How fraudsters are disguising PCs to fool device fingerprinting

By | June 6, 2012

Source: Help Net Security

by Amit Klein

In this article “Cybercriminals know that financial and ecommerce providers often use fraud detection systems that monitor for anomalous transactions and behaviors. In order to bypass these systems, they are continuously looking for ways to conceal behaviors that might be identified as potential fraud.

Trusteer came across a tutorial published in underground forums that explains how to circumvent fraud detection systems that use device identification to track and detect anomalous transaction and access patterns. “

Leave a Reply