SlideShare una empresa de Scribd logo
1 de 29
TeleSign
In Partnership with Impermium


Presents:



Live Webinar:
Stop Social Spam
ABOUT US: TeleSign is the global
                 leader in Intelligent Authentication
Forrest Hobbs    providing actionable data to
Vice President   secure online transactions, reduce
TeleSign         fraud, and improve the end-user
                 experience.


                  WHAT WE DO
                  ‣ Two-Factor Authentication
                  ‣ Phone-based Verification
                    (SMS/ Voice)
                  ‣ Intelligent Data (Phone type,
                    Device status, etc.
ABOUT US: Impermium provides
robust security for web sites and
social networks, leveraging user
reputation to defend against social
spam, account compromise,
transaction fraud, and abuse.


WHAT WE DO
‣ Real-time threat analysis
‣ Behavioral anomaly detection
                                      Mark Risher
‣ Social user reputation
                                      CEO
‣ Malicious content protection
                                      Impermium
Dear Sir or Madam:
I bid you to happiness to yourself
and to your own family in this day.

It is my ESTEEMED PLEASURE to be
presenting to you the sum total of
$1.000,40,000 UNITED STATES DOLLARS
(USD) from His Royal High Holiness,
the Esteemed Minister of Treasury
for the Oil Ministry of our country…
Social Media has Eclipsed Email
           (for good users and bad)
                                             Social media




                                              email




2005    2006   2007   2008   2009     2010    2011

                                                       5
Agenda


              Anatomy of the Attacks


                 Risks and Impact


         Three-Step Approach to Mitigation



                                             6
Wherever the Eyeballs Are

    Blog posts                 Message board posts


    Chat Messages              Direct Messages


    Reviews & listings         Comments



                               URL & link submissions
    Discussion forum threads



    Fraudulent user signups

                                                        7
Varieties of Social Spam


               Malicious Content




               Policy Abuse




               Commercial Content


                                    8
Malware Placement Aids Propagation




                                     9
Novel Sites & Links are Commonplace




                                      10
Acct. Compromise: Reputation Hijacking




                                     11
Acct. Compromise: Reputation Hijacking




                                     12
Social much more “viral” than email




 250:1
                                      13
Fraudsters Walk in the Front Door




                                    14
Bulk Accounts on the Open Market




                                   15
Malicious Content Repels Good Users



                                                  $#*!&!




                                                           •   Engagement
                                                           •   Loyalty
                                                           •   Pageviews
                                                           •   Brand Reputation


                                                                                  16
Icons copyright © http://deleket.deviantart.com
Indirect Effects Compounded



      Lost Advertising    PageRank
      Revenue
                          and SEO




       Manual                 Unreliable
       Review Costs           Site Metrics




                                             17
3-Step Approach


     Block Bogus Accounts


     Stop Spam & Malicious Content


     Prevent Account Hijacking
Block Bogus Accounts


                                              Accept   Account Creation




 Registration            Analysis
 Capture phone           Phone Type                    Phone Verify
 number                  Device/Subs Status            Ensure phone
Telephone Verification                         Flag
                         Past behavior                 number is valid &
                                                       reachable




                                                            Reject
                                              Deny
                                                          Registration
Importance of Phone Type
Certain phone types are more likely to be associated with online
fraud and considered higher risk.
How Verification Works
TeleSign Verify is a quick and simple way to prevent online fraud
and social spam by identifying legitimate users using their phone




     User enters phone      User receives       User logs in by
     number on              verification code   entering the
     website and clicks     on cell phone or    verification code
     “submit”               landline            onto the website
Stop Spam & Malicious Content

•   Active Moderation
     •Trained staff reviews/approves content
     •Scale & consistency challenges

•   Community Feedback
     •Cost-effective
     •Punishes most loyal users
     •Trailing indicator

•   Invitation-Only
     •Reduces engagement
     •Anti-Social

•   Individual Banning
     •Whack-a-mole
                                               22
Stop Spam & Malicious Content


     Behavioral anomaly detection




     Continuous user reputation




      Content analysis




                                    23
Stop Spam & Malicious Content
    Use these in conjunction to keep your house clean:


       Activity                 Phone Signals

‣   Bullying, insults       ‣ High-risk phone type
    and threats             ‣ Name/address tied to
‣   Suspicious signups        account
‣   Repeat offenders        ‣ Device or subscriber
‣   Malicious content         status
‣   Signs of account        ‣ Phone risk score
    compromise



