Man vs Machine: Fraudologists’ Guide to Defeating Attacks
Tuesday, March 22 • On-Demand
Man vs Machine: Fraudologists’ Guide to Defeating Attacks
Long gone are the days of the solo fraudster working from a laptop, handpicking victims. Nowadays, fraud is controlled by organized criminals with vast resources who invest heavily in the technology they use for their attacks. Why would hackers manually test out stolen credit cards one by one when they can set up a program to test thousands of them in minutes?
Fraud teams need to understand their enemies and combine technology and a strong management strategy to defeat todays threats.
In this webinar, we will analyze the latest tactics and technology used to combat different types of attacks, including emulators, credential stuffing, cloud phones, app cloners, proxies, hooks, jailbreaks, and more.