Glossary

A

What is Agentic Commerce? Understanding Benefits, Security Risks, and Challenges

Agentic commerce refers to the rapidly emerging paradigm in online commerce wherein some or all of the shopping process is by intelligent computer programs called AI agents on behalf of their human users.

What is Agentic AI? Benefits, Risks, and Outlook

Agentic AI refers to artificial intelligence systems that are designed to independently carry out complex tasks with little or no human supervision. 

What is ad inventory?

Learn what ad inventory is, how it’s vulnerable to ad fraud, and key strategies to protect it. Discover ways to safeguard ad inventory and improve campaign performance.

Understanding Ad Fraud: Ad Fraud Defined and How to Prevent it

Bot management is a segment of software solutions that are put in place to mitigate business risks from bot attacks.

What are Attack Profiles?

An attack profile is a group of malicious requests thought to be from the same attacker based on their characteristics and actions, within the context of bot management.

What is audio fraud?

Audio fraud, a form of ad fraud where bots or low-quality traffic generate fake audio impressions, is misleading advertisers and wasting ad spend.

What is application security? | Threats, best practices, & tools

Application security is essential to protect software from attacks and data breaches. Learn how to identify, fix, and prevent security vulnerabilities in your applications with measures like code reviews and access controls.

What is ad quality?

Fighting malvertising isn’t always just about malicious ads. Understanding ad quality and how to filter out unwanted ads at scale is also important.

What is ad cloaking?

The term ad cloaking has been used to define a variety of ad attacks. But understanding a truly cloaked attack is key to protecting your publishing.

What is account takeover?

Account takeover (ATO) is a form of identity theft where cybercriminals gain access to user accounts. Learn how to prevent and respond to ATO attacks.

B

What is bot detection? | How to detect & block bad bots

Bot detection is the process of distinguishing between bot and human activity, as well as between malicious and legitimate bots.

Understanding Bot Management & Protecting Against Attacks

Bot management is a segment of software solutions that are put in place to mitigate business risks from bot attacks.

What is bot mitigation? How to stop bots & botnets

Bot mitigation is the process of reducing the risk of automated bot attacks and stopping them from abusing websites, mobile apps, and visitors.

What is bot traffic? | Block bad bots from attacks

When bots visit your website, they tax your bandwidth, skew your data, and put you at risk for fraud. Learn more about bot traffic to web and mobile apps and APIs.

What is a brute force attack? | Definition, types, & prevention

A brute force attack occurs when cybercriminals use bots to try to guess and verify information such as passwords, credit card numbers, and promo codes.

What is a bot? | 5 common bot attacks | Detection & management options

A bot is a software application programmed to execute automated tasks on the web. Bots imitate human behavior, but conduct tasks at high speed and massive scale.

What are brute force attack detection tools?

Brute force attack detection tools prevent unauthorized access by monitoring login attempts, bot behavior, and more. Learn how companies can mitigate risks and how HUMAN stops these attacks.

A guide to bot detection tools

Bot detection tools are solutions made to identify bots among web traffic. Learn how these tools protect websites, applications, and data by distinguishing real users from automated threats.

C

What is Cyberfraud? The Complete Guide to Detection, Prevention, and Protection in 2025
Why businesses are choosing CAPTCHA alternatives

CAPTCHA, born in the 90s, aimed to prevent malicious bots from spamming engines, forums, and forms. Here are alternatives for the modern detection era.

What is CTV fraud?

Learn about CTV fraud, where bad actors exploit connected TV ad networks through fake impressions and bot-driven traffic, leading to wasted ad spend and inaccurate metrics.

What is credential stuffing? | Definition, attack types, & solutions

Credential stuffing is when bots attempt logins with stolen usernames and passwords. Validated credentials can be used to take over accounts and commit fraud.

What is credential stuffing mitigation?

Credential stuffing mitigation is a set of tools and strategies, like behavioral analysis, MFA, and rate-limiting, to prevent credential stuffing attacks.

What is content security policy (CSP)?

Content security policy (CSP) is a capability to limit the threat of cross-site scripting (XSS) attacks.

What is content scraping?

Content scraping is the automated process of copying data from websites, often without permission, to republish or misuse it elsewhere, potentially harming the original content creator’s traffic and SEO.

What is client-side security?

Client-side security means protecting user data from cyberattacks through vulnerabilities in websites and apps through various device security measures.

What is click fraud?

Click fraud occurs when bots or fake users artificially inflate ad clicks or content engagement. Learn the types of click fraud and its business impact.

What is click fraud protection software?

Discover how click fraud protection software works to detect and flag fraudulent clicks in real-time using machine learning and behavioral analysis.

What is click fraud prevention?

Learn what click fraud prevention is, the challenges click fraud brings to companies and the benefits of modern click fraud prevention solutions.

What is CCPA? | Requirements & How to Comply

The California Consumer Privacy Act (CCPA) is a state law that protects citizens of California from private data abuses and exposures.

What does CAPTCHA mean? | How CAPTCHAs work

CAPTCHAs are a type of challenge–response test used on websites across the internet to determine whether a user is a human or a bot.

How to neutralize compromised and fake accounts

Bad actors can bypass traditional security measures—such as CAPTCHA, multi-factor authentication (MFA), security questions—to take over an account on your site.

Guide to cyber threat mitigation

Learn about the most important steps for cyber threat mitigation and the strategies you need to make sure you don’t fall victim to an attack.

Carding: what it is and how to prevent it

In carding attacks, cybercriminals use bots to make fraudulent purchases with stolen credit cards, debit cards, or gift cards.