         Allow

          Flag                  Phone Verify User

         Deny
Stop Spam & Malicious Content

                          10,000 Comments



                  Impermium    Human Moderation
Time to process   19 seconds   2-3 days
Accuracy          99.5%        95%
False Positives   4            79
Prevent Account Hijacking

Protect legitimate account owners from account takeover with
two-factor authentication in the following scenarios:


                Key changes to account information




                Unrecognized device or IP address




                Unusual activity
Prevent Account Hijacking


                                             Accept Change


 Risk-Based              Phone Verify
 Authentication          Use 2FA to ensure
  Two-factor auth.
Telephone Verification   that account
  Account changes       changes are
  Password resets       legitimate


                                             Reject Change
Special Webinar Offers
SPECIAL REPORT                     SPECIAL OFFER:
Complete our post-webinar survey   Sign up by 12/31/12 and get 50%
and we’ll send you a copy of our   off your first THREE MONTHS of
report.                            service.*




                                    TAKE         50% OFF
                                    your first 3 months of services


                                   * Limitations apply.
Thank you.

Have questions?

Email us at
learnmore@telesign.com

Más contenido relacionado

Destacado

My life project
My life projectMy life project
My life projectyessicavd
 
Present continuous 2n ESO
Present continuous 2n ESOPresent continuous 2n ESO
Present continuous 2n ESOteacherhector
 
Marketing Eye
Marketing Eye Marketing Eye
Marketing Eye lopo08
 
Word pressセミナー東京[マイナビ主催] 阿部20131216
Word pressセミナー東京[マイナビ主催] 阿部20131216Word pressセミナー東京[マイナビ主催] 阿部20131216
Word pressセミナー東京[マイナビ主催] 阿部20131216Masayuki Abe
 
Presentation Skillz - Prax (Teens) Managers
Presentation Skillz - Prax (Teens) ManagersPresentation Skillz - Prax (Teens) Managers
Presentation Skillz - Prax (Teens) ManagersOsama Sherif
 
Digital Marketing Plan -TBF
Digital Marketing Plan -TBFDigital Marketing Plan -TBF
Digital Marketing Plan -TBFHamza Khan
 
Prohibitions of Riba in Qura'n and Ahadith
Prohibitions of Riba in Qura'n and AhadithProhibitions of Riba in Qura'n and Ahadith
Prohibitions of Riba in Qura'n and AhadithMasoud A. Dar
 
Концепция проекта Optimal Management
Концепция проекта Optimal ManagementКонцепция проекта Optimal Management
Концепция проекта Optimal ManagementAndrey Sukhobokov
 
Musafir hun yaaron prelimswith answers
Musafir hun yaaron prelimswith answersMusafir hun yaaron prelimswith answers
Musafir hun yaaron prelimswith answersyati_raj
 
20160609 jc sudre_madrid_v0.0
20160609 jc sudre_madrid_v0.020160609 jc sudre_madrid_v0.0
20160609 jc sudre_madrid_v0.0Jean-Claude Sudre
 
Bahan presentase evaluasi ouap
Bahan presentase evaluasi ouapBahan presentase evaluasi ouap
Bahan presentase evaluasi ouapLitel Mejik
 
Turismo straniero in italia nel 2010
Turismo straniero in italia nel 2010Turismo straniero in italia nel 2010
Turismo straniero in italia nel 20103feb88
 
Hist 141 california and the civil war
Hist 141   california and the civil warHist 141   california and the civil war
Hist 141 california and the civil warflip7rider
 
Презентация элективного курса по английскому языку
Презентация элективного курса по английскому языкуПрезентация элективного курса по английскому языку
Презентация элективного курса по английскому языкуloksal
 
Broan nutone canada green initiatives 2006 2010
Broan nutone canada green initiatives 2006 2010Broan nutone canada green initiatives 2006 2010
Broan nutone canada green initiatives 2006 2010OssoElectric
 
2300.10.133 rev a
2300.10.133 rev a2300.10.133 rev a
2300.10.133 rev aIvan Zea
 

Destacado (20)

My life project
My life projectMy life project
My life project
 
Present continuous 2n ESO
Present continuous 2n ESOPresent continuous 2n ESO
Present continuous 2n ESO
 
Marketing Eye
Marketing Eye Marketing Eye
Marketing Eye
 
Word pressセミナー東京[マイナビ主催] 阿部20131216
Word pressセミナー東京[マイナビ主催] 阿部20131216Word pressセミナー東京[マイナビ主催] 阿部20131216
Word pressセミナー東京[マイナビ主催] 阿部20131216
 
