Fraud Glossary

Essential Industry Terms Explained

Explore key financial crime, risk management and compliance terminology with our comprehensive glossary.

Whether you're navigating regulatory compliance, fighting financial crime, or simply enhancing your knowledge of fraud and anti-money laundering (AML) terms, this resource is for you.

#
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z

Trade Finance Fraud

Trade finance fraud exploits global funding for illicit gains. Learn how institutions spot risk and keep commerce safe.

Trade-based Money Laundering Schemes

Trade-based money laundering routes dirty cash through fake invoices. Learn how modern tools uncover risks in global trade.

Transaction Authentication Number (TAN)

A TAN is a one-time code used in online transactions. Learn how it adds an extra layer of security beyond standard passwords.

Transaction Cloaking

Transaction cloaking hides payment details for privacy. Learn how tools detect misuse while supporting secure digital spending.

Transaction Fingerprinting

Transaction Fingerprinting tags behaviors to detect anomalies fast. Explore how metadata improves fraud prevention across sectors.

Transaction Laundering

Transaction laundering hides illegal sales behind legit sites. Learn how compliance tools uncover these hidden schemes.

Transaction Monitoring

Transaction monitoring analyzes activity in real time to flag risk. Explore tools, challenges, and future trends in fraud detection.

Transaction Reversal Fraud

Transaction reversal fraud exploits refunds and chargebacks. Learn how it works and get tips to protect your business revenue.

Triangulation Fraud

Triangulation fraud happens when scammers use stolen data to fulfill marketplace orders, leaving customers with illegitimate goods.

Triangulation Schemes

Triangulation schemes break surfaces into geometric shapes. Learn how this method also helps expose hidden fraud patterns.

Trojan Horse Malware

Trojan malware hides in legitimate programs to steal access. Learn how to block infection and safeguard your business data.

True Negative

A True Negative means a correct rejection in fraud detection. Learn how it improves models and lowers false alarms.

True Positive

True Positives are correct positive results in data analysis. Learn why they matter and how they improve fraud models today.

Trusted Third Party

Trusted Third Parties build digital trust, support compliance, and reduce fraud by securing interactions between users.

Two Tier Affiliate Program

Two-tier affiliate programs reward both direct and indirect referrals for higher earnings. Explore how to grow commissions while staying fraud-resistant.

Two-Factor Authentication (2FA)

Two-factor authentication adds layered checks before access. Explore how this method blocks attackers from sensitive systems.

U

U2F (Universal 2 Factor)

U2F uses physical keys for stronger logins and identity proof. Learn how it works and why businesses rely on it for security.

UK Bribery Act

The UK Bribery Act sets strict global standards against corruption. Learn key offences, compliance tips, and business impacts.

USA PATRIOT Act

The USA PATRIOT Act reshaped compliance and data sharing. Learn how its rules impact financial systems and personal privacy today.

Ultimate Beneficial Ownership

Universal Beneficial Ownership reveals who truly controls an entity. Learn how transparency enhances compliance and security.

Unauthorized Disbursements

Unauthorized disbursements misdirect funds with fake payments. See how to spot red flags and improve financial controls.

Unauthorized Use Of Assets

Unauthorized asset use exposes firms to theft and lawsuits. Learn practical steps to prevent losses and cyber misuse.

Unauthorized Withdrawals

Unauthorized withdrawals can silently drain your accounts. Explore why they happen, how to stop them, and where tech can help.

Underdelivery

Underdelivery leads to missed expectations and lost revenue. Understand what causes it and how smart tools keep operations safe.

Unique Identity

Unique identity improves data accuracy and fraud defense. Learn why it matters and how it enables safer digital interactions.

United Nations Convention against Corruption

UNCAC sets global standards to prevent corruption and recover assets. Explore how nations use it to strengthen transparency.

Unstructured Data Fraud

Fraudsters exploit unstructured data like emails and posts. Learn how AI tools analyze messy info to spot hidden threats.

Unsupervised Machine Learning

Unsupervised learning finds fraud patterns without labeled data. Use it to uncover risks where traditional systems fall short.

Unusual Activity Reporting (UAR)

Unusual Activity Reports (UARs) help detect fraud, boost compliance, and strengthen security—see how they work with real examples.

