Online credit card fraud News
April 07, 2017
Bad-bots are being used by cybercriminals to automate many time-consuming activities to perpetrate their crimes. Payment card fraud is an area of particular concern as large data bases of stolen ...
February 18, 2016
Data breaches are becoming more and more common -- as are class-action lawsuits from affected customers and employees. So, what are the costs of data breach lawsuits?
October 16, 2015
News roundup: FBI issues a public service announcement about EMV chip-and-signature cards. Plus: bumper crop of OS X malware in 2015; phishing sites with authenticated certificates and more.
October 01, 2015
The Oct. 1, 2015 deadline for EMV liability has arrived, though merchants and retailers alike aren't ready for the change.
Online credit card fraud Get Started
Bring yourself up to speed with our introductory content
In this excerpt from chapter seven of Advanced Persistent Security, authors Araceli Treu Gomes and Ira Winkler discuss the different threats facing organizations. Continue Reading
Card skimming is the theft of credit and debit card data and PIN numbers when the user is at an automated teller machine (ATM) or point of sale (POS). Continue Reading
ModPOS, a new POS malware, compromised millions of credit card accounts in 2015. Expert Nick Lewis explains how cybercriminals use this malware and what can be done to stop it. Continue Reading
Evaluate Online credit card fraud Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
The banks and the retailers have divergent views on how best to secure credit card transactions. Will the courts decide between signatures and PINs? Or will market forces win out? Continue Reading
Physical point-of-sale security is covered in PCI DSS. Expert Mike Chapple explains how to use good security practices and understand PCI requirements for POS terminals. Continue Reading
Merchants need to balance buyers' online experiences and their controls for analyzing suspicious purchasing behavior to prevent card-not-present scams. Continue Reading
Manage Online credit card fraud
Learn to apply best practices and optimize your operations.
In this excerpt of Cyber Crime and Cyber Terrorism Investigator's Handbook, authors Babak Akhgar, Andrew Staniforth and Francesca Bosco outline the classification, types and categories of cybercrime. Continue Reading
In 2014 shoppers spent almost $300 billion dollars online (a number expected to grow in future years). There was a significant number of online fraud attempts, too—and about 78% of those were made through website applications. (In contrast, only 3% were made via mobile applications).
This Technical Guide looks at efforts made thus far to crack down on credit card fraud. It starts with a discussion of card-not-present scams, currently a tool of choice for fraudsters, not only because they can shift tactics rapidly among different types of Internet transactions but also because there is no need to steal a card itself (only its attributes), which means customers are typically unaware of the theft until after fraudulent transactions have occurred. It then considers the new breeds of technology placed into networks today that focus on fraud and may give organizations means to not only detect and monitor but also stop fraud. The good news is that these tools for banks and merchants alike begin to protect before a transaction is ever made.
Finally, Chapter 3 explores whether the Payment Card Industry’s Data Security Standard (PCI DSS) effectively and efficiently protects consumer data. Continue Reading
Finding the right software tools to combat credit card fraud can save small businesses tens of thousands of dollars. Having a seasoned fraud specialist at the helm also helps. Just ask Speck Products. Continue Reading
Problem Solve Online credit card fraud Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Panasonic Avionics' in-flight entertainment system vulnerabilities allow attackers to tamper with passenger seat displays. Expert Michael Cobb explains the impact of these flaws. Continue Reading
Passive man-in-the-middle attacks on PIN pads can lead to attackers stealing credit card details. Expert Nick Lewis explains how companies can mitigate these attacks. Continue Reading
Point-of-sale malware, such as the recent PoSeidon malware, continues to evolve to avoid detection. So what's an enterprise to do? Expert Nick Lewis explains how the malware functions and what organizations can do about it. Continue Reading