FireEye, Inc.

Online credit card fraud News

  • April 07, 2017 07 Apr'17

    Bad-bots and CNP fraud

    Bad-bots are being used by cybercriminals to automate many time-consuming activities to perpetrate their crimes. Payment card fraud is an area of particular concern as large data bases of stolen ...

  • February 18, 2016 18 Feb'16

    Data breach lawsuits indicate a troubling trend for enterprises

    Data breaches are becoming more and more common -- as are class-action lawsuits from affected customers and employees. So, what are the costs of data breach lawsuits?

  • October 16, 2015 16 Oct'15

    EMV transition: FBI warns while Target opts for PINs

    News roundup: FBI issues a public service announcement about EMV chip-and-signature cards. Plus: bumper crop of OS X malware in 2015; phishing sites with authenticated certificates and more.

  • October 01, 2015 01 Oct'15

    The EMV liability shift date is here, now what?

    The Oct. 1, 2015 deadline for EMV liability has arrived, though merchants and retailers alike aren't ready for the change.

View All News

Online credit card fraud Get Started

Bring yourself up to speed with our introductory content

View All Get Started

Evaluate Online credit card fraud Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

View All Evaluate

Manage Online credit card fraud

Learn to apply best practices and optimize your operations.

  • Cyber Crime and Cyber Terrorism Investigator's Handbook

    In this excerpt of Cyber Crime and Cyber Terrorism Investigator's Handbook, authors Babak Akhgar, Andrew Staniforth and Francesca Bosco outline the classification, types and categories of cybercrime. Continue Reading

  • Credit card protection tactics: Technology vs. standards

    In 2014 shoppers spent almost $300 billion dollars online (a number expected to grow in future years). There was a significant number of online fraud attempts, too—and about 78% of those were made through website applications. (In contrast, only 3% were made via mobile applications).

    This Technical Guide looks at efforts made thus far to crack down on credit card fraud. It starts with a discussion of card-not-present scams, currently a tool of choice for fraudsters, not only because they can shift tactics rapidly among different types of Internet transactions but also because there is no need to steal a card itself (only its attributes), which means customers are typically unaware of the theft until after fraudulent transactions have occurred. It then considers the new breeds of technology placed into networks today that focus on fraud and may give organizations means to not only detect and monitor but also stop fraud. The good news is that these tools for banks and merchants alike begin to protect before a transaction is ever made.

    Finally, Chapter 3 explores whether the Payment Card Industry’s Data Security Standard (PCI DSS) effectively and efficiently protects consumer data. Continue Reading

  • Visa risk manager rescues small retailer from credit card fraud

    Finding the right software tools to combat credit card fraud can save small businesses tens of thousands of dollars. Having a seasoned fraud specialist at the helm also helps. Just ask Speck Products. Continue Reading

View All Manage

Problem Solve Online credit card fraud Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

View All Problem Solve