DRAFT DRAFT DRAFT THE STATE OF PHONE FRAUD A GLOBAL, CROSS-INDUSTRY THREAT

Size: px
Start display at page:

Download "DRAFT DRAFT DRAFT THE STATE OF PHONE FRAUD 2014-2015 A GLOBAL, CROSS-INDUSTRY THREAT"

Transcription

1 THE STATE OF PHONE FRAUD A GLOBAL, CROSS-INDUSTRY THREAT

2 TABLE OF CONTENTS Executive Summary... 3 Introduction... 4 WHITE PAPER A Global Threat... 4 Fraud Rates Within And Across Borders Phone Fraud in Developing Countries 4 6 Fraud Targets: Who Is At Risk?... 7 Financial Institutions 7 Retail & E-Retail 7 Consumers 8 Cross-Industry Fraud The Bottom Line: What Is At Risk? What is Fraud Exposure? Fraud Exposure In Financial Institutions Fraud Exposure In Retail Consumer Fraud Losses Conclusion Methodology About Pindrop Labs About Pindrop Security PINDROPSECURITY.COM

3 EXECUTIVE SUMMARY Phone fraud is a multi-million dollar industry that crosses international and industry borders. Attackers target call centers, as well as consumers, in attempts to gain access to funds, steal merchandise, and phish for identities. Phone fraud is now so prevalent that the average enterprise call center is exposing more than $9 million each year to fraud. This does not include the damage fraud and other security breaches can have on the reputation of an enterprise. Pindrop Security reviewed phone fraud activity affecting financial institutions, retailers and consumers between to understand the frequency of attacks and the potential consequences of fraud. This report provides a unique view into the risk facing call centers, as well as international consumers. KEY FINDINGS: Phone fraud crosses international borders, enterprises and industries Across financial and retail institutions, 1 in every 2,200 calls is fraud, an increase of more than 30 percent since Rates of phone fraud are similar across economically developed countries, regardless of security regulations and legislation in place. Phone channel assailants use multi-pronged attacks, targeting consumers, retailers and financial institutions simultaneously. Phone fraud poses a significant fiscal risk to financial institutions Credit card issuers face the highest rate of fraud, with 1 fraud call per every 900 calls. Financial institutions risk exposing an average of $7-15 million to phone fraud per institution. When attackers are able to pass knowledge-based authentication (e.g. personal security questions), financial institutions risk major monetary losses, as well as regulatory compliance and privacy issues. Attackers are using robodialers to increase efficiency in targeting consumers 1 in 6 phone numbers calling a consumer is a robocaller. 2.5 percent of U.S. phones receive at least one robocall every week. More than 86.2 million calls per month in the U.S. are phone scams. 3 PINDROPSECURITY.COM

4 INTRODUCTION Phone fraud is a multi-million dollar industry that crosses international and industry borders. Since 2013, the rate of phone fraud has increased over 30 percent, from 1 in 2,900 calls to 1 in 2,200 calls. A GLOBAL THREAT Fraud Rates Within and Across Borders Pindrop Security s analysis shows that phone fraud rates are essentially the same in all major economically developed countries, especially the U.S. and U.K. Considering the U.K. s strict privacy and security regulations, including the broader European Union s Data Protection Directive, one might expect to see a reduced phone fraud rate. However, the similarity in the rates of U.S. versus U.K. phone fraud highlights the shortcomings in call center authentication technology, which is essentially the same across the world. Phone channel attackers are not bound by geography. In fact, 64 percent of fraud calls originate in a country other than the country of the attack target. Attackers call across international borders at 10x the rate of legitimate callers. Spoofing technology allows attackers to hide their true automatic number identification (ANI) and appear as a local call on Caller ID. This contributes to the preponderance of international fraud calls. 4 PINDROPSECURITY.COM

5 FIGURE 1: International vs. Domestic Fraud and Non-Fraud Calls Non Fraud Calls Domestic Int. Fraud Calls Domestic International 0% 20% 40% 60% 80% 100% Another factor in the increase in international fraud calls is Voice over IP (VoIP) calling. VoIP has minimized or eliminated the cost of phone calls, both domestic and international. There is evidence to suggest that VoIP service is easier to steal than other kinds of telephony service as well. VoIP is Attackers take advantage of cheap, free, and stolen VoIP, using it at a much higher rate than the general publicattackers use VoIP lines for 53 percent of their calls, compared to 7.8 percent of the general public. FIGURE 2: Device Type in Fraud vs. Non-Fraud Calls Non Fraud Calls Cell Landline VoIP Fraud Calls Cell Landline VoIP 5 PINDROPSECURITY.COM % 20% 40% 60% 80% 100%

6 Fraud Device Type Trends Attackers have been using VoIP as their preferred calling method for at least the past five years. Meanwhile, fraud originating on a mobile device has steadily risen since 2011, surpassing landline fraud to become the second most popular fraud device type. This trend mimics the rising use of mobile phones over landlines for the general public. FIGURE 3: Mobile Phone Use In Fraud and Non-Fraud Calls 50% 40% 30% 20% 10% 0% Fraud Calls Non Fraud Calls Also contributing toward this trend is the use of cheap burner phones. These are prepaid mobile phones that attackers replace frequently to avoid leaving a trail of evidence. 6 PINDROPSECURITY.COM Phone Fraud In Developing Countries In comparison to economically developed countries, phone fraud statistics are much different in developing countries. The overall phone fraud rate is markedly lower in developing countries, and the phone fraud that does occur is more local in origin. There are several reasons that could contribute to this difference: Language In countries with a lesscommon language, call centers will naturally experience more localized fraud. International attackers are most likely to attack English-speaking countries. Account Value Accounts in developing countries generally have lower account balances than those in economically developed countries. Attackers tend to target high-value accounts to get the most return for their efforts. Information Availability In economically developed countries, attackers can search social media and other Internet sites for information to socially engineer or impersonate account holders. In addition, the population of economically developed countries is more likely to use a credit card or e-payment method that can be easily stolen and sold on the black market. Countries with lower rates of Internet accessibility, or more cash payment systems experience less phone fraud.

