Fraud Glossary

Essential Industry Terms Explained

Explore key financial crime, risk management and compliance terminology with our comprehensive glossary.

Whether you're navigating regulatory compliance, fighting financial crime, or simply enhancing your knowledge of fraud and anti-money laundering (AML) terms, this resource is for you.

#
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z

Telecommunication Fraud

Telecommunication fraud is the theft of telecommunication services (such astelephones, cell phones, computers and so on) or the use of telecommunication service to commit other forms of fraud....

Telecommunications

Telecommunications refers to the exchange of information by electronic and electrical means over a significant distance. A complete telecommunication arrangement is made up of two or more stations...

Theft Of Assets

Discover what asset theft is, its causes, impacts, real-world examples, and how businesses can detect and prevent losses with smart controls, technologies, and best practices.

Theft Of Checks

Discover how check theft happens, its serious consequences, and practical ways to protect yourself and your business from fraud. Learn key risks, statistics, and prevention tips in this essential guide.

Third-party Data Breaches

Discover how third-party data breaches threaten businesses, their causes, impacts, and practical steps for prevention—empowering you to better protect your organization and customer data.

Third-party Fraud

Discover what third-party fraud is, its rising impact, key statistics, and effective prevention strategies to protect yourself and your business in today’s digital world.

Threat

A threat is any condition or event that may negatively influence managerial operations (include assignment, purpose, picture, or status), organizational resources, or individuals through an...

Threat Intelligence Sharing

Discover how threat intelligence sharing helps organizations predict, prevent, and respond to cyber threats more effectively through collaboration, real-world use cases, and the latest industry insights.

Timecard Tampering

Discover what timecard tampering is, its impact on businesses, common methods, recent statistics, and how to prevent fraud for accurate payroll and a trustworthy workplace.

Token

Discover what tokens are, how they're transforming digital systems, and their key uses in security, payments, and more. Learn about token types, benefits, and future trends in this insightful guide.

Tokenization

Discover how tokenization secures sensitive data, boosts compliance, and builds trust in digital transactions. Explore its benefits, use cases, market trends, and practical tips in this guide!

Tokenization Security

Discover how tokenization security replaces sensitive data with safe tokens, reducing fraud risks and ensuring compliance. Learn its benefits, real-world uses, and why it matters for your business!

Tor

Discover how Tor, the anonymous browsing network, works, its benefits, challenges, and real-world use cases—plus key stats and tips for safe, private internet use. Learn more in our article!

Trade Finance Fraud

Discover the risks, mechanisms, and real-world examples of trade finance fraud—and learn how technology and best practices can help protect your business in global trade.

Trade-based Money Laundering Schemes

Discover how criminals use trade transactions to launder money, the challenges in detecting these schemes, and how businesses can protect themselves with advanced fraud detection tools.

Transaction Authentication Number (TAN)

A transaction authentication number (TAN) is a one-time use code involved in processing online transactions. It offers additional security on top of a password to log in to an account or make...

Transaction Cloaking

Discover how transaction cloaking enhances privacy in digital payments, its real-world uses, challenges, and how tools like FraudNet help businesses detect and prevent sophisticated fraud.

Transaction Fingerprinting

Explore how Transaction Fingerprinting uses metadata and pattern recognition to boost security, detect fraud, and ensure safe digital transactions across industries. Learn about its benefits and real-world uses!

Transaction Laundering

Discover how transaction laundering threatens e-commerce, the tactics fraudsters use, and how advanced technology and compliance can help protect your business from hidden financial crime.

Transaction Monitoring

Discover how transaction monitoring helps detect fraud, ensure compliance, and protect financial institutions—explore key techniques, challenges, future trends, and real-world use cases in our latest article!

Transaction Reversal Fraud

Discover what Transaction Reversal Fraud is, how it impacts businesses, and practical steps to protect yourself from unauthorized refunds and chargebacks. Stay informed and safeguard your revenue!

Travel

Travel is defined as the progress of people between two distant locations. Travel could be done by foot, bicycle, vehicle, train, boat, bus, airplane, ship or further means, with or without baggage,...

Triangulation Fraud

What is Triangulation Fraud? Triangulation fraud is when a customer makes a genuine purchase on a third-party marketplace (for example Amazon or Sears.com), but the product they receive was...

Triangulation Schemes

Discover how triangulation schemes simplify complex surfaces, aid in fraud detection, and support industries like graphics and finance. Learn key uses, real-world stats, and how to protect your business.

Trojan

A trojan, or trojan horse virus, is a computer program that seems legitimate, but adds malware to a device once downloaded. It’s name comes from a famous Greek tale.

Trojan Horse Malware

Discover how Trojan Horse Malware disguises itself as trusted software, the risks it poses, and key strategies to protect your data and business. Stay informed and secure with our essential guide.

True Negative

Discover what True Negative means in machine learning and fraud prevention. Learn how accurate negative predictions improve model reliability, reduce false alarms, and enhance decision-making.

