Mobile devices have rapidly evolved over the past several years. From this small, handheld device, your customers can request a ride, book a babysitter, conduct a video conference, apply for a loan or transfer money. In fact, iovation has seen over half (61%) of our protected transactions come from mobile devices so far this year, up from 56% in 2018 and 51% in 2017.

Last count we're probably about 65% mobile traffic, 30% desktop and then the rest on tablets and other devices. Mobile is crucial to us.
Owen Jones Argyll Entertainment

As consumers shift to conduct more business on their mobile devices, fraudsters have taken notice. Ever relentless in trying to make their tactics look legitimate, fraudsters are mimicking the growth of mobile transactions by using either mobile devices or emulators on their desktops so transactions appear to be coming from mobile devices.

In the first half of 2019, iovation saw 49% of risky transactions coming from mobile devices, up from 30% in 2018, 33% in 2017 and 25% in 2016. Throughout the globe and in every industry sector, iovation analysts are seeing an increase in mobile traffic correlated with an increase of risky transactions.

Mobile Infographic V6

Enhanced Protection for Mobile Transactions

Consumers expect secure, frictionless access to their accounts from any device, and iovation is committed to providing the tools to make that possible. We continue to introduce new ways for fraud teams to identify risky attributes on mobile transactions while limiting friction for good consumers.

In fact, in the past month we have introduced features into our FraudForce device-based reputation solution to enhance the way fraud teams analyze indicators of suspicious mobile device behavior like these:

  • Mobile emulators: Fraudsters like to hide information by using emulators to make it look like their desktop device is a mobile device.
  • Orientation: Is a device staying in the same position or is it face down? Device orientation can indicate the use of a bot or a fraudster emulating a mobile device.
  • SIM card country: Since fraudsters often try to mask their locations, the SIM card country provides yet another method for identifying the true location of the end-user. Fraud analysts can identify the country associated with the user’s account, or use the roaming country to see the user’s current location, which may differ from the SIM country if the user is traveling.
  • SIM card carrier name: Similar to the SIM card country, the carrier name can also identify the network associated with the user’s account as well as the roaming network if the user is travelling. This information may be useful for fraud teams watching for activity originating with specific networks, such as a carrier network that tends to correlate with SIM swap or other fraud.
  • Currency: The type of currency tied to a device provides additional context to the region associated with the device. This can determine if the device is coming from a risky location, or if there is a mismatch between phone currency and other location details.
  • Language: Much like countries, carriers and currency, the language used on a device provides additional context on the transaction, which can help crack a fraud case when a fraudster is attempting to mask other aspects of their device.
  • Mobile OS version: Certain mobile operating system versions may correlate with fraud or abuse.


For more about the crucial role the mobile device plays in fighting fraud, download the Aite Group report, The Mobile Device: The Center of the Fraud Prevention Universe, compliments of iovation.