7 FRAUD TARGETS: WHO IS AT RISK? Financial Institutions Banks, brokerages and other financial institutions are a perennially attractive target for phone fraud. These entities offer the most direct route for attackers to a profit because they deal with money directly. Yet, different types of financial institutions experience different rates of phone fraud. Banks report a fraud call rate of 1 in every 2,650 calls. Brokerages report slightly less, with only 1 in 3,000 calls being fraud. Card processors, however, experience phone fraud at nearly 3x the rate of other financial institutions, reporting 1 fraud call for every 900 calls. FIGURE 4: Fraud Rates By Financial Institution Type.12%.10%.08%.06%.04%.02% Banks Brokerages Credit Cards The high rate of phone fraud for card processors can be attributed to the fact that credit cards are one of the most common ways for the public to complete transactions, and thus card numbers are more at risk for theft. Compared to credit card numbers, banking or brokerage account numbers are less widely distributed. The less an account number is distributed across channels, the less likely it is to be at risk for fraud. Retail & E-Retail Though not quite as high as card processors, retailers and e-retailers experience phone fraud at higher rates than other industries. Retailers report one fraud call per 1,000 calls. Retailers face a specific type of phone fraud, known as chargeback fraud. Chargebacks occur when an attacker places an order using a stolen credit card. When the cardholder sees the fraudulent charge, he or she disputes it with the credit card processor and 7 PINDROPSECURITY.COM

8 receives a refund. By this time, the merchant has often already shipped the product to the attacker, ultimately losing the cost of the merchandise as well as associated shipping and administrative costs. Retailers walk a fine line in screening for potential chargeback fraud. If they receive too many chargebacks, payment processors will deem them high risk and charge increased transaction fees. However, retailers who refuse suspicious orders risk alienating legitimate customers. FIGURE 5: Retail Chargeback Fraud Consumers Attackers Favorite Products Though the rate of phone fraud for most retailers is 1 in 1,000 calls, that number changes drastically for certain product lines. Popular, expensive products that are easy to resell see much higher rates of phone fraud. For example, one large consumer electronics retailer saw phone fraud rates for Apple product orders as high as 1 in 300 calls. Attackers don t limit themselves to targeting enterprise call centers. Another lucrative path is to target consumers directly. Consumer phone scams are a growing problem and have gotten more publicity as scams, such as those spoofing the IRS and Microsoft Technical Support, have received global press coverage. More than 36 million calls per month in the U.S. can be traced to one of the 25 most popular phone scams, but Pindrop has found that there are more than 86.2 million scam calls total each month. Consumer phone scams rely on attackers casting a wide net and hoping to catch someone who is not informed of a current scam, or someone who is otherwise vulnerable (i.e. the elderly, recent immigrants, young college students, etc.). One of the most common ways attackers cast their wide net is to utilize cheap robocalling services. Some attackers use messages promising prizes, trips, free money or other goods and services to entice consumers to call back and interact. Other fraud tactics include using threatening messages, telling consumers they are behind on taxes, have missed jury duty, or are in jeopardy of being deported. 8 PINDROPSECURITY.COM

9 Pindrop research shows that 1 in 6 phone numbers calling the average consumer is a robocaller. Furthermore, 2.5 percent of U.S. phones (8.1 million in total) receive at least one robocall per week. FIGURE 6: Most Popular Phone Scams by Avg. Monthly Call Volume 9M 8M 7M 6M 5M 4M 3M 2M 1M IRS Scam Tech Support Payday Loans Auto Insurance Verizon Bank Scams Political Survey Gift Cards Government Grants Home Security Systems Auto Warranty Craigslist Scam Canadian Pharmacies Student Loans What Is Spoofing? Spoofing is the practice of manipulating the phone network to hide a true caller ID or ANI. Attackers manipulate their caller ID data to display the phone numbers of people or organizations they wish to impersonate. One of the most popular consumer phone scams involves spoofing a financial institution to phish for personal information. In the past six months, Pindrop has found over 330,000 complaints related to spoofing financial institutions. 9 PINDROPSECURITY.COM

10 Phone Fraud & The IRS In , reports of the IRS phone scam skyrocketed. Attackers impersonate IRS agents over the phone, telling taxpayers they are under investigation for tax fraud. They threaten victims with arrest if they don t immediately pay. Federal authorities claim this is the largest IRS scam they ve ever seen swindling consumers out of more than $15 million in the past two years. The US Treasury estimates the thieves have successfully victimized more than 3,000 people. The average victim loses $5,000 to this scam. Pindrop tracks IRS Scam complaints, and has found that the scam spiked in February of this year, just as tax season was beginning. FIGURE 7: IRS Scam Complaints By Month 80,000 60,000 40,000 20,000 0 Dec-14 Jan-15 Feb-15 Mar-15 Apr PINDROPSECURITY.COM Cross-Industry Fraud Phone channel attackers rarely limit their targets to a single institution, industry, or consumer. Attackers use every piece of data they can find to put together sophisticated, multi-pronged phone channel attacks. Many attacks are not looking for money directly, but rather will be phishing for information needed to successfully impersonate a consumer or institution. For example, an attacker may dial a consumer and impersonate a financial services company, claiming to be able to negotiate for lower rates on credit card debt. (In the past six months, Pindrop has found over 330,000 complaints about this scam alone.) This attacker won t ask the consumer for money. Instead, he or she will ask for account numbers, passwords, social security numbers, etc. The attacker can then call the credit card processor and pass knowledge-based authentication (KBA) for the credit card account using that information gleaned from the consumer phone call, leading to complete account takeover. As another example, a retailer might experience a point-of-sale (PoS) system data breach, like those reported to have affected Home Depot and Target in Phone channel attackers are buying information from those breaches in online black markets and using it to perform phone fraud on banks and consumers. 1 1 Krebs on Security, In Wake of Confirmed Breach at Home Depot, Banks See Spike in PIN Debit Card Fraud, September 2014.

11 FIGURE 8: Cross-Industry Fraud Example THE BOTTOM LINE: WHAT IS AT RISK? What is Fraud Exposure? When attackers are able to get past initial authentication, the entire value of the account is exposed. It is exposed not only to simple theft, but also to non-monetary attacks like account takeovers and social engineering. In addition, these accounts are exposed to regulatory privacy breaches. Fraud Exposure in Financial Institutions Fraud exposure is different than actual fraud claims or fraud losses. An attacker who impersonates a financial institution s customer over the phone and passes KBA processes may have access to an account worth $10,000 (the fraud exposure), but the attacker will often only try to move a fraction of that money to avoid a potential auto-alert system or consumer realization. Attackers understand that higher-value transactions trigger enhanced authentication challenges. The amount of money that is reported stolen is known as the fraud claim. After a fraudulent transaction has been initiated, depending on the type, institutions may be able to reverse all or part of the transaction. Only the final net loss is considered the fraud loss. 11 PINDROPSECURITY.COM

12 Few financial institutions are able to accurately measure losses to phone fraud because they simply do not tie fraud activity back to the phone channel. There are multiple levels of authentication and regulation involved in any transaction, and tracking losses as far back as the phone channel can be difficult. Furthermore, institutions that are already using Pindrop Phoneprinting TM solutions experience very little actual loss. Therefore, in this report, Pindrop measured and reported on fraud exposure. FIGURE 9: Fraud Exposure FRAUD EXPOSURE The total value of the account to which the attacker gains access FRAUD CLAIM FRAUD LOSS The amount of money the attacker moves out of an account The amount of money a bank is unable to recover following an attack The amount of fraud exposure varies according to the type of financial institution. Attackers are highly attuned to the account values at an institution. Higher account values mean more lucrative targets. Brokerages, which often hold the highest account values, lead with $15 million fraud exposure per institution annually. Credit card issuers see the second largest fraud exposure at $11 million annually, and banks the lowest at $7.6 million. 12 PINDROPSECURITY.COM FIGURE 10: Fraud Exposure By Financial Institution Type 20M 15M 10M 5M Banks Brokerages Credit Cards

13 Fraud Exposure, Orders, and Losses in Retail In the retail industry, it is slightly easier to measure the financial implications of phone fraud. In these scenarios, instead of gaining access to money in an account, attackers target material goods by placing phone orders. Here, the exposure risk is equal to the limit an attacker can place on his or her presumably stolen credit card, or the amount of credit a store is willing to allow to a caller. On average, retail call centers expose $2.40 to fraud per incoming call. Few attackers will attempt to max out their credit, as these orders would be extremely suspicious to any call center representative. Therefore, retailers report the equivalent of closer to $0.65 in actual fraudulent orders per call. One point that separates retailers from financial institutions is that retailers typically have a period of time between taking a fraudulent phone order and actually shipping the product. This gives them space to further investigate and sometimes cancel suspicious orders. For this reason, retailers actual fraud loss per call is closer to $0.17. FIGURE 9: Fraud Exposure Per Call in Retail Call Centers $2.40 $0.65 $0.17 Fraud Exposure Fraud Claim Fraud Loss Consumer Fraud Losses Consumer fraud losses are nearly impossible to identify. This is because comparatively few consumers will admit to losing money in a scam and many do not even realize that they have been scammed. When the average consumer takes a call from an attacker, their fraud exposure is only limited by the amount in his or her own bank accounts or credit. A 2014 survey found 17.6 million Americans lost $8.6 billion to phone fraud 2. The average reported loss was $ BGR, Phone scams cost Americans $8.6 billion last year - here s how to protect yourself, August PINDROPSECURITY.COM

14 CONCLUSION Fraud in the phone channel poses a significant risk to financial institutions, retailers, and consumers globally. Criminals are launching sophisticated, cross-industry attacks and are highly attuned to account value. Over the next year, as the U.S. moves to chip-and-signature card protocols, card-present fraud will become more difficult. As such, Pindrop expects attackers will shift even more attention to the phone channel, which is traditionally the least protected of the card-notpresent (CNP) channels. Call centers should begin preparing now for the increasing rate of attacks. As a first step in combating phone fraud, financial institutions and retailers should begin measuring fraud losses that can be connected to the phone channel. This will help businesses understand the true extent of their problem. In looking for solutions, Pindrop recommends that financial institutions and retailers implement fraud detection solutions that maximize their return on investment by selecting technology that is most versatile and widely effective. The technology should be usable on every call, regardless of call quality, previous enrollment or lack of voice content. It should be highly accurate, regardless of obfuscation such as voice distortion, background noise, packet loss or other common issues. Fraud detection technology should leverage many data sources, both other enterprises as well as third parties and law enforcement. This combination of requirements presents the best solution available. METHODOLOGY Phoneprinting TM Pindrop Security s patented phoneprinting technology analyzes the audio content of a phone call. Phoneprinting measures 147 characteristics of the audio signal in order to form a unique fingerprint for the call. This information provides an unprecedented level of insight into the phone channel. For this report, Pindrop analyzed millions of calls globally, using phoneprinting to dissect the details of attacker techniques and behavior. 14 PINDROPSECURITY.COM

15 Phoneypot TM The Pindrop Phoneypot is a large-scale telephony honeypot that allows researchers to collect data from millions of calls to unlisted numbers. Pindrop uses the phoneypot to detect calling patterns for unwanted callers, such as robocallers, debt collectors and telemarketers. This provides researchers with a new understanding of telephony abuse and attack patterns. Topic Modeler Pindrop collects phone scam complaint data using its Topic Modeler, a proprietary online complaint collection tool. This tool aggregates data on suspicious numbers from hundreds of complaint sites, online communities, and web forums in order to determine the types of scams affecting consumers, as well as the volume of those scams. Monitoring online complaints gives researchers access to a wealth of information: fraudulent phone numbers and ANIs, date and time of complaints, and the text content of the complaint itself. ABOUT PINDROP LABS Pindrop Labs is focused on threats and vulnerabilities in the audio and telecommunications realms. This area, traditionally neglected from a security perspective, is increasingly favored by attackers for reconnaissance, exploitation, account takeover, and other attacks. Pindrop Labs research falls into two main areas: phone fraud prevention and securing the increasingly ubiquitous voice interface. Phone fraud prevention includes security for call centers, telecommunications infrastructure, and phone-reliant systems, organizations, and consumers. Securing voice interfaces includes providing authentication, threat detection, and fraud prevention for voice-enabled infrastructure. Pindrop Labs Research Team 15 PINDROPSECURITY.COM Matt Garland, VP Research David Dewey, Director of Research Raj Bandyopadhyay, Chief Data Scientist Cesar Gonzalez-Flores, Software Engineer Matt Anthony, VP Marketing Valerie Bradford, Product Marketing Manager

16 ABOUT PINDROP SECURITY Pindrop Security, headquartered in Atlanta, Ga., is a privately-held company that provides enterprise solutions to secure phone and voice communications. Pindrop solutions reduce fraud losses and authentication expense for some of the largest banks, brokerages and retailers in the world. Pindrop s patented Phoneprinting technology can identify, locate and authenticate phone devices uniquely just from the call audio thereby detecting fraudulent calls as well as verifying legitimate callers. Named SC Magazine 2013 Rookie Security Company of the Year, a Gartner Cool Vendor in Enterprise Unified Communications and Network Services for 2012 and one of the 10 Most Innovative Companies at the 2012 RSA conference, Pindrop Security s solutions restore enterprises confidence in the security of phone-based transactions. 16 PINDROPSECURITY.COM

Phone Fraud - A New Phenomenon

Phone Fraud - A New Phenomenon THE STATE OF PHONE FRAUD 2014-2015 A GLOBAL, CROSS-INDUSTRY THREAT WHITE PAPER TABLE OF CONTENTS Executive Summary... 3 Introduction... 4 A Global Threat... 4 Fraud Rates Within And Across Borders Phone

More information

Using Voice Biometrics in the Call Center. Best Practices for Authentication and Anti-Fraud Technology Deployment

Using Voice Biometrics in the Call Center. Best Practices for Authentication and Anti-Fraud Technology Deployment Using Voice Biometrics in the Call Center Best Practices for Authentication and Anti-Fraud Technology Deployment This whitepaper is designed for executives and managers considering voice biometrics to

More information

PROTECTING YOUR CALL CENTERS AGAINST PHONE FRAUD & SOCIAL ENGINEERING A WHITEPAPER BY PINDROP SECURITY

PROTECTING YOUR CALL CENTERS AGAINST PHONE FRAUD & SOCIAL ENGINEERING A WHITEPAPER BY PINDROP SECURITY PROTECTING YOUR CALL CENTERS AGAINST PHONE FRAUD & SOCIAL ENGINEERING A WHITEPAPER BY PINDROP SECURITY TABLE OF CONTENTS Executive Summary... 3 The Evolution of Bank Theft... Phone Channel Vulnerabilities

More information

PHONE FRAUD & SOCIAL ENGINEERING: HOW THE MODERN THIEF ROBS A BANK A WHITEPAPER BY PINDROP SECURITY

PHONE FRAUD & SOCIAL ENGINEERING: HOW THE MODERN THIEF ROBS A BANK A WHITEPAPER BY PINDROP SECURITY PHONE FRAUD & SOCIAL ENGINEERING: HOW THE MODERN THIEF ROBS A BANK A WHITEPAPER BY PINDROP SECURITY TABLE OF CONTENTS Executive Summary... 3 The Evolution of Bank Theft... Phone Channel Vulnerabilities

More information

TESTIMONY OF HENNING SCHULZRINNE Levi Professor of Computer Science and Electrical Engineering Columbia University SENATE AGING COMMITTEE

TESTIMONY OF HENNING SCHULZRINNE Levi Professor of Computer Science and Electrical Engineering Columbia University SENATE AGING COMMITTEE TESTIMONY OF HENNING SCHULZRINNE Levi Professor of Computer Science and Electrical Engineering Columbia University SENATE AGING COMMITTEE Ringing Off the Hook: Examining the Proliferation of Unwanted Calls

More information

BinBase.com REPORT: credit card fraud

BinBase.com REPORT: credit card fraud BinBase.com REPORT: credit card fraud Whether you are a security specialist, an e-commerce web developer, or an online merchant, a knowledge of how credit card fraud works and what you can do to prevent

More information

S.A.F.E. Recognize a scam before you become a victim of fraud Division of Consumer Protection

S.A.F.E. Recognize a scam before you become a victim of fraud Division of Consumer Protection S.A.F.E. Senior Anti-Fraud Education Recognize a scam before you become a victim of fraud New York StaTe Department of State Division of Consumer Protection Advocating for and empowering New York consumers

More information

TELECOM FRAUD CALL SCENARIOS

TELECOM FRAUD CALL SCENARIOS TELECOM FRAUD CALL SCENARIOS Contents Introduction to Telecom Fraud... 2 Three Major Categories of Telecom Fraud... 2 Premium Rate Numbers... 2 Traffic Pumping Schemes... 2 Call Forwarding Fraud... 3 Multiple

More information

Taxpayer Guide to Identity Theft Protect yourself. By Beatriz Landa-Sanchez, EA

Taxpayer Guide to Identity Theft Protect yourself. By Beatriz Landa-Sanchez, EA Taxpayer Guide to Identity Theft Protect yourself By Beatriz Landa-Sanchez, EA What is tax-related identity theft? Tax-related identity theft occurs when someone uses your stolen Social Security number

More information

VOIP SECURITY: BEST PRACTICES TO SAFEGUARD YOUR NETWORK ======

VOIP SECURITY: BEST PRACTICES TO SAFEGUARD YOUR NETWORK ====== VOIP SECURITY: BEST PRACTICES TO SAFEGUARD YOUR NETWORK ====== Table of Contents Introduction to VoIP Security... 2 Meet Our Expert - Momentum Telecom... 2 BroadWorks... 2 VoIP Vulnerabilities... 3 Call

More information

Holiday Fraud Myths. How They Leave Retailers Vulnerable

Holiday Fraud Myths. How They Leave Retailers Vulnerable Holiday Fraud Myths How They Leave Retailers Vulnerable Table of Contents 03 04 06 08 10 12 14 Introduction Myth #1 Digital Gift Cards Myth #2 Distance, Dollar and Expedite Myth #3 Machine vs. Manual Review

More information

Visa Debit processing. For ecommerce and telephone order merchants

Visa Debit processing. For ecommerce and telephone order merchants Visa Debit processing For ecommerce and telephone order merchants Table of contents About this guide 3 General procedures 3 Authorization best practices 3 Status check transactions 4 Authorization reversals

More information

What s New Collection Fall 2015

What s New Collection Fall 2015 What s New Collection Fall 2015 Anita Douglas Senior Stakeholder Liaison December 2, 2015 1 What s New Collection Compliance realignment What s Collection look like today Federal Tax Deposit Alerts Early

More information

THE CHANGING FACE OF IDENTITY THEFT THE CURRENT AND FUTURE LANDSCAPE

THE CHANGING FACE OF IDENTITY THEFT THE CURRENT AND FUTURE LANDSCAPE THE CHANGING FACE OF IDENTITY THEFT THE CURRENT AND FUTURE LANDSCAPE Identity is the unique set of characteristics that define an entity or individual. Identity theft is the unauthorized use of an individual

More information

Cybersecurity Workshop

Cybersecurity Workshop Cybersecurity Workshop February 10, 2015 E. Andrew Keeney, Esq. Kaufman & Canoles, P.C. E. Andrew Keeney, Esq. Kaufman & Canoles, P.C. 150 West Main Street, Suite 2100 Norfolk, VA 23510 (757) 624-3153

More information

EMAIL ACCOUNT TAKEOVER TO IDENTITY TAKEOVER

EMAIL ACCOUNT TAKEOVER TO IDENTITY TAKEOVER EMAIL ACCOUNT TAKEOVER TO IDENTITY TAKEOVER March 2013 Phishing attacks are notorious for their potential harm to online banking and credit card users who may fall prey to phishers looking to steal information

More information

Emerging Trends in the Payment Ecosystem: The Good, the Bad and the Ugly DAN KRAMER

Emerging Trends in the Payment Ecosystem: The Good, the Bad and the Ugly DAN KRAMER Emerging Trends in the Payment Ecosystem: The Good, the Bad and the Ugly DAN KRAMER SHAZAM, Senior Vice President Agenda The Ugly Fraud The Bad EMV? The Good Tokenization and Other Emerging Payment Options

More information

FFIEC CONSUMER GUIDANCE

FFIEC CONSUMER GUIDANCE FFIEC CONSUMER GUIDANCE Important Facts About Your Account Authentication Online Banking & Multi-factor authentication and layered security are helping assure safe Internet transactions for banks and their

More information

Avoid completing forms in email messages that ask for personal financial information.

Avoid completing forms in email messages that ask for personal financial information. INTERNET FRAUD Online scams and viruses are constantly evolving and they threaten the security of computers worldwide. As criminals evolve their tactics, you need to keep your PC's security software (virus

More information

PHISHING IN SEASON TAX TIME MALWARE, PHISHING AND FRAUD

PHISHING IN SEASON TAX TIME MALWARE, PHISHING AND FRAUD PHISHING IN SEASON TAX TIME MALWARE, PHISHING AND FRAUD April 2013 As cybercriminals will have it, phishing attacks are quite the seasonal trend. It seems that every April, after showing a slight decline

More information

Category: Student Life Outside of School Environment Element: Commerce Lesson: Shopping Online Grade Level: 6-12

Category: Student Life Outside of School Environment Element: Commerce Lesson: Shopping Online Grade Level: 6-12 Digital Citizenship Lesson Category: Student Life Outside of School Environment Element: Commerce Lesson: Shopping Online Grade Level: 6-12 Part I Introduction [Overview of topic] brief description of

More information

PROTECT YOURSELF A CONSUMER PROTECTION PAMPHLET

PROTECT YOURSELF A CONSUMER PROTECTION PAMPHLET PROTECT YOURSELF A CONSUMER PROTECTION PAMPHLET Money Transfer Scams Many scammers ask consumers to send money by wire transfer through companies like Western Union and MoneyGram. If you wire money and

More information

Here are two informational brochures that disclose ways that we protect your accounts and tips you can use to be safer online.

