
Unauthorized account openings increased by 21% in the last 12 months
Fifty-eight million consumers had a new account opened without their authorization in the last 12 months, a 21% increase compared to 2020, yet less than half of Americans know …
IDology integrates its ExpectID solution with the Microsoft Azure Active Directory External Identities
IDology, a GBG company, announced a partnership with Microsoft to integrate its innovative ExpectID identity verification and anti-fraud solution with the Microsoft Azure …

Companies unprepared to deal with mobile attacks, synthetic identity fraud, CCPA compliance
There is a growing impact of large-scale data breaches and fraud on consumer trust and the critical need for businesses to balance the digital consumer experience with strong …
IDology to be acquired by GBG for $300m
GBG, the UK-headquartered Identity Data Intelligence specialist, announces that it has conditionally agreed to acquire the entire issued share capital of IDology, a US-based …

Identity verification: Staying ahead of post-breach era consumer preferences
In the wake of numerous high-profile data breaches and privacy incidents, consumers are increasingly concerned about the security of their identities and what companies are …

Measuring fraud trends across various industries
Businesses across industries are experiencing more sophisticated fraud attempts across multiple customer-not-present channels, according to IDology. Shifting fraud tactics and …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility