Understanding Ecommerce Fraud Risks and Exposures

Size: px
Start display at page:

Download "Understanding Ecommerce Fraud Risks and Exposures"

Transcription

1 Understanding Ecommerce Fraud Risks and Exposures ASOBANCARIA s 6th Congress of Fraud Prevention and Security Thursday, 25 October, 2012 Chris Burns, CEO

2 Agenda The Underground Internet Economy Still Thriving The Cost of Fraud Current Trends in Online Fraud Examples of Fraudulent Activity Mobile Trends Fraud Mitigation & Case Studies FAC Recommendations

3 The Underground Internet Economy Fraud is a costly experience for all online merchants Shadow internet economy still thriving Merchants are trying to keep up with fraud to protect their bottom line and their customers Increases in ecommerce are driving increased fraudulent activity 1. 5 million victims of Cyber crime per day Million victims per year (Norton) Cybercriminals are sophisticated and understand the card processing systems better than most merchants Cybercriminals continually develop new methods for tricking victims with scams that bring in billions per year in profits

4 The Underground Internet Economy In 2011, fraud cost businesses over $100 Billion Losses included: Unrecoverable Product Replacement Costs Chargeback Fees + dispute fees Manual Reviews Distracts staff from revenue generating aspects of operating a business Fines and Penalties Loss of merchant account Customer Satisfaction, Brand Image, insulted customer Number 1 reason for CBs is fraudulent transactions (Visa) Fraud increased by 25% year-over-year, e-commerce grew 16% Brazil accounted for 7% of global economic loses related to cybercrime $8 billion, Mexico was responsible for $2 billion Source: Kount

5 The Underground Internet Economy Cost of Fraud Merchants using more tools to compete with increased fraud threat = higher costs Large merchants use on average 8 different tools to screen orders Nearly 50% of all chargebacks are direct result of fraud Refunds can be = to or > cost of CBs loss of product, shipping costs Average order rejection rate in US is 2.4% and 7.7% internationally Revenue impact felt by small and large business alike Management, reviews and escalation of suspect transactions time and cost of review teams Merchants bear the highest percentage of fraud costs compared to Banks and card holders Source: Kount

6 Industries with the highest fraud rates - US 1. Consumer electronics 2. Apparel/Jewelry 3. Household/General Merchandise 4. Physical Goods 5. Digital goods and services 6. All services Source Cybersource 2012 online fraud report

7 The Underground Internet Economy Current Trends: Just some examples of methods used by fraudsters today to obtain personal and financial information Identity Theft Credit Card Number Generators Phishing Card Counterfeiters Spam/Junk Mail offers Black Market Card & Billing Address Lists Skimming Key Stroke Loggers Spoofing 3D Secure Enrolment Phishing Scams Malware Nigerian money transfer scam s Server Hacking

8

9 The Underground Internet Economy Cybercriminals profit from selling stolen data TrendLabs identified the following items & their average price tag for sale on the underground: Documents Scan Resale Services: Passport/utility bill/statement - $20 Credit card (front and back) - $25 Original docs - starts from $4 Passport - $20 Drivers License - $20 Credit cards - $30 Utility bill - $10

10 The Underground Internet Economy Credit Card Number Value in the Cybercriminal Underground US $1-3 per US based card number US $3-8 per Central America, Australia & Europe-based number US $6-10 per number in Asia, Middle East and other countries 1 verified PayPal account (attached to credit card or bank account) costs US $1-6 when sold underground Source: Trend Micro TrendLabs: Annual Security Roundup 2011

11 Examples of Fraudulent Activity Phishing Phishing attacks use or malicious websites to solicit personal information by posing as a trustworthy organization For example, an attacker may send seemingly from a reputable credit card company or financial institution requesting account information FACT ebay & PayPal are 2 of the most commonly phished sites (Source: TrendLabs) When users respond with the requested information, attackers can use it to gain access to those accounts

12 Examples of Fraudulent Activity

13 Examples of Fraudulent Activity

14 Note the high jacked URL This is a phished site Copyright year is different

15 This is the real site (URL and look & feel has since changed)

16 Examples of Fraudulent Activity Social networking sites present huge opportunities for cybercriminals Some reports indicate that as much as 30% of personalities on social network sites are people working a scam Facebook, LinkedIn, Twitter, MySpace and other social networking sites all been hit by various phishing scams Dorkbot malware -- Latin America was the most infected region in The worm stole 1000s of passwords for Facebook, Twitter Gmail and Paypal LinkedIn phishers targeted users with suspicious invitations to connect. The link triggered malware that embedded itself in user s browser if the browser was opened July, Twitter phishing scam preying on curiosity about criticism. Came in the form of a direct message from a friend, but was phishing scam aimed at stealing Twitter login details

17 TrendLabs Annual Security Roundup 2011 TOP 3 PUBLICLY AVAILABLE INFORMATION ON SOCIAL MEDIA 3 MOST COMMON FACEBOOK ATTACK TYPES addresses Hometown High school Likejacking Attacks Rogue application propagation attacks Spam campaigns TOP 3 SOCIAL MEDIA SECURITY RISKS Malware infection Data leakage Unwilling attack participation

18 Examples of Fraudulent Activity Credit Card Number Generation Credit card generation software online is prolific and easy to obtain Once the card BIN number is sourced, online generation software can produce thousands of card numbers which will authorise online BIN attacks are common on merchant web sites and are detected by fraud software or a diligent payment solutions provider who recognize the transaction testing patterns used to validate BIN ranges and counterfeit credit card numbers New online reference sites like the BIN database are very useful to banks and fraudsters for completely different reasons!