Here are two informational brochures that disclose ways that we protect your accounts and tips you can use to be safer online. Here are two informational brochures that disclose ways that we protect your accounts and tips you can use to be safer online. FFIEC BUSINESS ACCOUNT GUIDANCE New financial standards will assist credit

More information

CRM4M Accounting Set Up and Miscellaneous Accounting Guide Rev. 10/17/2008 rb

CRM4M Accounting Set Up and Miscellaneous Accounting Guide Rev. 10/17/2008 rb CRM4M Accounting Set Up and Miscellaneous Accounting Guide Rev. 10/17/2008 rb Topic Page Chart of Accounts 3 Creating a Batch Manually 8 Closing a Batch Manually 11 Cancellation Fees 17 Check Refunds 19

More information

Business Email Compromise Scam

Business Email Compromise Scam Business Email Compromise Scam The FBI has issued a warning about a significant spike in victims and dollar losses stemming from an increasingly common scam in which crooks spoof communications from executives

More information

IRS & Partners Combat Tax-Related Identity Theft What s New for 2016

IRS & Partners Combat Tax-Related Identity Theft What s New for 2016 IRS & Partners Combat Tax-Related Identity Theft What s New for 2016 General Scope of Identity Theft Identity theft costs U.S. victims more than all property crimes combined Identity theft remains number

More information

Evaluating DMARC Effectiveness for the Financial Services Industry

Evaluating DMARC Effectiveness for the Financial Services Industry Evaluating DMARC Effectiveness for the Financial Services Industry by Robert Holmes General Manager, Email Fraud Protection Return Path Executive Summary Email spoofing steadily increases annually. DMARC

More information

An Oracle White Paper July 2010 U.S. CARD FRAUD

An Oracle White Paper July 2010 U.S. CARD FRAUD An Oracle White Paper July 2010 U.S. CARD FRAUD Contents Card fraud can be placed into six categories:... 3 2 Card fraud costs the U.S. card payments industry an estimated US$8.6 billion per year. Although

More information

Security Breaches. There are unscrupulous individuals, like identity thieves, who want your information to commit fraud.

Security Breaches. There are unscrupulous individuals, like identity thieves, who want your information to commit fraud. IDENTITY THEFT Security Breaches Our economy generates an enormous amount of data. Most users of that information are from honest businesses - getting and giving legitimate information. Despite the benefits

More information

With the Target breach on everyone s mind, you may find these Customer Service Q & A s helpful.

With the Target breach on everyone s mind, you may find these Customer Service Q & A s helpful. With the Target breach on everyone s mind, you may find these Customer Service Q & A s helpful. Breach Overview Q: Media reports are stating that Target experienced a data breach. Can you provide more

More information

A RE T HE U.S. CHIP RULES ENOUGH?

A RE T HE U.S. CHIP RULES ENOUGH? August 2015 A RE T HE U.S. CHIP RULES ENOUGH? A longer term view of security and the payments landscape is needed. Abstract: The United States is finally modernizing its card payment systems and confronting

More information

1. Ask what your financial institution knows or has personally experienced with regard to internal and external data breaches.

1. Ask what your financial institution knows or has personally experienced with regard to internal and external data breaches. Part 1: Internal & External Data Breach Vulnerabilities Presented on: Thursday, February 12, 2 3 ET Co presented by: Ann Davidson VP of Risk Consulting at Allied Solutions Joe Majka CSO at Verifone 1 Breakdown

More information

Your Single Source. for credit, debit and pre-paid services. Fraud Risk and Mitigation

Your Single Source. for credit, debit and pre-paid services. Fraud Risk and Mitigation Your Single Source for credit, debit and pre-paid services Fraud Risk and Mitigation Agenda Types of Fraud Fraud Identification Notifications Next Steps 11/8/2013 2 Types of Fraud Lost and Stolen Cards

More information

When Fraud Comes Knocking

When Fraud Comes Knocking When Fraud Comes Knocking Identity theft occurs when someone uses your name, Social Security number, credit card number, or other personal information without your permission. It is a very serious crime.

More information

Child Identity Fraud - Current Trends and Advantages

Child Identity Fraud - Current Trends and Advantages WHITEPAPER 2011 Child Identity Fraud Study July 2011 2 Table of Contents Introduction 3 Key Findings 3 Background on Child Identity Fraud 4 Research on Child Identity Fraud 4 Description of the Consumer

More information

Protecting Yourself Against Identity Theft. Identity theft is a serious. What is Identity Theft?

Protecting Yourself Against Identity Theft. Identity theft is a serious. What is Identity Theft? Protecting Yourself Against Identity Theft Identity theft is a serious crime. Identity theft happens when someone steals your personal information and uses it without your permission. It is a growing threat

More information

WHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR

WHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST Protecting Identities. Enhancing Reputations. IDT911 1 DATA BREACHES AND SUBSEQUENT IDENTITY THEFT AND FRAUD THREATEN YOUR ORGANIZATION

More information

Client Education. Learn About Identity Theft

Client Education. Learn About Identity Theft Client Education Learn About Identity Theft 2 What is identity theft? 6 Detecting identity theft 10 Minimizing your risk 14 What to do if you re a victim The Federal Trade Commission (FTC) estimates that

More information

Protect Your Personal Information. Tips and tools to help safeguard you against identity theft

Protect Your Personal Information. Tips and tools to help safeguard you against identity theft Protect Your Personal Information Tips and tools to help safeguard you against identity theft Trademark of Visa International Service Association; Visa Canada Association is a licensed user. What is Identity

More information

Reduce Fraud: Stop Fraudsters Before They Strike

Reduce Fraud: Stop Fraudsters Before They Strike Reduce Fraud: Stop Fraudsters Before They Strike The ability for a company to protect itself from ill intentioned web users is vital to their ability to succeed online. Billions of dollars are lost every

More information

Fraud and Identity Theft. Megan Stearns, Credit Counselor

Fraud and Identity Theft. Megan Stearns, Credit Counselor Fraud and Identity Theft Megan Stearns, Credit Counselor Agenda Fraud and identity theft statistics Fraud Identity theft Identity theft prevention Protecting your Social Security Number Online prevention

