Fraud Glossary

Essential Industry Terms Explained

Explore key financial crime, risk management and compliance terminology with our comprehensive glossary.

3D isometric cube composed of smaller blue, cyan, and purple cubes with additional floating cubes around it.

Whether you're navigating regulatory compliance, fighting financial crime, or simply enhancing your knowledge of fraud and anti-money laundering (AML) terms, this resource is for you.

#
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z

Phantom Hacker Scam

Curious about phantom hacker scams? This quick guide explains how they work, why they feel convincing, the warning signs to watch for, and simple steps to protect your money and accounts and stay safe

Phantom Merchant Fraud

Phantom Merchant Fraud sets up fake storefronts to process illegal transactions. Explore methods to detect and block these elaborate schemes.

Pharming

Pharming swaps traffic from real sites to fake ones. Understand how it works and how to protect yourself from data theft.

Pharming Attacks

Pharming redirects victims to fake sites to steal data. Learn how to detect it and keep your business secure online.

Phishing

Phishing scams trick users into revealing sensitive data. Learn common tactics and tips to stay protected from digital fraud.

Phishing And Pharming

Phishing and pharming attack digital systems. Learn real examples, key stats, and tips to protect yourself and your business.

Phishing Kit

Phishing kits give criminals turnkey tools for online scams. Learn how to spot evolving tactics and keep your data safe.

Phishing Schemes

Phishing sites mimic trusted brands to steal data. Learn how to safely identify and avoid these online traps.

Phone Porting Fraud

Phone porting fraud hijacks your number for account access. Uncover tips to stop SIM swap scams and protect your identity.

Phone Verification

Phone verification authenticates users and blocks fake sign-ups. Explore how it strengthens fraud prevention and user trust.

Plagiarism

Plagiarism steals work and damages reputations. Explore how AI tools detect copying and protect academic and business integrity.

Platform

Technology platforms power the systems we rely on daily. Explore how they support fraud prevention across software and cloud.

Point-of-Sale (POS) Fraud

POS fraud hits payment systems hard. Learn attack methods and key tips to protect your business and customers from losses.

Point-To-Point Encryption

P2PE encrypts payment info from entry to processing. Learn how it protects transactions and supports compliance mandates.

Policy Monitoring

Policy monitoring tools track compliance issues in real time to help reduce risk and streamline regulatory processes.

Policy Violation

Policy violations pose major security risks—discover types, recent stats, and how tools like FraudNet help maintain compliance and trust.

Politically Exposed Person (PEP) Screening

PEP screening identifies politically exposed persons at higher risk. Strengthen compliance and trust with proactive checks.

Predictive Analytics for Risk

Predictive analytics uses historical data to flag future risks. Learn how it gives companies the upper hand against fraud.

Predictive Fraud Analytics

Discover how predictive analytics spots fraud before it strikes. Learn how data science boosts speed, accuracy, and security.

Prepaid Card Abuse

Prepaid card abuse tricks users into losing funds or identities. Learn how to safeguard card use with smarter fraud protection.

Privacy

Privacy protects personal data in today’s digital world. Learn your rights and best tips to hold onto your online information.

Processing Unauthorized Payroll

Unauthorized payroll processing siphons wages from companies. Learn internal controls to stop this costly category of fraud.

Prompt Injection

New to prompt injection? This quick guide explains how attackers manipulate AI, why simple defenses fail, and the practical steps teams can take to reduce risk and protect connected systems at scale.

Proofing

Proofing helps dough rise and confirms identity. Learn its role in baking and security, plus how it supports fraud prevention.

Proxy Piercing

Proxy piercing improves speed and fraud detection. Learn how it works and key safety tips for secure use in digital systems.

Proxy Server Fraud

Proxy server fraud hides attackers behind fake locations. Learn to detect these schemes and protect your business online.

Pyramid Schemes

Pyramid schemes recruit victims through fake fees and promises. Learn how to spot and avoid these deceptive money traps.

Q

Quishing (Qr Phishing)

Curious about quishing? This quick guide explains how QR phishing works, where fake codes appear, warning signs to watch for, and simple steps to stay safer at work and on the go before you scan QRs.

R

Ransomware Attacks

Ransomware locks systems and demands payment from victims. Explore impacts, real cases, and how to prevent these attacks.

Real-time Fraud Detection

Real-time fraud detection analyzes live data to block bad behavior. Discover how it boosts trust and reduces financial loss.

