Chris LiminFraudLabs Pro Fraud PreventionWhy Monitoring Clients Through Watchlist is EssentialWe all agree that combating fraud is a challenging task. The key is to identify fraudsters while minimizing inconvenience for legitimate…Sep 13Sep 13
Chris LimUnderstanding Different Types of ProxyIn this article, I will share my knowledge about the common types of proxies that I’m aware of, hoping to provide you with a general…Jul 11Jul 11
Chris LiminFraudLabs Pro Fraud PreventionUnderstanding and Combating Friendly FraudUnderstanding and Combating Friendly FraudJul 5Jul 5
Chris LiminShort. Sweet. Valuable.What is Disposable Phone Number?A disposable phone number is a temporary, typically a public and shared number, that anyone could use this for a short period of time. This…Jun 26Jun 26
Chris LiminLong. Sweet. Valuable.What is Content Fraud?Content fraud refers to the creation or sharing of false or misleading information online with the intent to deceive people. This can…Jun 18Jun 18
Chris LiminFraudLabs Pro Fraud PreventionBeware of Backdoor BotThe FBI has identified six VPNs associated with the “911 S5 Bot” services. A public service announcement has been published to educate…Jun 7Jun 7
Chris LiminFraudLabs Pro Fraud PreventionHow to stop email aliasing?Email address aliasing is a technique where users create multiple email addresses by adding characters or strings to the base email address…May 15May 15
Chris LiminFraudLabs Pro Fraud PreventionUnderstanding IP Usage Type and Its Role in Fraud PreventionIn the current era where digital transactions and interactions are becoming increasingly commonplace, the implementation of robust and…May 10May 10
Chris LiminFraudLabs Pro Fraud PreventionA Guide to Different Types of Coupon CodesIn the continuous pursuit for savings, coupon codes serve as an invaluable tool. In today’s digital shopping era, these codes offer a way…Apr 24Apr 24
Chris Lim什么是欺诈三角 (Fraud Triangle)在1970年代,犯罪学家Donald R. Cressey发布了一个名为“欺诈三角”的模型。这个模型专注于他对被捕获的挪用公款者的研究。他的模型由三个元素组成:机会、压力和合理化。Apr 19Apr 19