More information

CATCH ME IF YOU CAN: THE IRS IMPERSONATION SCAM AND WHAT IS BEING DONE ABOUT IT

CATCH ME IF YOU CAN: THE IRS IMPERSONATION SCAM AND WHAT IS BEING DONE ABOUT IT STATEMENT OF ALYSA D. ERICHS SPECIAL AGENT IN CHARGE HOMELAND SECURITY INVESTIGATIONS MIAMI U.S. IMMIGRATION AND CUSTOMS ENFORCEMENT REGARDING A HEARING ON CATCH ME IF YOU CAN: THE IRS IMPERSONATION SCAM

More information

EMV's Role in reducing Payment Risks: a Multi-Layered Approach

EMV's Role in reducing Payment Risks: a Multi-Layered Approach EMV's Role in reducing Payment Risks: a Multi-Layered Approach April 24, 2013 Agenda EMV Rationale Why is this worth the effort? Guides how we implement it EMV Vulnerability at the POS EMV Impact on CNP

More information

Market Intelligence Cell. Fighting Financial Crime

Market Intelligence Cell. Fighting Financial Crime Market Intelligence Cell Fighting Financial Crime 1 Market Intelligence Cell Our objective To investigate and suppress illegal, dishonorable and improper practices, market abuse and any potential breach

More information

Cost-management strategies. Your guide to accepting card payments cost-effectively

Cost-management strategies. Your guide to accepting card payments cost-effectively Cost-management strategies Your guide to accepting card payments cost-effectively Table of Contents Guidance from Wells Fargo Merchant Services...3 The secret to better interchange rates...4 Why interchange

More information

Phone Scams. Federal Trade Commission consumer.ftc.gov

Phone Scams. Federal Trade Commission consumer.ftc.gov Phone Scams Federal Trade Commission consumer.ftc.gov Every year, thousands of people lose money to telephone scams from a few dollars to their life savings. Scammers will say anything to cheat people

More information

Top Ten Fraud Risks That Impact Your Financial Institution. Presented by Ann Davidson - VP Risk Consulting Allied Solutions LLC.

Top Ten Fraud Risks That Impact Your Financial Institution. Presented by Ann Davidson - VP Risk Consulting Allied Solutions LLC. Top Ten Fraud Risks That Impact Your Financial Institution Presented by Ann Davidson - VP Risk Consulting Allied Solutions LLC Agenda Education on understanding the fraud risk Take away.. Education to

More information

Benefits of LifeLock Ultimate Plus. About LifeLock. 3 Layers of Protection DETECT ALERT RESTORE FACT SHEET LIFELOCK ULTIMATE PLUS

Benefits of LifeLock Ultimate Plus. About LifeLock. 3 Layers of Protection DETECT ALERT RESTORE FACT SHEET LIFELOCK ULTIMATE PLUS FACT SHEET LIFELOCK ULTIMATE PLUS Your bank accounts and credit are a gold mine for identity thieves. LifeLock Ultimate Plus service gives you some peace of mind knowing you have LifeLock s most comprehensive

More information

SAFEGUARDING YOUR CHILD S FUTURE. Child Identity Theft. Protecting Your Child s Identity

SAFEGUARDING YOUR CHILD S FUTURE. Child Identity Theft. Protecting Your Child s Identity SAFEGUARDING YOUR CHILD S FUTURE Child Identity Theft Child identity theft happens when someone uses a minor s personal information to commit fraud. A thief may steal and use a child s information to get

More information

Top Fraud Trends Facing Financial Institutions

Top Fraud Trends Facing Financial Institutions Top Fraud Trends Facing Financial Institutions Presented on: October 7, 2015, 2-3 ET Presented by: Ann Davidson - VP of Risk Consulting at Allied Solutions Webinar Agenda 1. Fraud trends in 2015 and beyond

More information

Fraud Mitigation and Identity Verification for Card Not Present Transactions Overview

Fraud Mitigation and Identity Verification for Card Not Present Transactions Overview Fraud Mitigation and Identity Verification for Card Not Present Transactions Overview Credit card fraud costs businesses over $11 Billion dollars annually. The percentage of revenue lost to fraud is rising;

More information

Fraud. Spot it.stop it. Keep Your Finances Safe

Fraud. Spot it.stop it. Keep Your Finances Safe Fraud Spot it.stop it. Keep Your Finances Safe 2003 MasterCard International Incorporated. All rights reserved. MasterCard is a registered trademark of MasterCard International. DON T PAY A HIGH PRICE

More information

How Multi-Pay Tokens Can Reduce Security Risks and the PCI Compliance Burden for ecommerce Merchants

How Multi-Pay Tokens Can Reduce Security Risks and the PCI Compliance Burden for ecommerce Merchants How Multi-Pay Tokens Can Reduce Security Risks and the PCI Compliance Burden for ecommerce Merchants 2012 First Data Corporation. All trademarks, service marks and trade names referenced in this material

More information

Understanding and Combating Online Fraud in 2014

Understanding and Combating Online Fraud in 2014 Understanding and Combating Online Fraud in 2014 Fraud is pervasive online and high-risk merchants must be vigilant in employing a multi-layered, comprehensive approach to security and risk management.

More information

The Comprehensive, Yet Concise Guide to Credit Card Processing

The Comprehensive, Yet Concise Guide to Credit Card Processing The Comprehensive, Yet Concise Guide to Credit Card Processing Written by David Rodwell CreditCardProcessing.net Terms of Use This ebook was created to provide educational information regarding payment

More information

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK With organizations rushing to adopt Voice over IP (VoIP) technology to cut costs and integrate applications designed to serve customers better,

More information

INTRODUCTION. Identity Theft Crime Victim Assistance Kit

INTRODUCTION. Identity Theft Crime Victim Assistance Kit Identity Theft Crime Victim Assistance Kit INTRODUCTION In the course of a busy day, you may write a check at the grocery store, charge tickets to a ball game, rent a car, mail your tax returns, change

More information

Is the PCI Data Security Standard Enough?

Is the PCI Data Security Standard Enough? Is the PCI Data Security Standard Enough? By: Christina M. Freeman ICTN 6870 Advanced Network Security Abstract: This paper will present the researched facts on Payment Card Industry Data Security Standard

More information

Payment Systems Department

Payment Systems Department v Note: Please follow these guidelines for your safety as you enjoy the convenience of technology. However these guidelines are general; therefore, specific precautions may be taken as warranted by the

More information

Spotting ID Theft Red Flags A Guide for FACTA Compliance. An IDology, Inc. Whitepaper

Spotting ID Theft Red Flags A Guide for FACTA Compliance. An IDology, Inc. Whitepaper Spotting ID Theft Red Flags A Guide for FACTA Compliance An IDology, Inc. Whitepaper With a November 1 st deadline looming for financial companies and creditors to comply with Sections 114 and 315 of the

More information

Beyond passwords: Protect the mobile enterprise with smarter security solutions

Beyond passwords: Protect the mobile enterprise with smarter security solutions IBM Software Thought Leadership White Paper September 2013 Beyond passwords: Protect the mobile enterprise with smarter security solutions Prevent fraud and improve the user experience with an adaptive