True Positive

Discover what True Positives are, why they matter in data analysis and model evaluation, and see real-world examples in fraud detection, healthcare, and more. Learn how to boost model accuracy!

Trust

A trust is a fiduciary connection where one person places some type of trust, confidence, or reliance on another person. The person who is delegated that trust and confidence would then have a...

Trusted Third-Party

In cryptography, a Trusted Third-Party (TTP) is an entity which facilitates interactions between two parties who both trust the third party; the Third Party reviews all the critical transaction...

Two Tier Affiliate Program

Discover how Two Tier Affiliate Programs boost earnings by rewarding both direct referrals and sub-affiliate sales. Learn the benefits, use cases, and how to keep your network secure and profitable!

Two-Factor Authentication (2FA)

2FA or Two-Factor Authentication, also called Step-Up Authentication, is a security process in which the user provides two means of identification, one of which is typically a physical token, such as...

U

U2F (Universal 2 Factor)

U2F or Universal 2-Factor Authentication is a form of 2-factor authentication, in which the user completes a login process using a physical device as one form of verification to prove their identity...

UK Bribery Act

Discover the essentials of the UK Bribery Act 2010—its key offenses, business impact, compliance tips, and global influence—in this clear and practical guide for organizations and professionals.

URL

URL stands for Uniform Resource Locator, and is used to specify addresses on the World Wide Web. A URL is the fundamental network identification for any resource connected to the web (e.g., hypertext...

USA PATRIOT Act

Discover how the USA PATRIOT Act shapes security, privacy, and financial compliance in the U.S.—from surveillance to anti-money laundering and its impact on daily operations and civil liberties.

Ultimate Beneficial Ownership

Universal Beneficial Ownership (UBO) refers to the concept of identifying and understanding the individuals who ultimately own, control, or benefit from a legal entity, such as a corporation, trust, partnership, or other organization.

Unauthorized Disbursements

Curious about unauthorized disbursements? Learn what they are, why they happen, real-world examples, and how to prevent financial fraud with smart controls and technology. Dive into our latest guide!

Unauthorized Use Of Assets

Discover what unauthorized use of assets means, its risks, and how to protect your business from financial loss, legal trouble, and cyber threats with practical tips and the latest stats.

Unauthorized Withdrawals

Learn how to spot, prevent, and respond to unauthorized withdrawals from your account. Discover causes, impacts, prevention tips, and how advanced tech is fighting fraud. Stay informed and secure!

Underdelivery

Discover what underdelivery means, its business impacts, and how to prevent it. Learn real-world examples, recent stats, and how smart detection tools like FraudNet can help protect your operations.

Understanding Device Fingerprinting: How It Works and Can Help Prevent Fraud

What is Device Fingerprinting? Device fingerprinting is used to identify and track devices on the internet, particularly computers and mobile devices. It collects information about a device and...

Unique Identity

Discover how unique identity ensures accurate data management, prevents fraud, and supports secure digital interactions in today’s world. Learn its importance, real-world use cases, and future trends.

United Nations Convention against Corruption

Discover how the United Nations Convention against Corruption (UNCAC) sets global standards for fighting corruption, promoting transparency, international cooperation, and asset recovery.

Unstructured Data Fraud

Discover how fraudsters exploit unstructured data like emails and social media, the challenges of detection, real-world use cases, and how advanced AI helps protect businesses from evolving threats.

Unsupervised Machine Learning

Unsupervised machine learning algorithms infer patterns from a data set without reference to known, or labeled, outcomes. Unlike supervised machine learning, unsupervised machine learning methods...

Unusual Activity Reporting (UAR)

Discover how Unusual Activity Reporting (UAR) helps organizations detect fraud, boost compliance, and enhance security with real-world examples and the latest industry insights.

Url Spoofing

Discover how URL spoofing tricks users with fake web addresses, the risks involved, and practical tips to protect yourself and your business from phishing attacks in our easy-to-understand guide.

User Behavior Anomaly Detection

Discover how User Behavior Anomaly Detection uses AI to spot unusual user activities, boost security, and improve user experience across industries. Learn key benefits, use cases, and recent trends.

Utility Fraud

What is utility fraud? Scams keep getting more numerous and sophisticated. You’re probably aware of the different invoicing schemes that exist to steal money and information from businesses. But did...

V

Validation

Discover why validation is essential for data integrity, compliance, and fraud prevention. Learn key use cases, recent stats, and how advanced tools streamline validation for your business.

Velocity Filters

Discover how velocity filters help analyze and detect rapid changes in data—from fraud prevention to traffic optimization. Learn their benefits, uses, and real-world impact in this insightful guide!

Velocity of Money

The velocity of money is a measurement of the rate at which money is exchanged in an economy. It is the number of times that money moves from one entity to another. It also refers to how much a unit...

Verified By Visa Vbv

Discover how Verified By Visa (VBV) adds extra security to online payments, reduces fraud, and benefits both shoppers and retailers. Learn how it works, its challenges, and recent industry stats.

Virtual Card Fraud

Discover how virtual card fraud works, the latest trends, and practical tips to protect your digital payments. Stay informed and secure with our comprehensive guide to virtual card safety.

