Skip to main content

Knowledge Base

Verification Intelligence

Explainers

You Cannot Conduct a Financial Transaction Without First Completing a Know Your Client Assessment (KYC)

Explainers

Who or What is REvil? Is it a Computer Virus, Ransomware, or Something Even More Sinister?

Explainers

Reporting Cybercrimes: A Guide to Seeking Help and Justice

Explainers

Taking Action Against Identity Theft: Where to Report and Athenty's Supportive Solutions

Explainers

What was the SolarWinds Cyberattack?

Explainers

What was the Kaseya ransomware incident about? Who was affected and what was the cost to everyone?

Explainers

What was the JBS Foods Ransomware Attack? How Did It Happen? Who Did It Affect?

Explainers

What was the Equifax Data Breach all about?

Explainers

What was the Dark Side Ransomware attack on the Colonial Pipeline?

Explainers

The Role of AI and Machine Learning in Anti-Money Laundering

Explainers

What is title fraud? Can you lose your home to title fraud? Can some take a mortgage on your home?

Explainers

What is the Role of Cryptocurrency in Money Laundering?

Explainers

What is the Role of a Bank in Money Laundering and in Anti-Money Laundering or AML

Explainers

What is the Law Society of Quebec's requirements on client identification and verification?

Explainers

What is the Law Society of Ontario's Requirement on Client Identification and Verification?

Explainers

What is the Law Society of British Columbia's Requirement on Client Identification and Verification?

Explainers

What is the Government Issued ID Identification Method

Explainers

The Global Impact of Cyber Crimes: Understanding the Threat Landscape

Explainers

Explaining the Dark Web: A Closer Look at the Hidden Internet

Explainers

What is the credit file ID verification method?

Explainers

Unmasking the Threat of Spoofing: Understanding the Danger and Leveraging Athenty's Solutions for Protection

Explainers

Battling the Deluge of Unwanted Messages: Understanding Spamming and Leveraging Athenty's Solutions for Protection

Explainers

Understanding Software Piracy

Explainers

Navigating the Digital Realm: Understanding Social Media Fraud and Leveraging Athenty's Solutions for Protection

Explainers

What is Ransomware As A Service (RaaS)?

Explainers

Understanding Ransomware Attacks: Protecting Your Digital Assets with Athenty Solutions

Explainers

What is Property Fraud? How Easy Can Someone Take Your Property

Explainers

Understanding Prohibited or Illegal Content: An Explainer

Explainers

Guarding Against Deceptive Hooks: Understanding Phishing and Harnessing Athenty's Solutions for Protection

Explainers

Safeguarding Against Corporate Cyber Threats: Understanding Organizational Cybercrimes and Leveraging Athenty Solutions for Protection

Explainers

What is Online Recruitment Fraud?

Explainers

Understanding Online Intellectual Property Infringement

Explainers

Understanding Online Drug Trafficking

Explainers

Defending Your Home: Understanding Mortgage Fraud and Leveraging Athenty's Solutions for Protection

Explainers

What is Money Laundering? How Does it Take Place? Who is Responsible to Verify it Doesn't Happen?

Explainers

Understanding Malware: An Explainer

Explainers

Explaining Malicious Software (Malware): Understanding the Threat

Explainers

Safeguarding Your Finances: Understanding Loan Fraud and Harnessing Athenty's Solutions for Protection

Explainers

Safeguarding Your Financial Future: Understanding Investment Fraud and Leveraging Athenty's Solutions for Protection

Explainers

Preserving Financial Integrity: Understanding Income Fraud and Leveraging Athenty's Solutions for Protection

Explainers

What is Income Fraud? How Do Borrowers Cheat on Their Mortgage and Loan Applications?

Explainers

Unveiling Ghosting Fraud: Understanding the Threat and Leveraging Athenty's Solutions for Protection

Explainers

What is FINTRAC Stand For or Mean

Explainers

Unveiling Financial Fraud: Understanding the Threat and Harnessing Athenty's Solutions for Protection

Explainers

Understanding Electronic Money Laundering and the Role of Athenty Solutions

Explainers

Safeguarding Our Seniors: Understanding Elder Fraud and Harnessing Athenty's Solutions for Protection

Explainers

Shielding Online Privacy: Understanding Cyberstalking and Leveraging Athenty's Solutions for Protection

Explainers

Understanding Cyber Extortion and the Role of Athenty Solutions

Explainers

Combating Cyberbullying: Protecting Online Communities with Athenty Solutions

Explainers

Defending Your Financial Reputation: Understanding Credit File Fraud and Leveraging Athenty's Solutions for Protection

Explainers

Shielding Your Finances: Understanding Credit Card Fraud and Leveraging Athenty's Solutions for Protection

Explainers

What is Considered Government-Issued Photo ID?

