Blogs

Read the latest updates from our team of experts
Filter by
Identity
Trust: Hard to earn, easy to lose in the digital era

Trust plays a critical role in the digital economy. Learn how Scam Protect empowers businesses to combat fraud with advanced technology and collaboration to protect consumers from scams.

Identity
The growing threat of first-party fraud and its impact on the payments ecosystem

First-party fraud is surging, costing merchants billions. Learn how to identify and prevent this growing threat to your business.

Identity
AI to prevent data fragmentation

Read our blog to learn about how AI for financial services helps prevent data fragmentation with strategic data orchestration.

Identity
Using data to optimize fraud prevention and customer experience across the payments ecosystem

Discover how Mastercard Identity insights automate risk decisions and enhance identity verification while minimizing the impact on customer experience.

Identity
Four digital identity verification solutions you should know

Learn about four of the most effective digital identity verification solutions that will keep your trusted users’ identities secure.

Identity
What is identity proofing and why does it matter?

Put simply, identity proofing is the process a business undertakes to confirm the identity of a user making an online transaction. But in practice, the process is much more complicated than it sounds.

Identity
Four essential SaaS features you need in fraud detection software

Our current digital world brings benefits and ease to daily life. Yet, with quick access to email, cloud backup and barrier-free work communication comes the dangers of online fraud.

Identity
Building trust: Behavioral biometrics in identity verification

Strengthen user authentication and efficiently identify fraudsters with the revealed role of behavioral biometrics technology.

Identity
Ecommerce fraud trends and statistics merchants need to know in 2024

With dramatic global growth and expansion across ecommerce, fraud continues to surge. Let’s take a look at the trends and statistics you’ll need to know.

Identity
What is synthetic identity fraud and how does synthetic identity theft work?

Every day, billions of users access new digital services—from ordering food on their favorite app to digitally opening a bank account to purchasing a new pair of sneakers online.

Identity
Why you need an alternative to KBA for identity verification in the digital age

KBA is an authentication method that is used to verify an individual’s identity before they can proceed with their login, onboarding or transaction.

Identity
It’s spring scamming season: Take stock of your scam defenses

Financial institutions are also performing spring cleaning in response to a new wave of fraudulent activity and innovative hacking methods — and many have uncovered the need to revisit foundational security practices.

Identity
It’s the most wonderful time of the year – for fraud

How businesses can secure the holiday shopping season through personalized user experiences.

Identity
Live events are back – and fraud has crashed the party

How the event ticketing industry can respond to fraud without disrupting user experience.

Identity
Friendly fraud, and the importance of a personalized user experience

Discover how merchants can reduce friendly fraud and improve user experience. Learn how behavioral biometrics personalize security, prevent chargebacks and build trust with customers.

Identity
3 key takeaways from our consumer and risk trends report

Discover how can businesses improve cybersecurity efforts through understanding the tactics fraudsters use most.

Identity
How can businesses distinguish between good and bad users?

Does effective security have to come at the cost of user experience? Here’s how behavioral biometrics improves both.

Identity
Can you spot and define top digital security threats?

The first step to reducing cybersecurity risks and improving user experiences? Aligning on what fraud looks and acts like.

Identity
Three burning questions about mobile security, answered

Consider these three questions and reach out to our team if you’d like to discuss how to keep your mobile user experience streamlined and secure.

Identity
Device intelligence boils down to a cup of coffee

Tackle gaps in your device intelligence solutions with behavioral technologies — it’s as straightforward as getting a cup of coffee.

Identity
How behavioral biometrics can detect social engineering and malware scams

Human fraud: how behavioral biometrics can stop social engineering and malware scams that traditional fraud tools miss.

Identity
What is application fraud?

Protect yourself from application fraud, a growing threat costing the financial sector millions annually, by implementing early behavior profiling and effective detection strategies.

Identity
What is the digital identity?

As we continue living much of our lives online, we need to close the security gaps in our identity ecosystem.

Identity
Mitigating sophisticated cyber attacks 

It’s getting harder to tell humans and robots apart. Mitigating sophisticated attacks is possible, but requires behavioral defenses.

Identity
SIM Swap Fraud: How this 90s technology has stood the test of time

By imitating your identity, fraudsters can take over your SIM card and access your accounts – before you realize it's happening.

Identity
Passive biometrics help battle SIM swap fraud

Interview with Rosemary O’Neill for nudata Security (in the EU) a Mastercard company, by PYMNTS on fighting sim swap fraud.

Identity
How strategic friction lets brands balance security and convenience

Too often, security precautions add excessive friction, inconveniencing users by forcing them to fill out CAPTCHAs or jump through other hoops just to make a simple purchase.

Identity
Bypassing passwords with man-in-the-middle

Man-in-the-middle is a type of attack used by spy organizations and professional criminals alike to bypass passwords, steal login information, move funds.

Identity
The harsh reality about your password practices

You reuse passwords, add exclamation marks and are confident you won’t be hacked. Improve password hygiene for good passwords.

Identity
What is risk based authentication? Examples and best practices

With Risk Based Authentication, a user’s risk is dynamic and non-stationary: determined by actions, using intelligent interdiction to stop fraud.

Identity
How to fast-track identity authentication without sacrificing security

Customers today expect seamless online user experiences, but the threat of fraud complicates many businesses’ desires to accommodate these preferences.

Identity
Can you do me a favor? – and other gift card fraud tricks

Whether it is hackers using malware to steal almost a million dollars in cash from ATMs, or people taking advantage of images to copy the fingerprints and gain access to accounts, there is seemingly no limit to the creativity and growing sophistication of cybercriminals.

Identity
Online account origination fraud: when new users are bad news

Your online company is getting lots of new online customers, but you don’t understand why fraud is going up. OAO or account creation fraud is probably to blame.