Real-Time Payment Fraud

Discover how real-time payment fraud exploits instant transfers. Learn top strategies to protect both customers and revenue.

Real-time Sanctions Screening

Real-time Sanctions Screening checks transactions against global lists instantly to reduce legal risk and ensure compliance.

Refund Fraud

Refund fraud abuses return processes for financial gain. Learn tactics to stop scammers and protect your business earnings.

RegTech (Regulatory Technology)

RegTech automates compliance using smart tools and AI. Explore how it cuts costs and strengthens risk management.

Regulatory Reporting

Regulatory reporting ensures financial transparency. See how automation helps cut costs and overcome reporting challenges.

Relying Party

Relying parties manage login verification using trusted providers. Learn how this supports secure digital identity ecosystems.

Remittance Fraud

Remittance fraud exploits cross-border transfers to steal money. Learn how modern checks keep global payments secure.

Remote Access Fraud

Remote access fraud hijacks devices to steal information or funds. Learn key strategies to defend against increasingly sophisticated scams.

Reputation Score Manipulation

Reputation score manipulation erodes online trust quickly. Discover the tactics and tools to safeguard your public credibility.

Retail Fraud

Retail fraud includes theft, scams, and returns abuse. Learn how modern tools help stores stay secure and profitable.

Retail Loss Prevention

Retail loss prevention strategies protect revenue from theft and fraud. Explore tools, tactics, and key industry stats.

Return Fraud

Return fraud accounts for 8% of all returns. Discover the mechanics of receipt fraud, price arbitrage, and serial returner behavior, and how to detect them in real-time.

Return On Investment Roi

ROI measures how efficiently investments generate profit. Learn how to boost returns using real examples and expert tips.

Reverse Money Laundering

Reverse money laundering cleans legit funds to hide criminal links. Learn how firms detect this rising financial crime.

Risk Assessment

Risk assessment evaluates potential threats to operations. Discover how it guides smarter planning and safeguards projects.

Risk-Based Authentication (RBA)

Risk-based authentication evaluates login behavior dynamically. Discover how it blocks suspicious access before damage occurs.

Risk Profiling

Curious about risk profiling? This friendly guide shows how organizations measure exposure, make smarter decisions, and adapt fraud and compliance strategies as customer and threat risks change often.

Romance Scams

Romance scams use emotional trust to steal money online. Learn key signs and stay safe with proven fraud protection tactics.

Rules-Based Fraud Detection

Rules-based fraud detection flags suspicious activity using preset criteria like timing, amounts, and transaction attributes.

Rules Engine

Rules engines automate complex decision logic for risk control. Learn how they increase speed, transparency, and fraud defense.

Run Of Network (Ron)

Run Of Network ads boost reach across sites. Learn the benefits, challenges, and how to protect campaigns from digital fraud.

S

Sales Scam

Sales scams target buyers and sellers—learn how they work, their impact, and top tactics to protect yourself and your business.

Sanctions and Watch Lists

Sanctions and watch lists block illegal global activity. Learn how regulators use them to enforce security and compliance.

Sarbanes-Oxley Act (SOX)

Sarbanes-Oxley enforces stricter controls over corporate reporting. Explore how SOX boosts transparency and investor trust.

SCA (Strong Customer Authentication)

Strong Customer Authentication uses two elements to verify users. Explore how it reduces fraud in modern payment systems.

Scholarship Scam

Scholarship scams target students with fake offers. Learn how to spot secure financial aid and protect your personal info.

Scraper

Web scrapers collect online data automatically. See how they aid research and fraud detection and what legal issues to consider.

Script Kiddie

Script Kiddies use basic hacking tools with little skill. Learn their risks, attack methods, and how to stay protected.

Second Party Fraud

Second-party fraud uses money mules to move illicit funds. Learn how it works and how businesses can detect it early.

Secure Element

Secure Elements use tamper-proof chips to protect data in cards, IDs, and IoT devices, building deeper trust in digital systems.

Securities and Exchange Commission (SEC) Rules

SEC rules protect investors through market transparency. Learn the latest updates and how to stay compliant with confidence.

Self-Learning Fraud Prevention Systems

Self-learning fraud systems adapt using AI and new patterns. Discover how they detect threats faster and reduce false alerts.

Serious Fraud Office Sfo

The SFO tackles large-scale fraud and bribery cases. Learn how businesses can prepare and strengthen internal controls.

Shell Companies

Shell companies hide owners behind secret structures. Discover how to spot warning signs and guard against misuse.