19 Examples of Fraudulent Activity

20 Examples of Fraudulent Activity

21 Examples of Fraudulent Activity

22 Examples of Fraudulent Activity Cybercriminals always trying out new schemes in order to replace old ones that have become less effective Ukash & Paysafecard (voucher providers) are frequently used by criminals (according to TrendLabs) Both companies are legitimate businesses. However, vouchers are like cash and there is no records of them changing hands Criminals take the vouchers and sell them to exchange sites for 40 to 50% of face value Exchanges then sell them to customers for up to 90% of value

23 Examples of Fraudulent Activity

24 Examples of Fraudulent Activity Affiliate networking has helped fraudsters flourish even more with products sold via affiliate & cost-per-click marketing Merchants are misled into paying commissions that they should not be paying Fraudulent affiliates use techniques such as cookie-stuffing, URL hijacking & adware to get paid commissions for leads they did not refer They may also order products using stolen credit cards with no intention of receiving product, just the commission

25 Mobile Trends Source: KOUNT

26 Mobile Trends Mobile is an important extra channel to market Smartphones and tablets & their large -scale consumer adoption is changing the way we pay. 80% of Latin Americans have a mobile phone BUT as use of mobile payments grows globally, so too does risk of FRAUD Mobile fraud risk is still fairly unknown, but evidence suggests that mobile fraud rates may be among highest of all CNP fraud Two schools of though on this Riskier as it is a new channel (more loop holes) and harder to identify the device Vs. closed mobile network device almost always on person and passcodes on phones. Mobile vulnerabilities doubles in 2011 over % of mobile users received a text from someone they didn t know asking them to click on malicious links

27 Mobile Trends 2011 saw the mobile threat landscape mature -- evidenced by staggering spike in mobile malware volume (According to Trend Micro s Trend Labs annual security roundup) But if you pass on offering mobile payment, you lose out on the upside of this sales channel If current trends hold, we may be able to see more than 120,000 malicious Android apps by the end of Menard Oseña, Trend Micro Solutions Product Manager

28 Fraud Mitigation Use the right tools Fraud detection tools are those used to identify the probability of risk associated with an online transaction. They do not guarantee that a fraud will not occur and certainly will never prevent a chargeback from being initiated by the consumer Fraud prevention tools like CVV2/CVC2 and 3-D Secure do provide guarantees against fraud coded chargebacks and are fully sponsored by the Card Associations for chargeback compliance What can you take away from all of this? Importance of choosing an e-commerce Provider that can work with you to help mitigate fraud & customize a solution that is right for your business Payment and Fraud Strategy should always be top of mind (even when you think you have it nailed)

29 Fraud Mitigation Use the right tools: AVS & Card Verification Code 3-D Secure Bin Blocking Card Blocking Transaction Data Monitoring Manual Reviews Transaction Value Caps Volume Limits FAC is also currently adding a third party risk scoring system to our platform Kount Kount provides maximum protection for some of the world s best known companies. Hundreds of variables are analyzed to give the merchant a clear picture of the risk associated with a transaction

30 Fraud Mitigation Who is Kount? Founded in 2007 (Idaho, USA) Technology dating back to 1998 Multiple patents Empower their merchants to WIN THE WAR on fraud An operational platform, all-in-one, SaaS solution Reduce fraud without jeopardizing sales Greater usability with less complexity Speed & Accuracy

31 Fraud Mitigation Kount Complete Platform

32 Recommendations What can you do to protect you business? Watch for behaviour patterns that don t seem normal for customers at your web site (or on the phone, or other access point) or Merchants in your portfolio Merchants must implement PCI compliant security requirements to reduce risk to malware/trojan/spyware attacks. Implement transaction pre-authentication solutions including AVS, CVV2, IP Geolocation and data sharing services in addition to Verified by Visa & MasterCard SecureCode WHY? Pre-authentication transaction services - pre-screen transactions to filter out obvious or suspicious fraudulent transactions Outsource fraud services to knowledgeable third parties who are experts in detection and data analysis Don t be afraid to ask for help KNOW YOUR ENEMY!

33 Recommendations Pre-authentication and automated fraud screening services cannot predict human behaviour which ultimately results in chargebacks. Habitual chargeback offenders (the friendly fraud culprits) are aware of this and will use this over and over again 3-D Secure is there to protect online merchants from habitual chargeback offenders by allowing fraud chargebacks to be represented under the chargeback liability shift guarantees Implement pre-screening of card information before you process the payment (if applicable). It s an extra step but a valuable one to prevent a chargeback loss later on REMEMBER!

