Fraud Glossary

Essential Industry Terms Explained

Explore key financial crime, risk management and compliance terminology with our comprehensive glossary.

3D isometric cube composed of smaller blue, cyan, and purple cubes with additional floating cubes around it.

Whether you're navigating regulatory compliance, fighting financial crime, or simply enhancing your knowledge of fraud and anti-money laundering (AML) terms, this resource is for you.

#
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z

Technology Theft

Technology theft steals innovation and sensitive IP. Discover how businesses protect assets using secure systems and policies.

Tech Support Scams

Tech support scams trick users with fake alerts and phone calls. Know the signs and keep your data safe from evolving threats.

Telecommunication Fraud

Telecom fraud steals or abuses phone services for profit. Explore how criminals exploit systems and how businesses can fight back.

test slug 2

A test-slug labels test content during development. Use it to improve tracking, communication, and fraud-safe testing.

Theft Of Assets

Asset theft drains business value through misused property and cash. Learn how controls help prevent costly misconduct.

Theft Of Checks

Check theft lets criminals steal funds using altered or stolen checks. Learn how to protect your accounts and mail.

Third-party Data Breaches

Third-party data breaches happen when vendors are hacked. Learn smart steps to protect your systems and customer data.

Third-party Fraud

Third-party fraud is on the rise across digital ecosystems. Strengthen defenses now to block outside actors from exploiting you.

Threat Intelligence Sharing

Threat intelligence sharing gives companies early cyber warnings. Discover how collaboration improves defense against modern attacks.

Timecard Tampering

Timecard tampering inflates hours and costs. Use modern tools to detect manipulation and secure payroll accuracy.

Token

Tokens replace sensitive data with secure digital units. Learn their growing role in payments, security, and identity.

Tokenization

Tokenization replaces real data with secure placeholders. Explore how it builds trust and improves compliance in transactions.

Tokenization Security

Tokenization replaces real data with secure tokens for safety. Explore how it cuts fraud risk across digital payments.

Tor

Tor provides anonymous browsing for privacy with risks. Use it safely with key tips, facts, and real-world examples.

Trade-based Money Laundering Schemes

Trade-based money laundering routes dirty cash through fake invoices. Learn how modern tools uncover risks in global trade.

Trade Finance Fraud

Trade finance fraud exploits global funding for illicit gains. Learn how institutions spot risk and keep commerce safe.

Transaction Authentication Number (TAN)

A TAN is a one-time code used in online transactions. Learn how it adds an extra layer of security beyond standard passwords.

Transaction Cloaking

Transaction cloaking hides payment details for privacy. Learn how tools detect misuse while supporting secure digital spending.

Transaction Fingerprinting

Transaction Fingerprinting tags behaviors to detect anomalies fast. Explore how metadata improves fraud prevention across sectors.

Transaction Laundering

Transaction laundering hides illegal sales behind legit sites. Learn how compliance tools uncover these hidden schemes.

Transaction Monitoring

Transaction monitoring analyzes activity in real time to flag risk. Explore tools, challenges, and future trends in fraud detection.

Transaction Reversal Fraud

Transaction reversal fraud exploits refunds and chargebacks. Learn how it works and get tips to protect your business revenue.

Transaction Screening

Curious about transaction screening? This guide explains how payments are checked against sanctions, watchlists, and risk rules to stop fraud, support AML compliance, and keep transactions safer now.!

Triangulation Fraud

Triangulation fraud happens when scammers use stolen data to fulfill marketplace orders, leaving customers with illegitimate goods.

Triangulation Schemes

Triangulation schemes break surfaces into geometric shapes. Learn how this method also helps expose hidden fraud patterns.

Trojan Horse Malware

Trojan malware hides in legitimate programs to steal access. Learn how to block infection and safeguard your business data.

True Negative

A True Negative means a correct rejection in fraud detection. Learn how it improves models and lowers false alarms.

True Positive

True Positives are correct positive results in data analysis. Learn why they matter and how they improve fraud models today.

Trusted Third Party

Trusted Third Parties build digital trust, support compliance, and reduce fraud by securing interactions between users.

Two-Factor Authentication (2FA)

Two-factor authentication adds layered checks before access. Explore how this method blocks attackers from sensitive systems.

Two Tier Affiliate Program

Two-tier affiliate programs reward both direct and indirect referrals for higher earnings. Explore how to grow commissions while staying fraud-resistant.

U

U2F (Universal 2 Factor)

U2F uses physical keys for stronger logins and identity proof. Learn how it works and why businesses rely on it for security.

UK Bribery Act

The UK Bribery Act sets strict global standards against corruption. Learn key offences, compliance tips, and business impacts.

Ultimate Beneficial Ownership

Universal Beneficial Ownership reveals who truly controls an entity. Learn how transparency enhances compliance and security.

Unauthorized Disbursements

Unauthorized disbursements misdirect funds with fake payments. See how to spot red flags and improve financial controls.

Unauthorized Use Of Assets

Unauthorized asset use exposes firms to theft and lawsuits. Learn practical steps to prevent losses and cyber misuse.

Unauthorized Withdrawals

Unauthorized withdrawals can silently drain your accounts. Explore why they happen, how to stop them, and where tech can help.

