Our solution sets traps to detect unauthorized webpage modifications in the browser. The Honeypot trap appears to malware that a user is navigating to the type of high value websites malware generally targets. As the malware attempts to attack a user by injecting additional Web content, such as additional form elements, or popup dialogues asking for personal information, our Honeypot detects those changes in real-time.
Through continuous research, ThreatMetrix’s leading edge device identification uses multiple methods to expose an individual’s intent hidden in the attributes of the user’s device. ThreatMetrix provides two separate and distinct approaches to identify devices.
SmartID™ identifies returning visitors that wipe cookies, use private browsing, and change other device parameters to bypass device fingerprinting. It improves your ability to detect returning visitors, especially those trying to elude identification and reduces false positives.
ExactID™ relies on a variety of persistent markers (browser cookies, Adobe Flash cookies, HTML 5 local storage) that allows even more accurate identification of a device.
Location Identification: The location of an identity is an integral part of validation when it comes to security. The consumer’s location may prove crucial in identifying potential fraud. Examination of geographical attributes such as DNS IP, Proxy IP, VPN and Tor networks can expose botnets along with any techniques used by fraudster to bypass location-based authentication.