34 Fraud Prevention Case Studies Latin America Caribbean Merchants Large Airline in LACR implemented FAC s AVS + CVV2 consumer verification to validate legitimacy of the consumer transaction prior to the actual payment for the ticket. This enables the airline to verify the plastic for fraud before the ticket is issued Airlines & Travel Agencies are also implementing AVS + CVV2 verification at the point of sale (terminal) during a face-to-face transaction (or over the phone) to assist with consumer verification Verified By Visa & MasterCard SecureCode solutions have been implemented in Mexico, Europe and South America as a standalone service which is performed BEFORE the payment authorisation request -- This allows merchant to validate the enrolment status of the Issuer and Cardholder before the transaction is performed so a risk profile can be obtained for chargeback liability shift rights

35 FAC s Payment Platform Key Features Multi-jurisdictional, multi-currency settlement via a single interface Direct merchant accounts Call Centre web applications Virtual Terminal (back office support) Mail Order/Telephone Order (MO/TO) Batch Processing Recurring Payments Tokenization Secure web-based transaction reporting Hosted Payment Page Web-based chargeback reports 24 x 7 telephone, web and emergency technical support 3-D Secure - certified MPI (EU, CEMEA, LACR) CVV2/CVC2/CID and AVS checks PCI Compliant Gateway since 2005 Alternative payments Fraud prevention solutions

36 Lastly DON T LET FRAUD BE JUST ANOTHER COST OF DOING BUSINESS!

37 Thank You Chris Burns First Atlantic Commerce Ltd Tel: +(441)

Online Payment Processing What You Need to Know. PayPal Business Guide

Online Payment Processing What You Need to Know. PayPal Business Guide Online Payment Processing What You Need to Know PayPal Business Guide PayPal Business Guide Online Payment Processing 2006 PayPal, Inc. All rights reserved. PayPal, Payflow, and the PayPal logo are registered

More information

BinBase.com REPORT: credit card fraud

BinBase.com REPORT: credit card fraud BinBase.com REPORT: credit card fraud Whether you are a security specialist, an e-commerce web developer, or an online merchant, a knowledge of how credit card fraud works and what you can do to prevent

More information

FAC Corporate Overview Driving Payment Innovation

FAC Corporate Overview Driving Payment Innovation FAC Corporate Overview Driving Payment Innovation First Atlantic Commerce (FAC) is a leading international online payment solutions provider First Atlantic Commerce First Atlantic Commerce (FAC) is a leading

More information

Guide to credit card security

Guide to credit card security Contents Click on a title below to jump straight to that section. What is credit card fraud? Types of credit card fraud Current scams Keeping your card and card details safe Banking and shopping securely

More information

BOOST SALES, BEAT FRAUD

BOOST SALES, BEAT FRAUD BOOST SALES, BEAT FRAUD How Effective Fraud Management Can Increase Sales and Decrease Fraud Losses INTROS Don Bush Marketing Director, Kount Inc. Don works with online merchants, industry analysts, payment

More information

A CHASE PAYMENTECH WHITE PAPER. Expanding internationally: Strategies to combat online fraud

A CHASE PAYMENTECH WHITE PAPER. Expanding internationally: Strategies to combat online fraud A CHASE PAYMENTECH WHITE PAPER Expanding internationally: Strategies to combat online fraud Fraud impacts nearly eight in every ten international online retailers 1. It hampers prospects for growth, restricts

More information

Fighting Online Fraud

Fighting Online Fraud White Paper Fighting Online Fraud Maintaining tight security, including using both standard and advanced fraud detection and prevention tools, is crucial to maintaining a successful business. No merchant

More information

Your Gateway to Online Success

Your Gateway to Online Success The NETBANX gateway is a leading, proprietary online payment processing platform operating on a world class technology infrastructure. Trusted by global brands and companies around the world, the NETBANX

More information

Merchant Business Solutions. Protecting business against credit card fraud.

Merchant Business Solutions. Protecting business against credit card fraud. Merchant Business Solutions. Protecting business against credit card fraud. Version 4.0 May 2011 Contents Protect your business 3 Authorisation 4 Chargebacks 5 Verification of Purchaser 6 Types of goods

More information

How To Stop A Cybercriminal From Stealing A Credit Card Data From A Business Network

How To Stop A Cybercriminal From Stealing A Credit Card Data From A Business Network 2012 Payment Card Threat Report The second annual study of unencrypted payment card storage Automated Attacks and Card Data Handling In 2011, data breaches increased 42% and as such, last year was reported

More information

The need for a secure & trusted payment instrument in e-commerce. Ali AlMeshal

The need for a secure & trusted payment instrument in e-commerce. Ali AlMeshal The need for a secure & trusted payment instrument in e-commerce Ali AlMeshal In Physical/Real World Hand over card Visual check Swipe in POS Online authorization Receipt with signature panel Sign or Pin

More information

Understanding and Combating Online Fraud in 2014

Understanding and Combating Online Fraud in 2014 Understanding and Combating Online Fraud in 2014 Fraud is pervasive online and high-risk merchants must be vigilant in employing a multi-layered, comprehensive approach to security and risk management.

