We have updated our data in a number of ways in preparation for the rollout of iCloud Private Relay. We have worked with Apple’s to ensure that our data accurately reflects how Private Relay works and delivers the best possible experience for your users.Continue reading
Demyst’s Platform has helped Tier 1 financial services firms modernize and leverage external data workflows for over 10 years. Account takeover and synthetic fraud can be expensive for Demyst’s clients in online payments, banking, and insurance. Demyst’s VP of Product Strategy Prashant Reddy explains that the data provided by the minFraud service fills a key niche in the solutions Demyst’s clients are creating.Continue reading
Simplex has been changing the status quo of crypto purchases since 2014. As the market leader, they pioneered the first riskless global fiat onramp using a credit and debit card, which promises a zero chargeback guarantee. With a zero chargeback guarantee in place, there’s a lot at stake in fraud detection and prevention. When they were putting together their platform, they knew from the beginning that they would need an agile, responsive algorithm at the heart of their fraud detection and prevention solutions. Simplex Data Analyst Talor Kars works closely with that algorithm.Continue reading
We’ve added documentation to our developer’s site giving a tutorial on how to import the CSV versions of our GeoIP2 and GeoLite2 databases into PostgreSQL and MySQL. In addition to the basic information about how to bring MaxMind’s data into these popular database frameworks, we have also included pointers from our dev team on how to index and organize them for faster searching.
You can import GeoIP2 and GeoLite2 data into your database in order to more easily manipulate and transform the data, or join and link the data with other datasets.Check out the tutorials for PostgreSQL and MySQL on our developer’s site.
With nearly two decades in the business of IP geolocation, we spend a lot of time thinking about accuracy, but, as with all things big data, a simple question usually has a complex answer. As we approach our twentieth anniversary, we’ll be offering some insights into the industry. This month we’ll cover the basics, answering questions about how accurate IP geolocation is and why. In this post, we’ll talk about some common assumptions about how IP geolocation works and contextualize those assumptions in light of the structure of the internet and the distribution of the IP space across geographical regions. In light of these considerations, we’ll develop a deeper understanding of the constraints and opportunities for IP geolocation.Continue reading
When Vignesh Krishan founded Research Defender in 2018 he knew that managing fraud was critical in the global market research industry. The company set out to deliver high-quality consumer insights for companies in diverse industries all over the world. They understood even before they got started that ensuring the quality and integrity of the research was going to be essential to their success and the success of their customers.Continue reading
Leveraging the strengths and understanding the limits of IP geolocation, the Rescue Lab plays a critical role in rescuing children from online sexual exploitation crimes.
Warning: The following article discusses child sexual abuse and may be disturbing to some readers.
The scale of the problem is staggering. Every month, more than 800,000 people share images and videos of children being sexually abused. The sharing of these images is a re-victimization of the abused, haunting them well into their adulthood. And the investigation of sharing by law enforcement has time and time again led to the rescue of a different child being actively abused. The sheer volume of child sexual abuse materials being shared online poses what was, for many years, an impossible logistical challenge.
The issue isn’t a lack of people who care. The problem is one of sorting. If there’s a pool of 800,000 potential cases, all of which occur in the geographically nebulous space of “the internet,” how do you distribute these cases among the thousands of people—law enforcement officers—who have devoted their lives to fighting child sexual abuse? Without a method to effectively sort investigations into geographical jurisdictions, the cases are unmanageable. Figuring which of these offenders may be in your area would be like looking for a needle in a haystack.Continue reading
by Thomas Neirnyck
This article was originally published on The Elastic Blog on Jan 20, 2021.
This tutorial shows how you can leverage GeoIP data using tools developed by Elastic. Elastic builds software to make data usable in real time and at scale for search, logging, security, and analytics use cases. Elastic’s tools make it easier for operations teams to keep applications running, or give security professionals a one-stop-shop for spotting and neutralizing digital threats. Learn more at elastic.co.
Want to create a map of where your users are? With the GeoIP processor, you can easily attach the location of your users to your user metrics.Continue reading