Underdelivery

Underdelivery leads to missed expectations and lost revenue. Understand what causes it and how smart tools keep operations safe.

Unique Identity

Unique identity improves data accuracy and fraud defense. Learn why it matters and how it enables safer digital interactions.

United Nations Convention against Corruption

UNCAC sets global standards to prevent corruption and recover assets. Explore how nations use it to strengthen transparency.

Unstructured Data Fraud

Fraudsters exploit unstructured data like emails and posts. Learn how AI tools analyze messy info to spot hidden threats.

Unsupervised Machine Learning

Unsupervised learning finds fraud patterns without labeled data. Use it to uncover risks where traditional systems fall short.

Unusual Activity Reporting (UAR)

Unusual Activity Reports (UARs) help detect fraud, boost compliance, and strengthen security—see how they work with real examples.

Url Spoofing

URL spoofing mimics real sites to steal data. Spot fake links fast and protect your business from phishing-based attacks.

USA PATRIOT Act

The USA PATRIOT Act reshaped compliance and data sharing. Learn how its rules impact financial systems and personal privacy today.

User Behavior Anomaly Detection

User Behavior Anomaly Detection flags actions that don’t match user patterns. Learn how AI improves security without hurting user experience.

Utility Fraud

Utility fraud targets businesses with fake invoices and billing scams—learn how it works and how to spot and prevent these growing threats.

V

Validation

Data validation prevents fraud by confirming accuracy at the source. Learn how it protects compliance and reporting integrity.

Velocity Check

Curious about velocity checks? This friendly guide shows how tracking activity over time can uncover fraud, cut false alarms, and help teams make faster, smarter security decisions across channels.

Velocity Filters

Velocity filters spot rapid data changes to flag fraud and improve performance. Learn how they work and why businesses use them.

Verified By Visa (VBV)

Explore how Verified by Visa boosts online payment security, reduces fraud, aids shoppers and retailers, and key challenges it faces.

Virtual Card Fraud

Virtual card fraud targets online one-time card numbers. Learn how to protect digital payments from evolving cyber tactics.

Virtual Currency Compliance

Virtual currency compliance blends AML, KYC, and evolving rules. Learn how businesses stay secure amid growing digital-asset risks.

Vishing

Vishing attacks use phone calls to steal private information. Protect yourself with simple steps and real-time vigilance.

Voice Authorization

Voice authorization adds secure, convenient verification to payments. Learn its benefits, use cases, and future potential.

Voice Biometric Fraud

Voice biometric fraud mimics speech to bypass authentication. Discover detection tools that block synthetic voice attacks.

Voice Over Ip

VoIP transforms modern communications with cost savings and scale. Learn how it also enhances fraud prevention insights.

Voice Phishing (Vishing)

Vishing scams use phone calls to steal information. Recognize tactics and protect your team from these fast-growing threats.

W

Wallet Draining Scams

Learn how scammers drain digital wallets through stealthy tricks. Discover essential tips to keep your assets safe from fraud.

Watchlist Screening

Watchlist screening protects companies using real-time checks and data. See how it supports compliance and strengthens security.

Web Browser

Web browsers connect users to the internet and safeguard activity. Explore tips and tools to browse securely without risk.

Web Cloning

Curious about web cloning? This article gives you a friendly overview of what it is, where it is used, the risks involved, and why security, compliance, and careful review matter across digital teams.

Web Scraping Fraud

Web scraping fraud steals business data with bots. Learn how to block unwanted access and protect your competitive edge.

Whaling Attack

Whaling scams spoof executives with trusted-looking emails. Learn how to guard leadership from costly phishing hits.

What is Scareware? Definition, Tactics & Trends

Scareware uses fear and urgency to trick users into fraud. Learn how 2026 AI-driven tactics exploit consumers and how to protect your brand from these attacks.

White-collar Financial Crime

White-collar crime costs companies billions in fraud losses. Learn how modern tools detect and stop internal financial abuse.

Whitelisted Merchant Exploits

Whitelisted merchant fraud exploits trusted vendor lists to sneak in attacks. Learn how to spot risky behavior and protect your network.

Whois

Reveal how Whois improves domain transparency, aids fraud prevention, and supports privacy, security, and compliance online.

Wire Fraud

Wire fraud tricks victims into transferring funds electronically. Know the tactics and how to protect your money and business.

Wolfsberg Anti-Money Laundering Principles

Wolfsberg AML Principles guide banks in fighting crime. See how stronger compliance frameworks improve global oversight.

Workflows 2

Workflows 2 automates processes using real-time tracking and AI. Explore how it boosts efficiency and ensures compliance.

Write-Off Schemes

Write-off schemes misuse accounting losses to hide theft or inflate expenses. Learn how audits uncover this hidden financial fraud.

X

Y

Z

Zero-day Exploits

Zero-day exploits hit systems before patches exist. Learn how to defend your business against these unseen cybersecurity threats.

Zero Trust Security

Zero Trust Security assumes no user or device is safe by default. Learn how to implement it for stronger cyber defense.

Get Started Today

Experience how FraudNet can help you reduce fraud, stay compliant, and protect your business and bottom line