More information

White paper. Phishing, Vishing and Smishing: Old Threats Present New Risks

White paper. Phishing, Vishing and Smishing: Old Threats Present New Risks White paper Phishing, Vishing and Smishing: Old Threats Present New Risks How much do you really know about phishing, vishing and smishing? Phishing, vishing, and smishing are not new threats. They have

More information

Fraud Mitigation and Identity Verification for Card Not Present Transactions Overview

Fraud Mitigation and Identity Verification for Card Not Present Transactions Overview Fraud Mitigation and Identity Verification for Card Not Present Transactions Overview Credit card fraud costs businesses over $11 Billion dollars annually. The percentage of revenue lost to fraud is rising;

More information

Fraud Minimisation Guide ANZ Merchant Business Solutions

Fraud Minimisation Guide ANZ Merchant Business Solutions Fraud Minimisation Guide ANZ Merchant Business Solutions INTRODUCTION Fraud can occur in and is a risk for any business that accepts credit cards and it can have a significant financial impact on your

More information

A multi-layered approach to payment card security.

A multi-layered approach to payment card security. A multi-layered approach to payment card security. CARD-NOT-PRESENT 1 A recent research study revealed that Visa cards are the most widely used payment method at Canadian websites, on the phone, or through

More information

YOUR GUIDE TO SAFER, SMARTER CREDIT CARD PAYMENTS. What you need to know about chargebacks and fraud on mail, telephone, IVR and Internet orders

YOUR GUIDE TO SAFER, SMARTER CREDIT CARD PAYMENTS. What you need to know about chargebacks and fraud on mail, telephone, IVR and Internet orders YOUR GUIDE TO SAFER, SMARTER CREDIT CARD PAYMENTS What you need to know about chargebacks and fraud on mail, telephone, IVR and Internet orders Contents HELPING YOU PROTECT YOUR BUSINESS AND YOUR PROFITS

More information

Processing credit card payments over the internet. The business of getting paid.

Processing credit card payments over the internet. The business of getting paid. Processing credit card payments over the internet. The business of getting paid. X Tap into the vast potential of the Internet today with WIPS Plus. The internet is a huge opportunity for businesses large

More information

How To Protect Your Cardholder Data From Fraud

How To Protect Your Cardholder Data From Fraud Global Visa Card-Not-Present Merchant Guide to Greater Fraud Control Protect Your Business and Your Customers with Visa s Layers of Security Millions of Visa cardholders worldwide make one or more purchases

More information

Merchant Guide to the Visa Address Verification Service

Merchant Guide to the Visa Address Verification Service Merchant Guide to the Visa Address Verification Service Merchant Guide to the Visa Address Verification Service TABLE OF CONTENTS Table of Contents Merchant Guide to the Visa Address Verification Service

More information

Phishing Scams Security Update Best Practices for General User

Phishing Scams Security Update Best Practices for General User Phishing Scams Security Update Best Practices for General User hishing refers to the malicious attack Pmethod by attackers who imitate legitimate companies in sending emails in order to entice people to

More information

The Cost of Phishing. Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015

The Cost of Phishing. Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015 The Cost of Phishing Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015 Executive Summary.... 3 The Costs... 4 How To Estimate the Cost of an Attack.... 5 Table

More information

PayLeap Guide. One Stop

PayLeap Guide. One Stop PayLeap Guide One Stop PayLeap does it all. Take payments in person? Check. Payments over the phone or by mail? Check. Payments from mobile devices? Of course. Online payments? No problem. In addition

More information

Why Data Security is Critical to Your Brand

Why Data Security is Critical to Your Brand Why Data Security is Critical to Your Brand Why security is critical to your brand Cybercriminals do not discriminate based on industry or business size. Security is expensive. At least, it is if you wait

More information

Malware & Botnets. Botnets

Malware & Botnets. Botnets - 2 - Malware & Botnets The Internet is a powerful and useful tool, but in the same way that you shouldn t drive without buckling your seat belt or ride a bike without a helmet, you shouldn t venture online

More information

PCI Compliance for Healthcare

PCI Compliance for Healthcare PCI Compliance for Healthcare Best practices for securing payment card data In just five years, criminal attacks on healthcare organizations are up by a stunning 125%. 1 Why are these data breaches happening?

More information

Drive your fraud rates down

Drive your fraud rates down Drive your fraud rates down Drive your fraud rates down To a greater or lesser extent, fraud concerns almost everyone involved in e-business. With margins tight and competition fierce, the prospect of

More information

Global Visa Card-Not-Present Merchant Guide to Greater Fraud Control. Protect Your Business and Your Customers with Visa s Layers of Security

Global Visa Card-Not-Present Merchant Guide to Greater Fraud Control. Protect Your Business and Your Customers with Visa s Layers of Security Global Visa Card-Not-Present Merchant Guide to Greater Fraud Control Protect Your Business and Your Customers with Visa s Layers of Security Millions of Visa cardholders worldwide make one or more purchases

More information

BWA Merchant Services. Credit Card Fraud Protection User Guide

BWA Merchant Services. Credit Card Fraud Protection User Guide 1 BWA Merchant Services Credit Card Fraud Protection User Guide 2 Contents: 1. How to reduce the risk of card present fraud... 3 2. How to reduce the risk of card not present fraud... 5 3. Delivering the