Abstract
AbstractAbstract
Abstract
 
Present simple
Present simplePresent simple
Present simple
 
Presentation Skillz - Prax (Teens) Managers
Presentation Skillz - Prax (Teens) ManagersPresentation Skillz - Prax (Teens) Managers
Presentation Skillz - Prax (Teens) Managers
 
Syro malankara rite
Syro malankara rite Syro malankara rite
Syro malankara rite
 
Digital Marketing Plan -TBF
Digital Marketing Plan -TBFDigital Marketing Plan -TBF
Digital Marketing Plan -TBF
 
Prohibitions of Riba in Qura'n and Ahadith
Prohibitions of Riba in Qura'n and AhadithProhibitions of Riba in Qura'n and Ahadith
Prohibitions of Riba in Qura'n and Ahadith
 
Концепция проекта Optimal Management
Концепция проекта Optimal ManagementКонцепция проекта Optimal Management
Концепция проекта Optimal Management
 
Musafir hun yaaron prelimswith answers
Musafir hun yaaron prelimswith answersMusafir hun yaaron prelimswith answers
Musafir hun yaaron prelimswith answers
 
20160609 jc sudre_madrid_v0.0
20160609 jc sudre_madrid_v0.020160609 jc sudre_madrid_v0.0
20160609 jc sudre_madrid_v0.0
 
Bahan presentase evaluasi ouap
Bahan presentase evaluasi ouapBahan presentase evaluasi ouap
Bahan presentase evaluasi ouap
 
Turismo straniero in italia nel 2010
Turismo straniero in italia nel 2010Turismo straniero in italia nel 2010
Turismo straniero in italia nel 2010
 
Hist 141 california and the civil war
Hist 141   california and the civil warHist 141   california and the civil war
Hist 141 california and the civil war
 
บทที่ 5 ทวีชัย
บทที่ 5 ทวีชัยบทที่ 5 ทวีชัย
บทที่ 5 ทวีชัย
 
Презентация элективного курса по английскому языку
Презентация элективного курса по английскому языкуПрезентация элективного курса по английскому языку
Презентация элективного курса по английскому языку
 
Broan nutone canada green initiatives 2006 2010
Broan nutone canada green initiatives 2006 2010Broan nutone canada green initiatives 2006 2010
Broan nutone canada green initiatives 2006 2010
 
2300.10.133 rev a
2300.10.133 rev a2300.10.133 rev a
2300.10.133 rev a
 

Similar a Telesign impermium webinar deck-121312

Phishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark WorldPhishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark WorldAvishek Datta
 
Why do THEY want your digital devices?
Why do THEY want your digital devices?Why do THEY want your digital devices?
Why do THEY want your digital devices?ESET
 
Online Brand Protection: Fighting Domain Name Typosquatting, Website Spoofing...
Online Brand Protection:Fighting Domain Name Typosquatting, Website Spoofing...Online Brand Protection:Fighting Domain Name Typosquatting, Website Spoofing...
Online Brand Protection: Fighting Domain Name Typosquatting, Website Spoofing...WhoisXML API
 
Identity, Authentication, and Programmable Telecoms Session
Identity, Authentication, and Programmable Telecoms SessionIdentity, Authentication, and Programmable Telecoms Session
Identity, Authentication, and Programmable Telecoms SessionAlan Quayle
 
apidays London 2023 - Building Multi-Factor Authentication into your applicat...
apidays London 2023 - Building Multi-Factor Authentication into your applicat...apidays London 2023 - Building Multi-Factor Authentication into your applicat...
apidays London 2023 - Building Multi-Factor Authentication into your applicat...apidays
 
Cybersecurity Awareness for employees.pptx
Cybersecurity Awareness for employees.pptxCybersecurity Awareness for employees.pptx
Cybersecurity Awareness for employees.pptxAbdullaFatiya3
 
Cyber Crime & Precautions
Cyber Crime & PrecautionsCyber Crime & Precautions
Cyber Crime & PrecautionsTalwant Singh
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingSachin Saini
 
Beware of Scam Artists - Recognize Them Before They Get You!
Beware of Scam Artists - Recognize Them Before They Get You!Beware of Scam Artists - Recognize Them Before They Get You!
Beware of Scam Artists - Recognize Them Before They Get You!Narayan Makaram
 
