Fraud investigations require going where the bad actors are, but every click leaves a trace. In this Intel Drop, AJ Nash, Digital Intelligence Advocate at Authentic8, explains how browser configurations, device settings, and other hidden data points create a powerful digital fingerprint that can expose investigators during phishing and scam investigations.
In this video, Authentic8’s Digital Intelligence Advocate AJ Nash explains why most cybersecurity predictions miss the mark and why the intelligence community doesn’t make “predictions” at all. Instead, real intelligence assessments focus on confidence levels, assumptions, alternative scenarios, and indicators that tell you when you might be wrong.
AJ Nash demonstrates how to set up anonymous online research session to avoid tracking and simulate local access from other countries. He guides you through setting up an ISP to appear as if you're browsing from Serbia using a Mac and Safari. He also shows you how to access and interpret local content as part of your research. Learn how quick and easy it is to obfuscate your location for security and accurate research.
AJ walks us through a project where he examines the availability of counterfeit software on the dark web. He highlights the use of remote administration tools like Venom Rat and shows how Silo streamlines the process of safe and efficient online research.
AJ demonstrates how he uses Silo from Authentic8 to monitor suspicious domains like 'amason.com' to prevent potential fraudulent activities. Learn how to detect and monitor typosquatting and protect your brand from online threats.