skimming

Learn how card skimming steals your payment data. Discover modern strategies to stay safe from this fast-growing fraud threat.

Card-Not-Present Fraud

CNP fraud strikes online and remote payments without a card present. Learn how security tools protect these vulnerable transactions.

Carding

Carding fraud uses stolen card data for illegal purchases—discover how it works and get tips to stay safe from these scams.

Cash App Scams

Cash App scams use social tricks and fake offers. Learn common tactics, key stats, and tips to stay safe from financial loss.

Cash Transaction Monitoring

Cash monitoring detects suspicious deposits and withdrawals. Explore how it helps stop money laundering and fraud early.

Catfishing

Catfishing scams use fake identities to deceive victims online. Learn the signs, motivations, and how to stay protected.

Central Bank Digital Currency Fraud

CBDC fraud targets emerging digital currencies from banks. Explore trends, scams, and tips to stay safe in this new market.

Certified Fraud Examiner

Certified Fraud Examiners detect and investigate fraud. Learn their skills, use cases, and how they protect organizations.

Chargeback Abuse Analytics

Chargeback Abuse Analytics flags repeat offenders and fake disputes. Discover how data helps businesses defend revenue.

Chargeback Fraud

Chargeback fraud, sometimes referred to as "friendly fraud," occurs when a consumer disputes a legitimate transaction with their bank or payment provider and requests a chargeback—reversing the payment—claiming the transaction was...

Chargeback Management

Chargeback management recovers revenue lost to disputed payments. Smart tools help reduce fraud and streamline resolutions.

Charity Fraud

Charity fraud diverts donations away from real causes. Spot common scams and give safely with help from modern tech tools.

Click Fraud

Click fraud drains ad budgets with fake clicks. Uncover detection strategies and tools that protect your brand and ROI.

Get Started Today

Experience how FraudNet can help you reduce fraud, stay compliant, and protect your business and bottom line