Essential Industry Terms Explained
Explore key financial crime, risk management and compliance terminology with our comprehensive glossary.

Whether you're navigating regulatory compliance, fighting financial crime, or simply enhancing your knowledge of fraud and anti-money laundering (AML) terms, this resource is for you.
Phantom Hacker Scam
Curious about phantom hacker scams? This quick guide explains how they work, why they feel convincing, the warning signs to watch for, and simple steps to protect your money and accounts and stay safe
Phantom Merchant Fraud
Phantom Merchant Fraud sets up fake storefronts to process illegal transactions. Explore methods to detect and block these elaborate schemes.
Pharming
Pharming swaps traffic from real sites to fake ones. Understand how it works and how to protect yourself from data theft.
Pharming Attacks
Pharming redirects victims to fake sites to steal data. Learn how to detect it and keep your business secure online.
Phishing
Phishing scams trick users into revealing sensitive data. Learn common tactics and tips to stay protected from digital fraud.
Phishing And Pharming
Phishing and pharming attack digital systems. Learn real examples, key stats, and tips to protect yourself and your business.
Phishing Kit
Phishing kits give criminals turnkey tools for online scams. Learn how to spot evolving tactics and keep your data safe.
Phishing Schemes
Phishing sites mimic trusted brands to steal data. Learn how to safely identify and avoid these online traps.
Phone Porting Fraud
Phone porting fraud hijacks your number for account access. Uncover tips to stop SIM swap scams and protect your identity.
Phone Verification
Phone verification authenticates users and blocks fake sign-ups. Explore how it strengthens fraud prevention and user trust.
Plagiarism
Plagiarism steals work and damages reputations. Explore how AI tools detect copying and protect academic and business integrity.
Platform
Technology platforms power the systems we rely on daily. Explore how they support fraud prevention across software and cloud.
Point-of-Sale (POS) Fraud
POS fraud hits payment systems hard. Learn attack methods and key tips to protect your business and customers from losses.
Point-To-Point Encryption
P2PE encrypts payment info from entry to processing. Learn how it protects transactions and supports compliance mandates.
Policy Monitoring
Policy monitoring tools track compliance issues in real time to help reduce risk and streamline regulatory processes.
Policy Violation
Policy violations pose major security risks—discover types, recent stats, and how tools like FraudNet help maintain compliance and trust.
Politically Exposed Person (PEP) Screening
PEP screening identifies politically exposed persons at higher risk. Strengthen compliance and trust with proactive checks.
Predictive Analytics for Risk
Predictive analytics uses historical data to flag future risks. Learn how it gives companies the upper hand against fraud.
Predictive Fraud Analytics
Discover how predictive analytics spots fraud before it strikes. Learn how data science boosts speed, accuracy, and security.
Prepaid Card Abuse
Prepaid card abuse tricks users into losing funds or identities. Learn how to safeguard card use with smarter fraud protection.
Privacy
Privacy protects personal data in today’s digital world. Learn your rights and best tips to hold onto your online information.
Processing Unauthorized Payroll
Unauthorized payroll processing siphons wages from companies. Learn internal controls to stop this costly category of fraud.
Prompt Injection
New to prompt injection? This quick guide explains how attackers manipulate AI, why simple defenses fail, and the practical steps teams can take to reduce risk and protect connected systems at scale.
Proofing
Proofing helps dough rise and confirms identity. Learn its role in baking and security, plus how it supports fraud prevention.
Proxy Piercing
Proxy piercing improves speed and fraud detection. Learn how it works and key safety tips for secure use in digital systems.
Proxy Server Fraud
Proxy server fraud hides attackers behind fake locations. Learn to detect these schemes and protect your business online.
Pyramid Schemes
Pyramid schemes recruit victims through fake fees and promises. Learn how to spot and avoid these deceptive money traps.
Q
Quishing (Qr Phishing)
Curious about quishing? This quick guide explains how QR phishing works, where fake codes appear, warning signs to watch for, and simple steps to stay safer at work and on the go before you scan QRs.
R
Ransomware Attacks
Ransomware locks systems and demands payment from victims. Explore impacts, real cases, and how to prevent these attacks.
Real-time Fraud Detection
Real-time fraud detection analyzes live data to block bad behavior. Discover how it boosts trust and reduces financial loss.
Real-Time Payment Fraud
Discover how real-time payment fraud exploits instant transfers. Learn top strategies to protect both customers and revenue.