More information

Deception scams drive increase in financial fraud

Deception scams drive increase in financial fraud ADDRESS 2 Thomas More Square London E1W 1YN WEBSITE www.financialfraudaction.org.uk DIRECT LINE 020 3217 8436 NEWS RELEASE EMAIL press@ukcards-ffauk.org.uk Deception scams drive increase in financial fraud

More information

Security Best Practices

Security Best Practices White Paper Security Best Practices Maintaining tight security, including using both standard and advanced fraud detection and prevention tools, is crucial to maintaining a successful business. No merchant

More information

Visa Merchant Best Practice Guide for Cardholder Not Present Transactions

Visa Merchant Best Practice Guide for Cardholder Not Present Transactions Visa Merchant Best Practice Guide for Cardholder Not Present Transactions Table of Contents Section 1 About This Guide 03 Section 2 Merchant Procedures 05 Section 3 Authorisation 07 Authorisation Procedures

More information

Online Cash Manager Security Guide

Online Cash Manager Security Guide Online Cash Manager Security Guide You re the One who can protect your business from the threat of a Corporate Account Takeover. 102 South Clinton Street Iowa City, IA 52240 1-800-247-4418 Version 1.0

More information

The Online Payment Process

The Online Payment Process Bank of Valletta Insert Title of Presentation The Online Payment Process Ray Bezzina Agenda Is there the need for me to go online? What do I stand to gain if I go online? What do I stand to lose if I do

More information

Protecting your business from some of the current fraud threats

Protecting your business from some of the current fraud threats Protecting your business from some of the current fraud threats This literature provides guidance on fraud prevention and is provided for information purposes only. Where noted the guidance provided has

More information

Best Practices for Internet Merchants

Best Practices for Internet Merchants Best Practices for Internet Merchants The following best practices, taken from various experts, are offered to help you avoid being victimized by Internet fraud. Experience suggests that there are certain

More information

Card Not Present Fraud Webinar Transcript

Card Not Present Fraud Webinar Transcript Card Not Present Fraud Webinar Transcript All right let s go ahead and get things started, and to do that, I d like to turn it over to Fae Ghormley. Fae? Thank you for giving us this opportunity to share

More information

Volume PLANETAUTHORIZE PAYMENT GATEWAY. vtiger CRM Payment Module. User Guide

Volume PLANETAUTHORIZE PAYMENT GATEWAY. vtiger CRM Payment Module. User Guide Volume 2 PLANETAUTHORIZE PAYMENT GATEWAY vtiger CRM Payment Module User Guide S A L E M A N A G E R M E R C H A N T S E R V I C E S User Guide and Installation Procedures Information in this document,

More information

CYBERCRIME AND THE HEALTHCARE INDUSTRY

CYBERCRIME AND THE HEALTHCARE INDUSTRY CYBERCRIME AND THE HEALTHCARE INDUSTRY Access to data and information is fast becoming a target of scrutiny and risk. Healthcare professionals are in a tight spot. As administrative technologies like electronic

More information

Realex Payments Integration Guide - Ecommerce Remote Integration. Version: v1.1

Realex Payments Integration Guide - Ecommerce Remote Integration. Version: v1.1 Realex Payments Integration Guide - Ecommerce Remote Integration Version: v1.1 Document Information Document Name: Realex Payments Integration Guide Ecommerce Remote Integration Document Version: 1.1 Release

More information

Credit Card Acceptance & Chargeback Prevention

Credit Card Acceptance & Chargeback Prevention Credit Card Acceptance & Chargeback Prevention Tips for Travel Agents July 2010 About this Guidebook... 3 Credit Card Acceptance... 4 Fraud Prevention Tips... 7 Credit Card Chargebacks Tips...11 Payment

More information

Remote Deposit Quick Start Guide

Remote Deposit Quick Start Guide Treasury Management Fraud Prevention How to Protect Your Business Remote Deposit Quick Start Guide What s Inside We re committed to the safety of your company s financial information. We want to make you

More information

Cool Tech Club E-commerce Fraud and Fraud Mitigation. Steve Manning August 25, 2004

Cool Tech Club E-commerce Fraud and Fraud Mitigation. Steve Manning August 25, 2004 Cool Tech Club E-commerce Fraud and Fraud Mitigation Steve Manning August 25, 2004 1 Overview Fundamentals of online transactions Trends in online fraud How fraud happens Protection Against Fraud 2 How

More information

RSA Adaptive Authentication For ecommerce

RSA Adaptive Authentication For ecommerce RSA Adaptive Authentication For ecommerce Risk-based 3D Secure for Credit Card Issuers SOLUTION BRIEF RSA FRAUD & RISK INTELLIGENCE The Threat of ecommerce Fraud ecommerce fraud is a threat to both issuers

More information

Fraud Prevention What Every Merchant Should Know About Internet Fraud. PayPal Business Guide

Fraud Prevention What Every Merchant Should Know About Internet Fraud. PayPal Business Guide Fraud Prevention What Every Merchant Should Know About Internet Fraud PayPal Business Guide PayPal Business Guide Fraud Prevention 2006 PayPal, Inc. All rights reserved. PayPal, Payflow, and the PayPal

More information

WHITE PAPER. The Cost of Phishing: Understanding the True Cost Dynamics Behind Phishing Attacks

WHITE PAPER. The Cost of Phishing: Understanding the True Cost Dynamics Behind Phishing Attacks WHITE PAPER The Cost of Phishing: Understanding the True Cost Dynamics Behind Phishing Attacks A Cyveillance Report October 2008 EXECUTIVE SUMMARY How much do phishing attacks really cost organizations?