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2NetLockSmith
 
Phishing Awareness Training.pptx
Phishing Awareness Training.pptxPhishing Awareness Training.pptx
Phishing Awareness Training.pptxHajar Bouchriha
 
Deliverability and The Realities and Demands of Today's Market
Deliverability and The Realities and Demands of Today's MarketDeliverability and The Realities and Demands of Today's Market
Deliverability and The Realities and Demands of Today's MarketAct-On Software
 
Deliverability and The Realities of Today’s Market
Deliverability and The Realities of Today’s MarketDeliverability and The Realities of Today’s Market
Deliverability and The Realities of Today’s MarketAct-On Software
 
OWASP_Presentation_FINAl. Cybercrime and cyber security awareness
OWASP_Presentation_FINAl. Cybercrime and cyber security awarenessOWASP_Presentation_FINAl. Cybercrime and cyber security awareness
OWASP_Presentation_FINAl. Cybercrime and cyber security awarenessMaherHamza9
 
Faisal Abidi’s Thoughts on How to Deal with Internet Frauds/Scams
Faisal Abidi’s Thoughts on How to Deal with Internet Frauds/Scams Faisal Abidi’s Thoughts on How to Deal with Internet Frauds/Scams
Faisal Abidi’s Thoughts on How to Deal with Internet Frauds/Scams Faisal Abidi
 
Enjoy Safer Technology and Defeat Cyber Criminals
Enjoy Safer Technology and Defeat Cyber CriminalsEnjoy Safer Technology and Defeat Cyber Criminals
Enjoy Safer Technology and Defeat Cyber CriminalsStephen Cobb
 

Similar a Telesign impermium webinar deck-121312 (20)

Phishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark WorldPhishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark World
 
Why do THEY want your digital devices?
Why do THEY want your digital devices?Why do THEY want your digital devices?
Why do THEY want your digital devices?
 
Online Brand Protection: Fighting Domain Name Typosquatting, Website Spoofing...
Online Brand Protection:Fighting Domain Name Typosquatting, Website Spoofing...Online Brand Protection:Fighting Domain Name Typosquatting, Website Spoofing...
Online Brand Protection: Fighting Domain Name Typosquatting, Website Spoofing...
 
Identity, Authentication, and Programmable Telecoms Session
Identity, Authentication, and Programmable Telecoms SessionIdentity, Authentication, and Programmable Telecoms Session
Identity, Authentication, and Programmable Telecoms Session
 
apidays London 2023 - Building Multi-Factor Authentication into your applicat...
apidays London 2023 - Building Multi-Factor Authentication into your applicat...apidays London 2023 - Building Multi-Factor Authentication into your applicat...
apidays London 2023 - Building Multi-Factor Authentication into your applicat...
 
Phishing
PhishingPhishing
Phishing
 
Phishing
PhishingPhishing
Phishing
 
Cybersecurity Awareness for employees.pptx
Cybersecurity Awareness for employees.pptxCybersecurity Awareness for employees.pptx
Cybersecurity Awareness for employees.pptx
 
Phishing Technology
Phishing TechnologyPhishing Technology
Phishing Technology
 
Cyber Crime & Precautions
Cyber Crime & PrecautionsCyber Crime & Precautions
Cyber Crime & Precautions
 
Computer 4 ict
Computer 4 ictComputer 4 ict
Computer 4 ict
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
 
Beware of Scam Artists - Recognize Them Before They Get You!
Beware of Scam Artists - Recognize Them Before They Get You!Beware of Scam Artists - Recognize Them Before They Get You!
Beware of Scam Artists - Recognize Them Before They Get You!
 
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2
 
Phishing Awareness Training.pptx
Phishing Awareness Training.pptxPhishing Awareness Training.pptx
Phishing Awareness Training.pptx
 
Deliverability and The Realities and Demands of Today's Market
Deliverability and The Realities and Demands of Today's MarketDeliverability and The Realities and Demands of Today's Market
Deliverability and The Realities and Demands of Today's Market
 
Deliverability and The Realities of Today’s Market
Deliverability and The Realities of Today’s MarketDeliverability and The Realities of Today’s Market
Deliverability and The Realities of Today’s Market
 
OWASP_Presentation_FINAl. Cybercrime and cyber security awareness
OWASP_Presentation_FINAl. Cybercrime and cyber security awarenessOWASP_Presentation_FINAl. Cybercrime and cyber security awareness
OWASP_Presentation_FINAl. Cybercrime and cyber security awareness
 