Real-time Sanctions Screening
Real-time Sanctions Screening checks transactions against global lists instantly to reduce legal risk and ensure compliance.
Refund Fraud
Refund fraud abuses return processes for financial gain. Learn tactics to stop scammers and protect your business earnings.
RegTech (Regulatory Technology)
RegTech automates compliance using smart tools and AI. Explore how it cuts costs and strengthens risk management.
Regulatory Reporting
Regulatory reporting ensures financial transparency. See how automation helps cut costs and overcome reporting challenges.
Relying Party
Relying parties manage login verification using trusted providers. Learn how this supports secure digital identity ecosystems.
Remittance Fraud
Remittance fraud exploits cross-border transfers to steal money. Learn how modern checks keep global payments secure.
Remote Access Fraud
Remote access fraud hijacks devices to steal information or funds. Learn key strategies to defend against increasingly sophisticated scams.
Reputation Score Manipulation
Reputation score manipulation erodes online trust quickly. Discover the tactics and tools to safeguard your public credibility.
Retail Fraud
Retail fraud includes theft, scams, and returns abuse. Learn how modern tools help stores stay secure and profitable.
Retail Loss Prevention
Retail loss prevention strategies protect revenue from theft and fraud. Explore tools, tactics, and key industry stats.
Return Fraud
Return fraud accounts for 8% of all returns. Discover the mechanics of receipt fraud, price arbitrage, and serial returner behavior, and how to detect them in real-time.
Return On Investment Roi
ROI measures how efficiently investments generate profit. Learn how to boost returns using real examples and expert tips.
Reverse Money Laundering
Reverse money laundering cleans legit funds to hide criminal links. Learn how firms detect this rising financial crime.
Risk Assessment
Risk assessment evaluates potential threats to operations. Discover how it guides smarter planning and safeguards projects.
Risk-Based Authentication (RBA)
Risk-based authentication evaluates login behavior dynamically. Discover how it blocks suspicious access before damage occurs.
Risk Profiling
Curious about risk profiling? This friendly guide shows how organizations measure exposure, make smarter decisions, and adapt fraud and compliance strategies as customer and threat risks change often.
Romance Scams
Romance scams use emotional trust to steal money online. Learn key signs and stay safe with proven fraud protection tactics.
Rules-Based Fraud Detection
Rules-based fraud detection flags suspicious activity using preset criteria like timing, amounts, and transaction attributes.
Rules Engine
Rules engines automate complex decision logic for risk control. Learn how they increase speed, transparency, and fraud defense.
Run Of Network (Ron)
Run Of Network ads boost reach across sites. Learn the benefits, challenges, and how to protect campaigns from digital fraud.
S
Sales Scam
Sales scams target buyers and sellers—learn how they work, their impact, and top tactics to protect yourself and your business.
Sanctions and Watch Lists
Sanctions and watch lists block illegal global activity. Learn how regulators use them to enforce security and compliance.
Sarbanes-Oxley Act (SOX)
Sarbanes-Oxley enforces stricter controls over corporate reporting. Explore how SOX boosts transparency and investor trust.
SCA (Strong Customer Authentication)
Strong Customer Authentication uses two elements to verify users. Explore how it reduces fraud in modern payment systems.
Scholarship Scam
Scholarship scams target students with fake offers. Learn how to spot secure financial aid and protect your personal info.
Scraper
Web scrapers collect online data automatically. See how they aid research and fraud detection and what legal issues to consider.
Script Kiddie
Script Kiddies use basic hacking tools with little skill. Learn their risks, attack methods, and how to stay protected.
Second Party Fraud
Second-party fraud uses money mules to move illicit funds. Learn how it works and how businesses can detect it early.
Secure Element
Secure Elements use tamper-proof chips to protect data in cards, IDs, and IoT devices, building deeper trust in digital systems.
Securities and Exchange Commission (SEC) Rules
SEC rules protect investors through market transparency. Learn the latest updates and how to stay compliant with confidence.
Self-Learning Fraud Prevention Systems
Self-learning fraud systems adapt using AI and new patterns. Discover how they detect threats faster and reduce false alerts.
Serious Fraud Office Sfo
The SFO tackles large-scale fraud and bribery cases. Learn how businesses can prepare and strengthen internal controls.
Shell Companies
Shell companies hide owners behind secret structures. Discover how to spot warning signs and guard against misuse.