Shopping Cart

Shopping carts power e-commerce checkout and secure sales. Learn how they improve customer experience and conversions.

Shoulder Surfing

Shoulder surfing steals sensitive data in public—discover how it happens and get practical tips to safeguard your information.

Sim Cloning

SIM cloning copies your phone data for fraud. Learn how scammers do it and practical ways to stay protected.

SIM Swapping

SIM swapping steals phone numbers to hijack accounts. Learn how to guard mobile identity from this growing fraud.

Single Sign On

Single Sign-On lets users access many apps with one login. Improve security while boosting convenience and productivity.

Skimmer

ATM skimmers steal card data using hidden devices. Discover how to recognize signs and protect payment information.

Skimming

Skimming helps readers quickly extract key ideas—and in payments, spot fraud fast. Explore tips for security and efficiency.

Skimming Attacks

Discover how skimming attacks target ATMs and checkout systems. Learn practical tools to protect your business and customers.

Skimming Cash Receipts

Skimming cash receipts quietly siphons business income. Discover proven detection methods to protect financial integrity.

Smart Card

Smart cards boost data security and enable safe digital payments. Learn their features, real-world uses, and future potential.

Smart Contract Fraud

Smart contract fraud exploits automated blockchain agreements. Learn how to identify risks and secure decentralized transactions.

Smishing

Discover how "smishing" scams use SMS to steal personal info, why they’re rising, and practical tips to protect yourself and your business from these deceptive mobile phishing attacks.

Smurfing Structuring

Smurfing breaks large cash into small deposits to avoid detection. Learn how banks use analytics to uncover structured schemes.

Sniffing

Network sniffing captures data traffic for analysis. Learn its uses, risks, and how to protect your network from cyber threats.

Social Engineering

Social engineering manipulates people instead of systems. Learn how to recognize psychological tricks before it’s too late.

Social Media Intelligence

Social Media Intelligence turns user activity into insight for fraud detection, trend analysis, and better decision-making.

Social Media Phishing

Social media phishing lures users through fake profiles and DMs. Learn prevention tips to protect accounts and data.

Software Piracy

Software piracy is the illegal copying, distribution, or use of software. It is such a profitable "business" that it has caught the attention of organized crime groups in a number of countries....

Spear Phishing

Spear phishing targets specific victims using realistic emails. Learn how to recognize and avoid these highly convincing scams.

Spider

Web spiders crawl information to power search and detection. Learn how they help fight fraud while mapping the digital world.

State-sponsored Fraud

State-sponsored fraud blends crime with geopolitics. Explore how to spot these threats and strengthen your organization’s defenses.

Subscription Billing Fraud

Subscription billing fraud causes unauthorized charges and hidden fees. Learn how to safeguard your finances in today’s subscription-based world.

Supervised Machine Learning

Supervised learning trains AI using labeled examples. Discover how it builds smarter systems in fraud detection and beyond.

Supply Chain Fraud

Supply chain fraud disrupts operations through hidden crime. Learn tactics and AI tools to secure vendors and goods flow.

Suspicious Activity Monitoring

Suspicious Activity Monitoring tracks unusual financial behavior to flag early risks. Learn how smart tools power real-time fraud protection.

Suspicious Activity Report

Curious about suspicious activity reports? This quick guide explains what SARs are, why they matter, what triggers them, and how organizations use them to spot fraud and support timely investigations.

Suspicious Transaction Report (STR)

What is an STR? Define the role of Suspicious Transaction Reports in preventing money laundering. Get the latest 2025-2026 STR statistics and compliance best practices.

Sweepstakes Scam

Sweepstakes scams lure victims with fake prize promises. Learn how to spot the red flags and stay safely out of fraudsters’ reach.

Swindling

Swindling has evolved. Explore how modern confidence schemes use deepfakes and social engineering to bypass security, and learn the red flags of digital deception.

Synthetic Business Fraud

Synthetic business fraud merges fake and real data to fool systems. Uncover its impact and how firms fight this growing threat.

Synthetic Data

Synthetic data mimics real information for safer AI training. Discover its privacy benefits and powerful use cases.

Synthetic Identity

Synthetic identity fraud builds personas from real and fake info. Learn how to detect and stop this rising digital crime.

Synthetic Identity Creation

Synthetic identity fraud blends real and fake data to fool systems. Learn how banks detect these complex cases and reduce risk.

Get Started Today

Experience how FraudNet can help you reduce fraud, stay compliant, and protect your business and bottom line