Faisal Abidi’s Thoughts on How to Deal with Internet Frauds/Scams
Faisal Abidi’s Thoughts on How to Deal with Internet Frauds/Scams Faisal Abidi’s Thoughts on How to Deal with Internet Frauds/Scams
Faisal Abidi’s Thoughts on How to Deal with Internet Frauds/Scams
 
Enjoy Safer Technology and Defeat Cyber Criminals
Enjoy Safer Technology and Defeat Cyber CriminalsEnjoy Safer Technology and Defeat Cyber Criminals
Enjoy Safer Technology and Defeat Cyber Criminals
 

Telesign impermium webinar deck-121312

  • 1. TeleSign In Partnership with Impermium Presents: Live Webinar: Stop Social Spam
  • 2. ABOUT US: TeleSign is the global leader in Intelligent Authentication Forrest Hobbs providing actionable data to Vice President secure online transactions, reduce TeleSign fraud, and improve the end-user experience. WHAT WE DO ‣ Two-Factor Authentication ‣ Phone-based Verification (SMS/ Voice) ‣ Intelligent Data (Phone type, Device status, etc.
  • 3. ABOUT US: Impermium provides robust security for web sites and social networks, leveraging user reputation to defend against social spam, account compromise, transaction fraud, and abuse. WHAT WE DO ‣ Real-time threat analysis ‣ Behavioral anomaly detection Mark Risher ‣ Social user reputation CEO ‣ Malicious content protection Impermium
  • 4. Dear Sir or Madam: I bid you to happiness to yourself and to your own family in this day. It is my ESTEEMED PLEASURE to be presenting to you the sum total of $1.000,40,000 UNITED STATES DOLLARS (USD) from His Royal High Holiness, the Esteemed Minister of Treasury for the Oil Ministry of our country…
  • 5. Social Media has Eclipsed Email (for good users and bad) Social media email 2005 2006 2007 2008 2009 2010 2011 5
  • 6. Agenda Anatomy of the Attacks Risks and Impact Three-Step Approach to Mitigation 6
  • 7. Wherever the Eyeballs Are Blog posts Message board posts Chat Messages Direct Messages Reviews & listings Comments URL & link submissions Discussion forum threads Fraudulent user signups 7
  • 8. Varieties of Social Spam Malicious Content Policy Abuse Commercial Content 8
  • 9. Malware Placement Aids Propagation 9
  • 10. Novel Sites & Links are Commonplace 10
  • 13. Social much more “viral” than email 250:1 13
  • 14. Fraudsters Walk in the Front Door 14
  • 15. Bulk Accounts on the Open Market 15
  • 16. Malicious Content Repels Good Users $#*!&! • Engagement • Loyalty • Pageviews • Brand Reputation 16 Icons copyright © http://deleket.deviantart.com
  • 17. Indirect Effects Compounded Lost Advertising PageRank Revenue and SEO Manual Unreliable Review Costs Site Metrics 17
  • 18. 3-Step Approach Block Bogus Accounts Stop Spam & Malicious Content Prevent Account Hijacking
  • 19. Block Bogus Accounts Accept Account Creation Registration Analysis Capture phone Phone Type Phone Verify number Device/Subs Status Ensure phone Telephone Verification Flag Past behavior number is valid & reachable Reject Deny Registration
  • 20. Importance of Phone Type Certain phone types are more likely to be associated with online fraud and considered higher risk.
  • 21. How Verification Works TeleSign Verify is a quick and simple way to prevent online fraud and social spam by identifying legitimate users using their phone User enters phone User receives User logs in by number on verification code entering the website and clicks on cell phone or verification code “submit” landline onto the website
  • 22. Stop Spam & Malicious Content • Active Moderation •Trained staff reviews/approves content •Scale & consistency challenges • Community Feedback •Cost-effective •Punishes most loyal users •Trailing indicator • Invitation-Only •Reduces engagement •Anti-Social • Individual Banning •Whack-a-mole 22
  • 23. Stop Spam & Malicious Content Behavioral anomaly detection Continuous user reputation Content analysis 23
  • 24. Stop Spam & Malicious Content Use these in conjunction to keep your house clean: Activity Phone Signals ‣ Bullying, insults ‣ High-risk phone type and threats ‣ Name/address tied to ‣ Suspicious signups account ‣ Repeat offenders ‣ Device or subscriber ‣ Malicious content status ‣ Signs of account ‣ Phone risk score compromise Allow Flag Phone Verify User Deny
  • 25. Stop Spam & Malicious Content 10,000 Comments Impermium Human Moderation Time to process 19 seconds 2-3 days Accuracy 99.5% 95% False Positives 4 79
  • 26. Prevent Account Hijacking Protect legitimate account owners from account takeover with two-factor authentication in the following scenarios: Key changes to account information Unrecognized device or IP address Unusual activity
  • 27. Prevent Account Hijacking Accept Change Risk-Based Phone Verify Authentication Use 2FA to ensure  Two-factor auth. Telephone Verification that account  Account changes changes are  Password resets legitimate Reject Change
  • 28. Special Webinar Offers SPECIAL REPORT SPECIAL OFFER: Complete our post-webinar survey Sign up by 12/31/12 and get 50% and we’ll send you a copy of our off your first THREE MONTHS of report. service.* TAKE 50% OFF your first 3 months of services * Limitations apply.
  • 29. Thank you. Have questions? Email us at learnmore@telesign.com