More information

Powering e-commerce Globally. What Can I Do to Minimize E-Commerce Chargebacks?

Powering e-commerce Globally. What Can I Do to Minimize E-Commerce Chargebacks? Powering e-commerce Globally What Can I Do to Minimize E-Commerce Chargebacks? Chargebacks are not going away. And now there are new rules. Selling products and services online and using credit cards for

More information

Business Identity Fraud Prevention Checklist

Business Identity Fraud Prevention Checklist Business Identity Fraud Prevention Checklist 9 Critical Things Every Business Owner Should Do Business identity thieves and fraudsters are clever and determined, and can quickly take advantage of business

More information

How To Spot & Prevent Fraudulent Credit Card Activity

How To Spot & Prevent Fraudulent Credit Card Activity Datalink Bankcard Services How To Spot & Prevent Fraudulent Credit Card Activity White Paper 2013 According to statistics from the U.S. Department of Justice and the Consumer Sentinel Network, credit card

More information

Agent Registration. Program Guide. (For use in Asia Pacific, Central Europe, Middle East, Africa)

Agent Registration. Program Guide. (For use in Asia Pacific, Central Europe, Middle East, Africa) Agent Registration Program Guide (For use in Asia Pacific, Central Europe, Middle East, Africa) Version 1 April 2014 Contents 1 INTRODUCTION... 3 1.1 ABOUT THIS GUIDE... 3 1.2 WHO NEEDS TO BE REGISTERED?...

More information

FRAUD PREVENTION IN M-COMMERCE: ARE YOU FUTURE PROOFED? A Chase Paymentech Paper

FRAUD PREVENTION IN M-COMMERCE: ARE YOU FUTURE PROOFED? A Chase Paymentech Paper FRAUD PREVENTION IN M-COMMERCE: ARE YOU FUTURE PROOFED? A Chase Paymentech Paper In the UK, Europe s largest online market, consumers continue to embrace m-commerce at an astonishing speed with an estimated

More information

NAB ecommerce Merchant Solutions. Getting Started Guide and Application Form

NAB ecommerce Merchant Solutions. Getting Started Guide and Application Form NAB ecommerce Merchant Solutions Getting Started Guide and Application Form Updated June 2012 Welcome to NAB ecommerce The following guide will help you navigate through the establishment of your NAB ecommerce

More information

CYBERSECURITY FRAUD LOSS ISSUES & HOW TO ADDRESS RISKS IN TODAY'S INSURANCE MARKETPLACE 12/16/2015. December 17, 2015

CYBERSECURITY FRAUD LOSS ISSUES & HOW TO ADDRESS RISKS IN TODAY'S INSURANCE MARKETPLACE 12/16/2015. December 17, 2015 12/16/2015 CYBERSECURITY FRAUD LOSS ISSUES & HOW TO ADDRESS RISKS IN TODAY'S INSURANCE MARKETPLACE December 17, 2015 Angela R. Morelock, CPA, CFE, CFF, ABV Partner, BKD, LLP amorelock@bkd.com Jeff Eiserman

More information

We believe First Data is well positioned to take advantage of all of these trends given the breadth of our solutions and our global operating

We believe First Data is well positioned to take advantage of all of these trends given the breadth of our solutions and our global operating Given recent payment data breaches, clients are increasingly demanding robust security and fraud solutions; and Financial institutions continue to outsource and leverage technology providers given their

More information

PayPoint.net Gateway Guide to Identifying Fraud Risks

PayPoint.net Gateway Guide to Identifying Fraud Risks PayPoint.net Gateway Guide to Identifying Fraud Risks Copyright PayPoint.net 2010 This document contains the proprietary information of PayPoint.net and may not be reproduced in any form or disclosed to

More information

How to Identify Phishing E-Mails

How to Identify Phishing E-Mails How to Identify Phishing E-Mails How to recognize fraudulent emails and avoid being phished. Presented by : Miguel Fra, Falcon IT Services (miguel@falconitservices.com) http://www.falconitservices.com

More information

Identity Theft. CHRISTOS TOPAKAS Head of Group IT Security and Control Office

Identity Theft. CHRISTOS TOPAKAS Head of Group IT Security and Control Office Identity Theft CHRISTOS TOPAKAS Head of Group IT Security and Control Office Agenda Identity Theft Threats and Techniques Identity Theft Definition and Facts Identity Theft & Financial Institutions Prevention