Explainers

Ensuring In-Person Transaction Security: Understanding Card Present Fraud and Harnessing Athenty's Solutions for Protection

Explainers

Securing Digital Transactions: Understanding Card Not Present (CNP) Fraud and Leveraging Athenty's Solutions for Protection

Explainers

Explaining Exploit Kits: Understanding a Cyber Threat

Explainers

What is AML or Anti-Money Laundering? What are your obligations

Explainers

Unmasking Pyramid Schemes: Understanding the Danger and Harnessing Athenty's Solutions for Protection

Explainers

Unveiling Ponzi Schemes: Understanding the Deception and Leveraging Athenty's Solutions for Protection

Explainers

What is a KYC? Know Your Client

Explainers

Understanding Data Breaches: A Comprehensive Overview

Explainers

Understanding Computer Viruses: An Explainer

Explainers

What Happens to Your Stolen Identity in the Dark Web?

Explainers

What Does KYP Stand For or Mean in Cyber Security and Identity Verification?

Explainers

What did the SODINOKIBI REvil ransomware do

Explainers

Guardians of the Digital Realm: Understanding White Hat Hackers and Leveraging Athenty's Solutions for Security

Explainers

What are the usual methods identity thieves use to steal your information?

Explainers

What are some types of IDs? What is considered a form of identification or ID documents?

Explainers

What are some types of client identity verification tasks?

Explainers

What are some of the different types of identity verification and authentication methods used

Explainers

What are some cyber risks to avoid?

Explainers

What are Society Cyber Crimes?

Explainers

Safeguarding Your Investments: Defending Against Property Cybercrimes with Athenty Solutions

Explainers

Understanding Potentially Unwanted Programs (PUPs): An Explainer

Explainers

What are organized cyber crimes? Mafias or cartels of organized cyber criminals across the world.

Explainers

Understanding Online Scams: A Comprehensive Overview

Explainers

Guarding Against Digital Threats: Understanding Individual Cybercrimes and Leveraging Athenty Solutions for Protection

Explainers

Explaining DoS (Denial of Service) Attacks

Explainers

Unmasking the Dark Side: Understanding Cyberterrorists and Strengthening Security with Athenty Solutions

Explainers

Understanding Botnets: An Explainer

Explainers

Defending the Digital Realm: Understanding Black Hat Hackers and Harnessing Athenty's Solutions for Protection

Explainers

Verifying Someone's Phone Number and Telephone Carrier as a Form of Identity Verification

Explainers

Using Voice Recognition as Part of One's Biometric Identity Verification

Explainers

Using Someone's Residency and Location as Part of the Identity Verification Process

Explainers

Shielding Livelihoods: Preventing Unemployment Identity Theft with Athenty's Intelligent Verification Solutions

Explainers

The Role of Credit Bureaus in Identity Theft Recovery

Explainers

The Role of AI and Machine Learning in Cyber Security and Identity Verification

Explainers

The RockYou Data Breach Taught Us How Much Data Online Gaming Collects on Us!

Explainers

The Rise of Online Drug Trafficking and What's Being Done to Combat Online Drug Traffickers

Explainers

The Marriot Hotels Data Breach Incident: Did You Know Marriot Had Data on Over 500 Million Guests?

Explainers

The Identity Theft Recovery Road Map, Where to Begin?

Explainers

Terrorism Online is Just as Serious as Physical Terrorism

Explainers

Unraveling Tax Identity Theft: Safeguarding Your Finances with Athenty's Intelligent Verification Solutions

Explainers

Unraveling Synthetic Identity Theft: Fortifying Your Defenses with Athenty's Intelligent Verification Solutions

Explainers

Someone Using Your Images Online: Cyber Security and Identity Verification

Explainers

Society Interference, Political Disruption, Election Fraud, Cyber Spying, Are Destroying Society

Explainers

Preserving Privacy: Guarding Against Social Security Number Identity Theft with Athenty's Intelligent Verification Solutions

Explainers

Protecting Your Identity: Safeguarding Against Social Insurance Number Identity Theft with Athenty's Intelligent Verification Solutions

Explainers

Social Engineered Cyber Crimes? Using Your Social Media Accounts and Data Against You!