Url Spoofing

URL spoofing mimics real sites to steal data. Spot fake links fast and protect your business from phishing-based attacks.

User Behavior Anomaly Detection

User Behavior Anomaly Detection flags actions that don’t match user patterns. Learn how AI improves security without hurting user experience.

Utility Fraud

Utility fraud targets businesses with fake invoices and billing scams—learn how it works and how to spot and prevent these growing threats.

V

Validation

Data validation prevents fraud by confirming accuracy at the source. Learn how it protects compliance and reporting integrity.

Velocity Filters

Velocity filters spot rapid data changes to flag fraud and improve performance. Learn how they work and why businesses use them.

Verified By Visa (VBV)

Explore how Verified by Visa boosts online payment security, reduces fraud, aids shoppers and retailers, and key challenges it faces.

Virtual Card Fraud

Virtual card fraud targets online one-time card numbers. Learn how to protect digital payments from evolving cyber tactics.

Virtual Currency Compliance

Virtual currency compliance blends AML, KYC, and evolving rules. Learn how businesses stay secure amid growing digital-asset risks.

Vishing

Vishing attacks use phone calls to steal private information. Protect yourself with simple steps and real-time vigilance.

Voice Authorization

Voice authorization adds secure, convenient verification to payments. Learn its benefits, use cases, and future potential.

Voice Biometric Fraud

Voice biometric fraud mimics speech to bypass authentication. Discover detection tools that block synthetic voice attacks.

Voice Over Ip

VoIP transforms modern communications with cost savings and scale. Learn how it also enhances fraud prevention insights.

Voice Phishing (Vishing)

Vishing scams use phone calls to steal information. Recognize tactics and protect your team from these fast-growing threats.

W

Wallet Draining Scams

Learn how scammers drain digital wallets through stealthy tricks. Discover essential tips to keep your assets safe from fraud.

Watchlist Screening

Watchlist screening protects companies using real-time checks and data. See how it supports compliance and strengthens security.

Web Browser

Web browsers connect users to the internet and safeguard activity. Explore tips and tools to browse securely without risk.

Web Scraping Fraud

Web scraping fraud steals business data with bots. Learn how to block unwanted access and protect your competitive edge.

Whaling Attack

Whaling scams spoof executives with trusted-looking emails. Learn how to guard leadership from costly phishing hits.

White-collar Financial Crime

White-collar crime costs companies billions in fraud losses. Learn how modern tools detect and stop internal financial abuse.

Whitelisted Merchant Exploits

Whitelisted merchant fraud exploits trusted vendor lists to sneak in attacks. Learn how to spot risky behavior and protect your network.

Whois

Reveal how Whois improves domain transparency, aids fraud prevention, and supports privacy, security, and compliance online.

Wire Fraud

Wire fraud tricks victims into transferring funds electronically. Know the tactics and how to protect your money and business.

Wolfsberg Anti-Money Laundering Principles

Wolfsberg AML Principles guide banks in fighting crime. See how stronger compliance frameworks improve global oversight.

Workflows 2

Workflows 2 automates processes using real-time tracking and AI. Explore how it boosts efficiency and ensures compliance.

Write-Off Schemes

Write-off schemes misuse accounting losses to hide theft or inflate expenses. Learn how audits uncover this hidden financial fraud.

X

Y

Z

Zero Trust Security

Zero Trust Security assumes no user or device is safe by default. Learn how to implement it for stronger cyber defense.

Zero-day Exploits

Zero-day exploits hit systems before patches exist. Learn how to defend your business against these unseen cybersecurity threats.

eCheck Fraud

ECheck fraud targets digital bank transfers. Learn how it happens, key risks, and smart strategies to safeguard your finances.

eCommerce Fraud

eCommerce fraud threatens transactions with phishing, bots, and theft. Stay ahead of scammers with proven defense tactics.

eSIM Fraud

eSIM fraud abuses virtual SIMs to hijack phones or accounts. Learn how to secure devices and stop these new digital attacks.

test slug 2

A test-slug labels test content during development. Use it to improve tracking, communication, and fraud-safe testing.

Get Started Today

Experience how FraudNet can help you reduce fraud, stay compliant, and protect your business and bottom line