More information

The New Reality of Synthetic ID Fraud How to Battle the Leading Identity Fraud Tactic in The Digital Age

The New Reality of Synthetic ID Fraud How to Battle the Leading Identity Fraud Tactic in The Digital Age How to Battle the Leading Identity Fraud Tactic in The Digital Age In the 15 years since synthetic identity fraud emerged as a significant threat, it has become the predominant tactic for fraudsters. The

More information

Consumer ID Theft Total Costs

Consumer ID Theft Total Costs Billions Consumer and Business Identity Theft Statistics Business identity (ID) theft is a growing crime and is a growing concern for state filing offices. Similar to consumer ID theft, after initially

More information

IBM Global Technology Services May 2007. The vishing guide. Gunter Ollmann

IBM Global Technology Services May 2007. The vishing guide. Gunter Ollmann IBM Global Technology Services May 2007 The vishing guide. Gunter Ollmann Page 2 Contents 2 Executice summary 3 What is vishing? 5 Attack vectors 6 Initiating the attack 15 Conclusions Executive summary

More information

Identity Theft Assistance Kit A self-help guide to protecting yourself and your identity

Identity Theft Assistance Kit A self-help guide to protecting yourself and your identity Identity Theft Assistance Kit A self-help guide to protecting yourself and your identity Stillman Bank works hard to serve and protect our customers identities and ensure their safety. That s why we have

More information

PayPoint.net Gateway Guide to Identifying Fraud Risks

PayPoint.net Gateway Guide to Identifying Fraud Risks PayPoint.net Gateway Guide to Identifying Fraud Risks Copyright PayPoint.net 2010 This document contains the proprietary information of PayPoint.net and may not be reproduced in any form or disclosed to

More information

WRITTEN TESTIMONY OF JOHN A

WRITTEN TESTIMONY OF JOHN A WRITTEN TESTIMONY OF JOHN A. KOSKINEN COMMISSIONER INTERNAL REVENUE SERVICE BEFORE THE SENATE FINANCE COMMITTEE ON UNAUTHORIZED ATTEMPTS TO ACCESS TAXPAYER DATA JUNE 2, 2015 Chairman Hatch, Ranking Member

More information

DATA BREACHES: HOW IT IMPACTS THE CUSTOMER & THE FINANCIAL INSTITUTION. Prepared For: First Citizens Federal Credit Union 3/18/2015

DATA BREACHES: HOW IT IMPACTS THE CUSTOMER & THE FINANCIAL INSTITUTION. Prepared For: First Citizens Federal Credit Union 3/18/2015 DATA BREACHES: HOW IT IMPACTS THE CUSTOMER & THE FINANCIAL INSTITUTION. Prepared For: First Citizens Federal Credit Union TABLE OF CONTENTS Data Breach Trends Financial Institutions Impact How First Citizens

More information

Dear Fellow New Yorker,

Dear Fellow New Yorker, Dear Fellow New Yorker, Every day, in every corner of the State, New Yorkers are purchasing goods and services. Our purchases range from the latest smartphone to buying our first home, and include a wide

More information

FUNDS TRANSFER AGREEMENT AND DISCLOSURES

FUNDS TRANSFER AGREEMENT AND DISCLOSURES REG E DISCLOSURE This disclosure contains information about terms, fees, and interest rates for some of the accounts we offer. ELECTRONIC FUNDS TRANSFER AGREEMENT AND DISCLOSURES This form complies with

More information

Driving License. National Insurance Number

Driving License. National Insurance Number STAR has teamed up with Prevention of Fraud in Travel (PROFiT) and the Fraud Intelligence Network (FIN) to offer our members the best advice about fraud prevention. We recognise the increasing threat of

More information

PRACTICAL MONEY GUIDES DEBIT CARD BASICS. What you need to know about using your debit card

PRACTICAL MONEY GUIDES DEBIT CARD BASICS. What you need to know about using your debit card PRACTICAL MONEY GUIDES DEBIT CARD BASICS What you need to know about using your debit card MONEY IN THE BANK If credit cards mean pay later, debit cards mean pay now. These cards are issued by your bank,

More information

Working Together to Prevent Identity Theft

Working Together to Prevent Identity Theft Working Together to Prevent Identity Theft Response of the Canadian Wireless Telecommunications Association Submitted to the Consumers Measures Committee September 30, 2005. 130 Albert St., Suite 1110,

More information

Statement of. Carlos Minetti. Discover Financial Services. Before the. Subcommittee on Oversight and Investigations. of the

Statement of. Carlos Minetti. Discover Financial Services. Before the. Subcommittee on Oversight and Investigations. of the Statement of Carlos Minetti Discover Financial Services Before the Subcommittee on Oversight and Investigations of the Committee on Financial Services United States House of Representatives July 21, 2005

More information

I know what is identity theft but how do I know if mine has been stolen?

I know what is identity theft but how do I know if mine has been stolen? What is identity theft? You might hear stories on the news about stolen identities, but what is identity theft? When someone uses the personal information that identifies you, like your name, credit card

More information

IdentityTheft HOW IDENTITY THEFT HAPPENS PROTECTING YOURSELF RECOVERING FROM IDENTITY THEFT

IdentityTheft HOW IDENTITY THEFT HAPPENS PROTECTING YOURSELF RECOVERING FROM IDENTITY THEFT CREDIT What You Should Know About... IdentityTheft HOW IDENTITY THEFT HAPPENS PROTECTING YOURSELF RECOVERING FROM IDENTITY THEFT YourMoneyCounts You may have heard of a crime called identity theft, but

More information

The In-Depth Guide to Fraud Prevention in International E-commerce

The In-Depth Guide to Fraud Prevention in International E-commerce The In-Depth Guide to Fraud Prevention in International E-commerce The Evolution of Fraud Cyberattacks are not a new threat, yet the rise in high-profile hacking cases has merchants rightfully concerned

More information

Benefits Handbook Date March 1, 2016. Identity Theft Protection Benefit Program Marsh & McLennan Companies

Benefits Handbook Date March 1, 2016. Identity Theft Protection Benefit Program Marsh & McLennan Companies Date March 1, 2016 Identity Theft Protection Benefit Program Marsh & McLennan Companies Marsh & McLennan Companies offers identity theft solutions, supplied by InfoArmor, to all eligible employees (family

More information

CONTACT. information. All consumer complaints must be made in writing. Please call or write for a complaint form. Write to:

CONTACT. information. All consumer complaints must be made in writing. Please call or write for a complaint form. Write to: GREG ABBOTT Attorney General of Texas CONTACT information For more information or to obtain copies of brochures, call the Attorney General s Consumer Protection Hotline at (800) 621-0508, or contact your

More information

Identity Theft: How the IRS Protects Taxpayers and Helps Victims. Combating Identity Theft and Online Fraud

Identity Theft: How the IRS Protects Taxpayers and Helps Victims. Combating Identity Theft and Online Fraud Identity Theft: How the IRS Protects Taxpayers and Helps Victims Combating Identity Theft and Online Fraud What is identity theft? Identity theft occurs when someone uses your personal information such

More information

Learn to protect yourself from Identity Theft. First National Bank can help.