Explainers

Safeguarding Real Estate Transactions: Understanding Property Fraud and Leveraging Athenty's Solutions for Protection

Explainers

Recovering Stolen Digital Assets and Digital Property from Cyber Crimes

Explainers

Ransomware Payments and the Debate on Ransomware Payment Bans

Explainers

Defending Your Identity: Combating Physical ID Document Theft with Athenty's Intelligent Verification Solutions

Explainers

Online Organized Crime is Stealing Your Homes, Property and Assets Through Identity Theft and Fraud

Explainers

Online Money Laundering is a Crime? What's Being Done to Combat This and How to Do Your Part

Explainers

Online Cartels and Mafias Exist! Organized Crime in the Virtual World

Explainers

Online Blackmail: How to Avoid Getting Trapped

Explainers

Notifying the Authorities and Law Enforcement of Identity Theft and Cyber Criminals

Explainers

Unmasking New Account Fraud: Understanding the Threat and Utilizing Athenty's Solutions for Defense

Explainers

Navigating the Digital Dangers: Understanding Internet Fraud and Leveraging Athenty's Solutions for Protection

Explainers

Unmasking Medical Identity Theft: Securing Your Health and Finances with Athenty's Intelligent Verification Solutions

Explainers

Long Term Identity Theft Protection Strategies and Preventing Recurrence

Explainers

Unveiling the Dark Web: Understanding Its Nature and Implications

Explainers

Is the Dark Web the Deep Web? Are They the Same? Can Anyone Access the Deep Web? Is It Illegal?

Explainers

International Cooperation in Cybersecurity: What is the World Doing to Fight Cybercrimes?

Explainers

What is Identity Theft: Understanding the Threat and How Athenty's Intelligent Verification Solutions Can Help

Explainers

Identity Theft Support Groups: Finding Community and Assistance

Explainers

Identity Theft Insurance! Is It Worth It?

Explainers

Identity Theft in the Workplace: Employee Rights and Protections

Explainers

Understanding Identity Fraud: Safeguarding Against Cybercriminals with Athenty Solutions

Explainers

Unmasking Identity Cloning: Safeguarding Your Authenticity with Athenty's Intelligent Verification Solutions

Explainers

How to Recover from Identity Theft?

Explainers

Preventing Cybercrimes: A Comprehensive Guide

Explainers

Unmasking Identity Theft: How to Identify If You've Been a Victim and Athenty's Solutions to Help

Explainers

Fighting Cyber Crimes: Strategies for Cybersecurity

Explainers

How is Someone's Credit File or Report Able to Assist with His or Her Identity Verification?

Explainers

How does verifying someone's IP Address and Email account assist with identity verification?

Explainers

How does two factor authentication or 2FA work?

Explainers

How does photo ID biometric recognition part of verifying someone's identity?

Explainers

How Does a Fingerprint Scan Work as Part of Biometric Identity Verification?

Explainers

Explaining How Cybercriminals Use Social Engineering

Explainers

Shielding Your Identity: Strategies to Protect Against Identity Theft and Athenty's Innovative Solutions

Explainers

Safeguarding Your Sanctuary: Preventing Home Title Theft with Athenty's Intelligent Verification Solutions

Explainers

Helping Others Recover from Identity Theft: Support for Families and Friends

General

A Comprehensive Glossary for Identity Verification with AI

Explainers

Guarding Against Deceptive Trust: Preventing Friendly Identity Theft with Athenty's Intelligent Verification Solutions

Explainers

Financial Identity Theft: Protecting Your Finances with Athenty's Intelligent Verification Solutions

Explainers

Safeguarding Familial Bonds: Protecting Against Familial Identity Theft with Athenty's Intelligent Verification Solutions

Explainers

Explain the WannaCry Ransomware Epidemic! What the hell happened? Who was affected?

Explainers

Safeguarding Legacy: Protecting Against Estate Identity Theft with Athenty's Intelligent Verification Solutions

Explainers

Unveiling Employment Identity Theft: Safeguarding Your Career and Finances with Athenty's Intelligent Verification Solutions

Explainers

Shielding Our Seniors: Preventing Elder Identity Theft with Athenty's Intelligent Verification Solutions

Explainers

Dealing with the Emotional Impact from Identity Theft

Explainers

Cybersecurity Regulations and Compliance

Explainers

Cyber Warfare at Its Best: The Stuxnet Incident Toppled Political Regimes, A Virus Like No Other

Explainers

Cyber Security Implications of the COVID-19 Pandemic

Explainers

Cyber Criminals Can Destroy Your Life

Explainers

Protecting Your Digital Wealth: Safeguarding Against Crypto Account Theft with Athenty's Intelligent Verification Solutions

Explainers

Unmasking Criminal Identity Theft: Defending Your Reputation and Integrity with Athenty's Intelligent Verification Solutions

Explainers

Shielding Innocence: Protecting Children from Identity Theft with Athenty's Intelligent Verification Solutions

Explainers

Fortifying Your Identity: Combating Biometric Identity Theft with Athenty's Intelligent Verification Solutions

Explainers

Athenty handles most identity verification methods to combine parts of each for a robust KYC report!

Explainers

Are You Being Harassed Online?

Explainers

Are you a white hat hacker? Thank you for your service to the online community.

Explainers

Are You a Victim of a Cyber Crime?

Explainers

Guarding Your Identity: Preventing Account Theft with Athenty's Intelligent Verification Solutions

Explainers

A Guide on the Importance of Changing Passwords and Enhancing Online Security