Notas del editor

  1. Hello, I’m Forrest Hobbs and I’m the VP of Sales here at TeleSign. Let me start by telling you a little about what we do at TeleSignWhat We DO- Prevent social spam- prevent bulk registration
  2. Hello, I’m Forrest Hobbs and I’m the VP of Sales here at TeleSign. Let me start by telling you a little about what we do at TeleSignWhat We DO- Prevent social spam- prevent bulk registration
  3. As with malware and links, account hacking and account compromise continue to rise.While some public incidents have been limited to pranks, a few more recent one have led to true “reputation hijacking,” where malicious and dangerous acts have been conducted under the guise of someone else.
  4. Not even the best prices; the Whitepaper has some better bargains ;)
  5. Lost Advertising RevenueUnmonetized ImpressionsAdvertiser/Exchange PolicyPageRank and SEOGoogle Panda & PenguinRelevanceGuilt by AssociationManual Review CostsEfficiencyAccuracyConsistencyUnreliable Site Metrics
  6. Closing the front door means the measures you can take to prevent spammers from creating bogus accounts that they use as a platform for proliferating spam. We recommend that all social media sites require a phone number at registration. Even if you don’t phone verify every new registrant, you will have their phone number on record if you want to phone verify later in the game. We will talk more about this in the Close the Door section coming up.[CONFIRM WITH MARK]: In parallel, Impermium uses a combination of past behavior of the user, content patterns within the user's output, and similarity to malicious events across other networks to determine whether to allow, flag or deny new registrants.
  7. TeleSign Verify offers a more reliable way to authenticate new accounts and prevent account compromise.The SolutionUser provides the phone number at account registrationWe send a one-time passcode to that phoneUser enters that passcode into the website to activate the accountWhat does this accomplish?Verfies that the number provided is validVerifies that the user is in possession of that phone
  8. TeleSign Verify offers a more reliable way to authenticate new accounts and prevent account compromise.The SolutionUser provides the phone number at account registrationWe send a one-time passcode to that phoneUser enters that passcode into the website to activate the accountWhat does this accomplish?Verfies that the number provided is validVerifies that the user is in possession of that phone
  9. Behavioral anomaly detectionAbuse policy enforcementBusiness logic violationsContinuous user reputationBegins at signupAdjusted with every subsequent actEarned reputation is no guaranteeContent analysisFlagrant indicators do existContext mattersBad guys move in herdshttp://wickedfire.com & http://blackhatworld.comBrazenly reselling their toolsNot just English-language
  10. Key changes to account information: Changes to passwords, payment info and email addressesIf users are posting to larger forums, have a high velocity of posts within a short timeframe or have been flagged as suspicious.
  11. Closing the front door means the measures you can take to prevent spammers from creating bogus accounts that they use as a platform for proliferating spam. We recommend that all social media sites require a phone number at registration. Even if you don’t phone verify every new registrant, you will have their phone number on record if you want to phone verify later in the game. We will talk more about this in the Close the Door section coming up.[CONFIRM WITH MARK]: In parallel, Impermium uses a combination of past behavior of the user, content patterns within the user's output, and similarity to malicious events across other networks to determine whether to allow, flag or deny new registrants.
  12. Hello, I’m Forrest Hobbs and I’m the VP of Sales here at TeleSign. Let me start by telling you a little about what we do at TeleSignWhat We DO- Prevent social spam- prevent bulk registration