More information

FREQUENTLY ASKED QUESTIONS - CHARGEBACKS

FREQUENTLY ASKED QUESTIONS - CHARGEBACKS FREQUENTLY ASKED QUESTIONS - CHARGEBACKS # Questions Answer 1 What is a Chargeback? A Chargeback is the term used by Banks for debiting a merchant s bank account due to successful return of a transaction

More information

Cyber Security. An Executive Imperative for Business Owners. 77 Westport Plaza, St. Louis, MO 63416 p 314.439.4700 f 314.439.4799

Cyber Security. An Executive Imperative for Business Owners. 77 Westport Plaza, St. Louis, MO 63416 p 314.439.4700 f 314.439.4799 Cyber Security An Executive Imperative for Business Owners SSE Network Services www.ssenetwork.com 77 Westport Plaza, St. Louis, MO 63416 p 314.439.4700 f 314.439.4799 Pretecht SM by SSE predicts and remedies

More information

OXY GEN GROUP. pay. payment solutions

OXY GEN GROUP. pay. payment solutions OXY GEN GROUP pay payment solutions hello. As UK CEO, I m delighted to welcome you to Oxygen8. We ve been at the forefront of multi-channel solutions since 2000. Headquartered in Birmingham, UK, we have

More information

With the Target breach on everyone s mind, you may find these Customer Service Q & A s helpful.

With the Target breach on everyone s mind, you may find these Customer Service Q & A s helpful. With the Target breach on everyone s mind, you may find these Customer Service Q & A s helpful. Breach Overview Q: Media reports are stating that Target experienced a data breach. Can you provide more

More information

CREDIT CARD FRAUD PREVENTION IN NONPROFITS

CREDIT CARD FRAUD PREVENTION IN NONPROFITS CREDIT CARD FRAUD PREVENTION IN NONPROFITS TABLE OF CONTENTS 01 01 01 02 02 03 03 04 05 05 FRAUDULENT CREDIT CARD TRANSACTIONS AND IN WHAT WAYS CHARITIES ARE AT RISK CARD TUMBLING ONLINE AUCTION FRAUD

More information

Bad Ads Trend Alert: Shining a Light on Tech Support Advertising Scams. May 2014. TrustInAds.org. Keeping people safe from bad online ads

Bad Ads Trend Alert: Shining a Light on Tech Support Advertising Scams. May 2014. TrustInAds.org. Keeping people safe from bad online ads Bad Ads Trend Alert: Shining a Light on Tech Support Advertising Scams May 2014 TrustInAds.org Keeping people safe from bad online ads OVERVIEW Today, even the most tech savvy individuals can find themselves

More information

Kaspersky Fraud Prevention platform: a comprehensive solution for secure payment processing

Kaspersky Fraud Prevention platform: a comprehensive solution for secure payment processing Kaspersky Fraud Prevention platform: a comprehensive solution for secure Today s bank customers can perform most of their financial operations online. According to a global survey of Internet users conducted

More information

2012 NORTON CYBERCRIME REPORT

2012 NORTON CYBERCRIME REPORT 2012 NORTON CYBERCRIME REPORT 2012 NORTON CYBERCRIME REPORT 24 COUNTRIES AUSTRALIA, BRAZIL, CANADA, CHINA, COLOMBIA, DENMARK, FRANCE, GERMANY, INDIA, ITALY, JAPAN, MEXICO, NETHERLANDS, NEW ZEALAND, POLAND,

More information

EMAIL ACCOUNT TAKEOVER TO IDENTITY TAKEOVER

EMAIL ACCOUNT TAKEOVER TO IDENTITY TAKEOVER EMAIL ACCOUNT TAKEOVER TO IDENTITY TAKEOVER March 2013 Phishing attacks are notorious for their potential harm to online banking and credit card users who may fall prey to phishers looking to steal information

More information

PCI Compliance Overview

PCI Compliance Overview PCI Compliance Overview 1 PCI DSS Payment Card Industry Data Security Standard Standard that is applied to: Merchants Service Providers (Banks, Third party vendors, gateways) Systems (Hardware, software)

More information

An Oracle White Paper July 2010 U.S. CARD FRAUD

An Oracle White Paper July 2010 U.S. CARD FRAUD An Oracle White Paper July 2010 U.S. CARD FRAUD Contents Card fraud can be placed into six categories:... 3 2 Card fraud costs the U.S. card payments industry an estimated US$8.6 billion per year. Although

More information

McAfee S DO s AnD DOn ts Of Online Shopping

McAfee S DO s AnD DOn ts Of Online Shopping McAfee s Do s and don ts OF Online Shopping Table of Contents Foreword by Parry Aftab, 3 Online Safety Expert Online Shopping: The Real Deal 4 The DO s and DON Ts 5 Summary 17 Resources 18 Happy Online

More information

Don t Fall Victim to Cybercrime:

Don t Fall Victim to Cybercrime: Don t Fall Victim to Cybercrime: Best Practices to Safeguard Your Business Agenda Cybercrime Overview Corporate Account Takeover Computer Hacking, Phishing, Malware Breach Statistics Internet Security

More information

Online security. Defeating cybercriminals. Protecting online banking clients in a rapidly evolving online environment. The threat.