Learn to protect yourself from Identity Theft. First National Bank can help. Learn to protect yourself from Identity Theft. First National Bank can help. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone

More information

Fighting Online Fraud

Fighting Online Fraud White Paper Fighting Online Fraud Maintaining tight security, including using both standard and advanced fraud detection and prevention tools, is crucial to maintaining a successful business. No merchant

More information

How the IRS Helps Taxpayers and Assist Victims

How the IRS Helps Taxpayers and Assist Victims How the IRS Helps Taxpayers and Assist Victims Combating Identity Theft and Online Fraud Phil Oliver and Mark Harrington Privacy, Governmental Liaison and Disclosure May 31, 2013 What is identity theft?

More information

Take our Fraud Quiz and see what you know about frauds and scams in Canada. Test yourself on

Take our Fraud Quiz and see what you know about frauds and scams in Canada. Test yourself on Take our Fraud Quiz and see what you know about frauds and scams in Canada. Test yourself on Are you a Target? On-Line Scams Credit/Debit Card Investment Identity Theft Frauds Scams Mark the following

More information

AUSTRALIAN PAYMENTS FRAUD DETAILS AND DATA

AUSTRALIAN PAYMENTS FRAUD DETAILS AND DATA Australian Payments Clearing Association AUSTRALIAN PAYMENTS FRAUD DETAILS AND DATA 214 Australian Payments Clearing Association Limited ABN 12 55 136 519 CONTENTS OVERVIEW 1 SECTION 1 Fraud rates 4 SECTION

More information

A CHASE PAYMENTECH WHITE PAPER. Expanding internationally: Strategies to combat online fraud

A CHASE PAYMENTECH WHITE PAPER. Expanding internationally: Strategies to combat online fraud A CHASE PAYMENTECH WHITE PAPER Expanding internationally: Strategies to combat online fraud Fraud impacts nearly eight in every ten international online retailers 1. It hampers prospects for growth, restricts

More information

1. Any email requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic.

1. Any email requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone who can potentially harm your good name and financial well-being. Identity theft

More information

FINANCIAL FRAUD: THE IMPACT ON CORPORATE SPEND IT SECURITY RISKS SPECIAL REPORT SERIES

FINANCIAL FRAUD: THE IMPACT ON CORPORATE SPEND IT SECURITY RISKS SPECIAL REPORT SERIES FINANCIAL FRAUD: THE IMPACT ON CORPORATE SPEND IT SECURITY RISKS SPECIAL REPORT SERIES Kaspersky Lab 2 Corporate IT Security Risks Survey details: More than 5,500 companies in 26 countries around the world

More information

Identity Theft Protection Plans

Identity Theft Protection Plans Identity Theft Protection Plans Legal Resources has partnered with IdentityForce to offer two plan options for identity theft protection for employees at the City of Virginia Beach and Virginia Beach City

More information

Understand the Business Impact of EMV Chip Cards

Understand the Business Impact of EMV Chip Cards Understand the Business Impact of EMV Chip Cards 3 What About Mail/Telephone Order and ecommerce? 3 What Is EMV 3 How Chip Cards Work 3 Contactless Technology 4 Background: Behind the Curve 4 Liability

More information

Information to Protect Our Customers From Identity Theft

Information to Protect Our Customers From Identity Theft Our Customers From Identity Theft Identity (ID) Theft Capital One understands that ID Theft is a growing concern of our customers, and that it is a frustrating experience for victims. We share these concerns

More information

Four Ways Counterfeit Electronics are Killing Your Profits and Steps to Fight Back A PLAYBOOK FOR THE ELECTRONICS INDUSTRY

Four Ways Counterfeit Electronics are Killing Your Profits and Steps to Fight Back A PLAYBOOK FOR THE ELECTRONICS INDUSTRY Four Ways Counterfeit Electronics are Killing Your Profits and Steps to Fight Back A PLAYBOOK FOR THE ELECTRONICS INDUSTRY INTRODUCTION We all know that counterfeit products exist on the market. Whether

More information

Phishing Victims Likely Will Suffer Identity Theft Fraud

Phishing Victims Likely Will Suffer Identity Theft Fraud Markets, A. Litan Research Note 14 May 2004 Phishing Victims Likely Will Suffer Identity Theft Fraud Fifty-seven million U.S. adults think they have received a phishing e-mail. More than 1.4 million users

More information

Criminal Investigation

Criminal Investigation Criminal Investigation Stolen Identity Refund Fraud (SIRF) Nneka Sutherland Special Agent (267) 941 6281 Nneka.Sutherland@ci.irs.gov Joseph Carl Special Agent (267) 941 6117 Joseph.Carl@ci.irs.gov IRS

More information

15 Bad Things Identity Thieves Can Do With Your Identity

15 Bad Things Identity Thieves Can Do With Your Identity This free ebook is provided to help you protect yourself from fraud and identity theft by LeMay Mobile Shredding. LeMay Mobile Shredding offers mobile document shredding to help you destroy old tax forms,

More information

David Jones Storecard and David Jones American Express Card Member Agreement, Financial Services Guide and Purchase Protection. Terms and Conditions

David Jones Storecard and David Jones American Express Card Member Agreement, Financial Services Guide and Purchase Protection. Terms and Conditions David Jones Storecard and David Jones American Express Card Member Agreement, Financial Services Guide and Purchase Protection Terms and Conditions Issued May 2016 DAVID JONES STORECARD AND DAVID JONES

More information

Tax Preparers and Identity Theft

Tax Preparers and Identity Theft Tax Preparers and Identity Theft It is a form of crime unique to the 21st Century, as the massive collection of data from consumers and a lack of sophisticated computer security measures combine to offer

More information

Credit Report Forensics. Boston University Financial Assistance February 15, 2012 Christina Coviello, Senior Assistant Director

Credit Report Forensics. Boston University Financial Assistance February 15, 2012 Christina Coviello, Senior Assistant Director Credit Report Forensics Boston University Financial Assistance February 15, 2012 Christina Coviello, Senior Assistant Director Today s Agenda: What is credit? What is a credit report? How to get a copy

More information

Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation. By Marc Ostryniec, vice president, CSID

Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation. By Marc Ostryniec, vice president, CSID Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation By Marc Ostryniec, vice president, CSID The increase in volume, severity, publicity and fallout of recent data breaches

More information

PAYMENT CARD INDUSTRY (PCI) COMPLIANCE HISTORY & OVERVIEW

PAYMENT CARD INDUSTRY (PCI) COMPLIANCE HISTORY & OVERVIEW PAYMENT CARD INDUSTRY (PCI) COMPLIANCE HISTORY & OVERVIEW David Kittle Chief Information Officer Chris Ditmarsch Network & Security Administrator Smoker Friendly International / The Cigarette Store Corp

More information