Attention Trainee
You will need to rotate your device to the portrait (vertical) position, if you wish to continue your training.
PLAYER NAME
CHALLENGE STATUS
LOREM
IPSUM DOLOR
SIT AMET SUL
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
USER LOGIN A
USER LOGIN B
USER LOGIN A

Correct!

IBM Trusteer solutions look at behavioral biometrics, like keystrokes, mouse movements, and site navigation. Most legitimate users will type their details, while a cybercriminal is more likely to copy and paste from a separate list of compromised credentials.

incorrect

IBM Trusteer solutions look at behavioral biometrics, like keystrokes, mouse movements, and site navigation. Most legitimate users will type their details, while a cybercriminal is more likely to copy and paste from a separate list of compromised credentials.

USER LOGIN B 

how well do you know fraud?

What percentage of new account fraud is
completed with stolen identities of potentially legitimate users?

SELECT YOUR ANSWER

CORRECT!

41% of new account fraud is completed with stolen identities. It’s hard to tell whether you can trust someone if their initial account information is for a real person. IBM Trusteer can help by analyzing multiple additional layers of information to provide a more accurate risk assessment for new users.

incorrect

41% of new account fraud is completed with stolen identities. It’s hard to tell whether you can trust someone if their initial account information is for a real person. IBM Trusteer can help by analyzing multiple additional layers of information to provide a more accurate risk assessment for new users.

Time on PAge A 
Time on page B

CORRECT!

IBM Trusteer solutions can track the amount of time spent on a page during set up to help predict the risk of fraudulent behavior. A fraudster’s session will be quite short as they likely are familiar with the login process. A true user will typically take time to read the page and ensure proper set up.

time on site b
time on site a

INCorrect

IBM Trusteer solutions can track the amount of time spent on a page during set up to help predict the risk of fraudulent behavior. A fraudster’s session will be quite short as they likely are familiar with the login process. A true user will typically take time to read the page and ensure proper set up.

Should You Allow this User?

A new user appears in on your radar. His name is Buster Dawson from San Francisco, CA, according to his credentials. He is creating a new bank account through his banking app on his prepaid device. His device is already attached to five other accounts and his IP Geo Location appears from Russia, however, he may be traveling. Do you let Buster open an account seamlessly?

SELECT YOUR ANSWER

CORRECT!

IBM Trusteer solutions identify details such as the IP address of where the account is being created, time zone, mobile service provider, and presence of pre-paid or disposable SIM cards. Each piece adds up, helping to detect potential fraudulent activity.

incorrect

IBM Trusteer solutions identify details such as the IP address of where the account is being created, time zone, mobile service provider, and presence of pre-paid or disposable SIM cards. Each piece adds up, helping to detect potential fraudulent activity.

homescreen a
homescreen b
homescreen a

Correct!

Jailbroken phones may allow users greater options to customize their devices with different home screens and icons. However, they also have security implications. IBM Trusteer solutions monitor a device’s security hygiene and can identify when a device may be more vulnerable to threats.

incorrect

Jailbroken phones may allow users greater options to customize their devices with different home screens and icons. However, they also have security implications. IBM Trusteer solutions monitor a device’s security hygiene and can identify when a device may be more vulnerable to threats.

homescreen b

how well do you know fraud?

How much new account fraud is committed with synthetic or partially stolen identities?

SELECT YOUR ANSWER

CORRECT!

Synthetic identities are complicated to set up and often indicate sophisticated fraudsters. Though they make up just 27% of new account fraud, they are notoriously difficult to detect. IBM Trusteer solutions correlate rich proprietary insights to help detect and predict the risk of fraudulent intent.

incorrect

Synthetic identities are complicated to set up and often indicate sophisticated fraudsters. Though they make up just 27% of new account fraud, they are notoriously difficult to detect. IBM Trusteer solutions correlate rich proprietary insights to help detect and predict the risk of fraudulent intent.

transactions a
Attention Trainee
You will need to rotate your device to the portrait (vertical) position, if you wish to continue your training.
transactions b
transactions a

Correct!

IBM Trusteer solutions monitor new account activity to help identify potential fraud. Many times, fraudsters will add payees and make multiple money transfers, behavior rarely seen in legitimate users.

incorrect

IBM Trusteer solutions monitor new account activity to help identify potential fraud. Many times, fraudsters will add payees and make multiple money transfers, behavior rarely seen in legitimate users.

transaction b

rank attained

operative

Congratulations Player Name, You passed most of the challenges. Well done.

rank attained

operative

Congratulations Player Name,
You passed most of the challenges. Well done.

 ibm trusteer
Now that your training is done, learn more about how you can transparently detect fraud with IBM Trusteer.