Virtual Currency Compliance

Explore the essentials of virtual currency compliance, including AML, KYC, key regulations, and recent trends to help businesses stay secure and meet legal requirements in the digital asset space.

Virus

A computer virus is a kind of malevolent software or a piece of code that, when executed, is capable of copying itself and typically has a detrimental effect, such as corrupting the system or...

Vishing

Discover how vishing scams use phone calls to steal your personal info, learn key prevention tips, see recent trends, and find out how to protect yourself and your business from voice phishing threats.

Voice Authorization

Discover how voice authorization boosts security and convenience in transactions, with insights on benefits, challenges, top use cases, and the latest market trends. Explore the future of secure authentication!

Voice Biometric Fraud

Discover how fraudsters use advanced technology to mimic voices and bypass security. Learn the risks of voice biometric fraud and how to protect your organization with smart, modern solutions.

Voice Over Ip

Discover how Voice Over IP (VoIP) transforms communication with cost savings, flexibility, and fraud prevention insights, plus key market stats and answers to your top VoIP questions.

Voice Phishing (Vishing)

Discover how voice phishing (vishing) scams deceive people over the phone, the tactics used, who’s at risk, and practical tips to protect yourself and your business from these evolving threats.

W

Wallet Draining Scams

Learn how to spot and prevent wallet draining scams targeting your digital assets. Discover tactics used by scammers, real-world stats, and essential tips for keeping your funds safe.

Watchlist Screening

Discover how watchlist screening helps organizations prevent fraud, comply with regulations, and enhance security using advanced technology and real-time checks. Learn more in our detailed guide!

Web Browser

Discover how web browsers work, their key features, and their vital role in security and fraud prevention. Learn tips, market stats, and FAQs to help you browse smarter and stay protected online.

Web Scraping Fraud

Discover what web scraping fraud is, how it impacts businesses, and practical ways to protect your data from unauthorized bots and data theft in this essential guide for compliance and security teams.

Whaling Attack

Discover how whaling attacks target executives with sophisticated phishing tactics, their impact on organizations, and key strategies to protect your business from these growing cyber threats.

White-collar Financial Crime

Discover what white-collar financial crime is, its impact on society, common types, and how modern solutions like FraudNet help businesses detect and prevent fraud. Learn more in our latest blog!

Whitelisted Merchant Exploits

Discover how cybercriminals exploit trusted merchant lists to bypass security, the risks involved, and key strategies your business can use to detect and prevent whitelisted merchant fraud.

Whois

Discover how the Whois protocol reveals domain ownership, enhances transparency, aids fraud prevention, and why it matters for security, privacy, and compliance in today’s digital world.

Wire Fraud

Discover how wire fraud works, its growing impact, real-world examples, and ways to protect your business or yourself. Learn key prevention tips and see how technology helps fight fraud.

Wolfsberg Anti-Money Laundering Principles

Discover how the Wolfsberg Anti-Money Laundering Principles help financial institutions fight financial crime through enhanced oversight, customer due diligence, and robust compliance frameworks.

Work-from-Home Scam

A work-from-home scheme describes when a fraudster makes an offer to a victim to work from home for a very good amount of money. The fraud truly takes place when the fraudster attempts to illicit...

Workers' Compensation Fraud

Workers’ Compensation fraud occurs when someone willfully makes a false statement or conceals information in order to receive workers' compensation benefits or prevents someone from receiving...

Workflows 2

Discover how Workflows 2 streamlines business processes with advanced automation, real-time monitoring, and AI integration—boosting efficiency and simplifying compliance for companies of all sizes.

Write-Off Schemes

What are write-off schemes? Accountants use write-offs to report depreciation of the value of an asset or to indicate a loss so that the business doesn’t pay taxes on an asset that has a lower value....

X

Y

Z

Zero Trust Security

Discover the essentials of Zero Trust Security—why it matters, how it works, real-world use cases, and tips for successful implementation to safeguard your organization against modern cyber threats.

Zero-day Exploits

Discover what zero-day exploits are, why they pose serious cybersecurity threats, and how organizations can protect themselves from unseen vulnerabilities and attacks with timely detection and response.

eCheck Fraud

Discover how eCheck fraud happens, its risks, and the best ways to protect your finances. Learn about fraud trends, real-world examples, and effective prevention strategies in our latest blog post!

eCommerce Fraud

Discover the latest trends, types, and prevention tips for eCommerce fraud. Learn how businesses and consumers can stay safe and protect against evolving online threats in this comprehensive guide.

eSIM Fraud

Discover how eSIM fraud works, its risks, real-world cases, and key prevention tips. Learn how to protect yourself and your business from this emerging digital threat in our latest guide.

test slug 2

Discover what a test-slug is, its key role in software testing, and how it boosts test management, communication, and fraud prevention in various industries. Learn best practices and FAQs inside!

Get Started Today

Experience how FraudNet can help you reduce fraud, stay compliant, and protect your business and bottom line