Shopping Cart
Shopping carts power e-commerce checkout and secure sales. Learn how they improve customer experience and conversions.
Shoulder Surfing
Shoulder surfing steals sensitive data in public—discover how it happens and get practical tips to safeguard your information.
Sim Cloning
SIM cloning copies your phone data for fraud. Learn how scammers do it and practical ways to stay protected.
SIM Swapping
SIM swapping steals phone numbers to hijack accounts. Learn how to guard mobile identity from this growing fraud.
Single Sign On
Single Sign-On lets users access many apps with one login. Improve security while boosting convenience and productivity.
Skimmer
ATM skimmers steal card data using hidden devices. Discover how to recognize signs and protect payment information.
Skimming
Skimming helps readers quickly extract key ideas—and in payments, spot fraud fast. Explore tips for security and efficiency.
Skimming Attacks
Discover how skimming attacks target ATMs and checkout systems. Learn practical tools to protect your business and customers.
Skimming Cash Receipts
Skimming cash receipts quietly siphons business income. Discover proven detection methods to protect financial integrity.
Smart Card
Smart cards boost data security and enable safe digital payments. Learn their features, real-world uses, and future potential.
Smart Contract Fraud
Smart contract fraud exploits automated blockchain agreements. Learn how to identify risks and secure decentralized transactions.
Smishing
Discover how "smishing" scams use SMS to steal personal info, why they’re rising, and practical tips to protect yourself and your business from these deceptive mobile phishing attacks.
Smurfing Structuring
Smurfing breaks large cash into small deposits to avoid detection. Learn how banks use analytics to uncover structured schemes.
Sniffing
Network sniffing captures data traffic for analysis. Learn its uses, risks, and how to protect your network from cyber threats.
Social Engineering
Social engineering manipulates people instead of systems. Learn how to recognize psychological tricks before it’s too late.
Social Media Intelligence
Social Media Intelligence turns user activity into insight for fraud detection, trend analysis, and better decision-making.
Social Media Phishing
Social media phishing lures users through fake profiles and DMs. Learn prevention tips to protect accounts and data.
Software Piracy
Software piracy is the illegal copying, distribution, or use of software. It is such a profitable "business" that it has caught the attention of organized crime groups in a number of countries....
Spear Phishing
Spear phishing targets specific victims using realistic emails. Learn how to recognize and avoid these highly convincing scams.
Spider
Web spiders crawl information to power search and detection. Learn how they help fight fraud while mapping the digital world.
State-sponsored Fraud
State-sponsored fraud blends crime with geopolitics. Explore how to spot these threats and strengthen your organization’s defenses.
Subscription Billing Fraud
Subscription billing fraud causes unauthorized charges and hidden fees. Learn how to safeguard your finances in today’s subscription-based world.
Supervised Machine Learning
Supervised learning trains AI using labeled examples. Discover how it builds smarter systems in fraud detection and beyond.
Supply Chain Fraud
Supply chain fraud disrupts operations through hidden crime. Learn tactics and AI tools to secure vendors and goods flow.
Suspicious Activity Monitoring
Suspicious Activity Monitoring tracks unusual financial behavior to flag early risks. Learn how smart tools power real-time fraud protection.
Suspicious Activity Report
Curious about suspicious activity reports? This quick guide explains what SARs are, why they matter, what triggers them, and how organizations use them to spot fraud and support timely investigations.
Suspicious Transaction Report (STR)
What is an STR? Define the role of Suspicious Transaction Reports in preventing money laundering. Get the latest 2025-2026 STR statistics and compliance best practices.
Sweepstakes Scam
Sweepstakes scams lure victims with fake prize promises. Learn how to spot the red flags and stay safely out of fraudsters’ reach.
Swindling
Swindling has evolved. Explore how modern confidence schemes use deepfakes and social engineering to bypass security, and learn the red flags of digital deception.
Synthetic Business Fraud
Synthetic business fraud merges fake and real data to fool systems. Uncover its impact and how firms fight this growing threat.
Synthetic Data
Synthetic data mimics real information for safer AI training. Discover its privacy benefits and powerful use cases.
Synthetic Identity
Synthetic identity fraud builds personas from real and fake info. Learn how to detect and stop this rising digital crime.
Synthetic Identity Creation
Synthetic identity fraud blends real and fake data to fool systems. Learn how banks detect these complex cases and reduce risk.
Get Started Today
Experience how FraudNet can help you reduce fraud, stay compliant, and protect your business and bottom line