Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity NewswireAccess ManagementIdentity Management

Using Machine Learning to Fight Fraud, Redirect Security Strategies and Protect Users

By Kevin Lee
Email, Spymail, Cybersecurity, Cyber espionage
May 7, 2018

By now, everyone has heard of fake news, aka, misinformation, or propaganda. While false or misleading news precedes the internet, fake news has now become a singular part of a much larger problem in the digital world called content abuse. This includes any form of user generated content that is malicious in nature--trolling, bullying, harassment, fake reviews and social engineering scams that play on our emotions to trick us into handing over money, data, or in the case of the recent 2016 presidential election scandal involving Facebook and consulting firm Cambridge Analytica, our votes.

Digital identities are rapidly growing, and with more and more users online - we have a reported 3.8 billion users online as of 2017 - criminals, armed with machine learning technologies, are gaining access to an increasing amount of information they can use to identify and exploit our vulnerabilities. On the flip side of this, machine learning has proven a powerful force in fighting back against fraudsters, malicious content, abuse and more. Without it, businesses are running on antiquated methods for identifying fraud, fraudsters stay a step ahead, and the cost to businesses can be very high.

Although harder to quantify than direct losses such as chargebacks or fraudulent purchases, for businesses on the receiving end, abusive content is arguably more costly because it attacks a company’s  top line-- the user. Losing user trust means customer acquisition costs go up, and lifetime value of a customer goes down.

The fallout from the Facebook-Cambridge Analytica scandal shows these costs quite clearly: A recent poll found that just 41 percent of Americans trust Facebook to protect their privacy. Facebook’s market value dropped $60 billion dollars in a 48 hour span, as the hashtag #DeleteFacebook went viral.

What abusive content looks like

Combating fraud and abuse online is becoming more and more difficult because there’s no clear definition of what this looks like due to the volume and varying types of fraud. Catfishing and cyberbullying have gained traction in the mainstream in recent years, as users who have fallen victim to these malicious activities seek to expose them to the broader population of digital users.

Marketplace scams are also common - for example, Amazon’s recent troubles with things like hackers stealing account credentials from legitimate merchants and selling non-existent or fake goods. In this case, buyers don’t realize until the fake goods are received, or in many cases no goods are received, that a scam has taken place. By then the “seller” is long gone - with the buyer’s money.

Often, users turn their anger at being scammed, catfished, or having their user data shared without their consent or knowledge towards the platform they’ve been using. The expectation is that these companies are putting the necessary technology in place to protect their users, and when they don’t, the users lose trust in that company’s ability to protect them from fraud. This ultimately affects a company's top line - it’s users - and bottom line - its profits - and rebuilding user trust is no easy feat. These businesses need to find the best and most effective way to protect themselves and their users or risk falling prey continuously to fraudsters, scammers, and malicious and abusive content.

Machine learning to the rescue

Fraudsters have found their way around the basic protections most sites have in place. The way sites often deal with content abuse is to hire a team of content moderators whose job it is to comb through ratings and reviews or watch videos. They’re usually supported by rules-based systems and blacklists that look at each piece of content for rules violations, and either block offending content or flag it for moderators to review.

Professional scammers know this, so rules-based systems have become a never-ending game of whack a mole. They are not agile enough to respond to new words or slang terms, and they are very difficult to scale. Additionally, they are not designed to be able to consider user behavior at all. That can result in “false positives” where legitimate users are actually turned away, while fraudulent users skate under the radar.

Machine learning-based technology can analyze far more signals than what rules-based systems can handle, and look at them all simultaneously to form a more complete picture. This is a far more effective approach, because fraudsters can alter text to avoid triggering the rules, but it’s harder to alter signals such as what device they’re using, or the speed at which they’re posting. For example, if someone signs up for 15 accounts and starts posting to each of them within two minutes of signing up, the machine compares that to the behavior of an average user and flags it as an anomaly.

More and more companies are realizing the power machine learning has to keep hackers and fraudsters from scamming legitimate users. For example, Zoosk uses machine learning to streamline their fraud management workflow, helping analysts review content more efficiently. That way, they can quickly identify what is and isn’t fraudulent on the platform. Machine learning models enable companies that rely on user-generated content to access the most accurate data faster, so they can make more informed decisions in real time, such as blocking users and investigating suspicious content.

Considering all the factors

As machine learning systems gather more data, they generate new insights that can make the picture ever sharper. One insight we’ve uncovered with machine learning is that users with iPhone 5s are seven times more likely to commit fraud than iPhone 8 users. Why? If you want to get around the rules by using a lot of different devices, you don't need the latest and greatest iPhone. Used iPhone 5s will do just fine, so hackers and fraudsters will choose older tech to carry out these various forms of malicious activity.

As machine learning becomes more accessible, fraudsters are creating their own machine learning models to perpetrate content abuse schemes. Fortunately, machine learning tools are more accessible than they’ve ever been to businesses of all types and sizes, not just the Googles and Amazons of the world. These tools can effectively use an ever-growing body of data to detect fraud patterns and block threats before they strike.  The ability of this technology to learn continuously also keeps it one step ahead of malicious and abusive schemes, protecting users from things we haven’t even thought of yet.

KEYWORDS: Artificial Intelligence (AI) Security digital identity fraud detection machine learning

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Kevin lee
Kevin Lee, Trust and Safety Architect at Sift Science, builds high performing teams and systems to combat malicious behavior. He has led various risk, chargeback, collections, spam and trust and safety initiatives for organizations including Facebook, Square and Google.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Enterprise Services
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Keyboard

Marks & Spencer Hackers Tricked IT Workers Into Resetting Passwords

Person working on laptop

Governance in the Age of Citizen Developers and AI

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • artificial intelligence

    Context Matters: Using Machine Learning for Adaptive Authentication

    See More
  • machine learning will be used for DHS and airport security for weapons and explosive detection

    DHS to fund research into machine learning for airport security

    See More
  • On the watch floor of McKesson’s GSOC, three operator workstations

    93% of security operations centers employing AI and machine learning tools to detect advanced threats

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!