Online security. Defeating cybercriminals. Protecting online banking clients in a rapidly evolving online environment. The threat. Defeating cybercriminals Protecting online banking clients in a rapidly evolving online environment The threat As the pace of technological change accelerates, so does the resourcefulness and ingenuity

More information

Unified Payment Platform Payment Pos Server Fraud Detection Server Reconciliation Server Autobill Server e-point Server Mobile Payment Server

Unified Payment Platform Payment Pos Server Fraud Detection Server Reconciliation Server Autobill Server e-point Server Mobile Payment Server Unified Payment Platform Payment Pos Server Detection Server Reconciliation Server Autobill Server e-point Server Mobile Payment Server Securing Payment & Beyond Infinitium E-Payment is a Unified Payment

More information

Market Intelligence Cell. Fighting Financial Crime

Market Intelligence Cell. Fighting Financial Crime Market Intelligence Cell Fighting Financial Crime 1 Market Intelligence Cell Our objective To investigate and suppress illegal, dishonorable and improper practices, market abuse and any potential breach

More information

A Study of an On-Line Credit Card Payment Processing and Fraud Prevention for e-business

A Study of an On-Line Credit Card Payment Processing and Fraud Prevention for e-business A Study of an On-Line Credit Card Payment Processing and Fraud Prevention for e-business Nucharee Premchaiswadi*, James G. Williams** and Wichian Premchaiswadi*** *Faculty of Information Technology Dhurakij

More information

Visa Debit processing. For ecommerce and telephone order merchants

Visa Debit processing. For ecommerce and telephone order merchants Visa Debit processing For ecommerce and telephone order merchants Table of contents About this guide 3 General procedures 3 Authorization best practices 3 Status check transactions 4 Authorization reversals

More information

BE SAFE ONLINE: Lesson Plan

BE SAFE ONLINE: Lesson Plan BE SAFE ONLINE: Lesson Plan Overview Danger lurks online. Web access, social media, computers, tablets and smart phones expose users to the possibility of fraud and identity theft. Learn the steps to take

More information

Payment Methods. The cost of doing business. Michelle Powell - BASYS Processing, Inc.

Payment Methods. The cost of doing business. Michelle Powell - BASYS Processing, Inc. Payment Methods The cost of doing business Michelle Powell - BASYS Processing, Inc. You ve got to spend money, to make money Major Industry Topics Industry Process Flow PCI DSS Compliance Risks of Non-Compliance

More information

The Comprehensive, Yet Concise Guide to Credit Card Processing

The Comprehensive, Yet Concise Guide to Credit Card Processing The Comprehensive, Yet Concise Guide to Credit Card Processing Written by David Rodwell CreditCardProcessing.net Terms of Use This ebook was created to provide educational information regarding payment

More information

The State of Spam A Monthly Report August 2008. Generated by Symantec Messaging and Web Security

The State of Spam A Monthly Report August 2008. Generated by Symantec Messaging and Web Security The State of Spam A Monthly Report August 2008 Generated by Symantec Messaging and Web Security Doug Bowers Executive Editor Antispam Engineering Dermot Harnett Editor Antispam Engineering Joseph Long

More information

Phishing Past, Present and Future

Phishing Past, Present and Future White Paper Phishing Past, Present and Future By Theodore Green, President, SpamStopsHere.com Abstract A particularly dangerous and now common type of spam known as "Phishing attempts to trick recipients

More information

OVERVIEW. 1. Cyber Crime Unit organization. 2. Legal framework. 3. Identity theft modus operandi. 4. How to avoid online identity theft

OVERVIEW. 1. Cyber Crime Unit organization. 2. Legal framework. 3. Identity theft modus operandi. 4. How to avoid online identity theft OVERVIEW 2 1. Cyber Crime Unit organization 2. Legal framework 3. Identity theft modus operandi 4. How to avoid online identity theft 5. Main challenges for investigation 6. Conclusions ORGANIZATION 3

More information

Frequently Asked Questions

Frequently Asked Questions PCI Compliance Frequently Asked Questions Table of Content GENERAL INFORMATION... 2 PAYMENT CARD INDUSTRY DATA SECURITY STANDARD (PCI DSS)...2 Are all merchants and service providers required to comply

More information

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY SMALL BUSINESSES WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY ONE CLICK CAN CHANGE EVERYTHING SMALL BUSINESSES My reputation was ruined by malicious emails ONE CLICK CAN CHANGE EVERYTHING Cybercrime comes

More information

EMV's Role in reducing Payment Risks: a Multi-Layered Approach

EMV's Role in reducing Payment Risks: a Multi-Layered Approach EMV's Role in reducing Payment Risks: a Multi-Layered Approach April 24, 2013 Agenda EMV Rationale Why is this worth the effort? Guides how we implement it EMV Vulnerability at the POS EMV Impact on CNP

More information

Small businesses: What you need to know about cyber security

Small businesses: What you need to know about cyber security Small businesses: What you need to know about cyber security March 2015 Contents page What you need to know about cyber security... 3 Why you need to know about cyber security... 4 Getting the basics right...

More information

Protect yourself online

Protect yourself online Protect yourself online Advice from Nottinghamshire Police s Pre Crime Unit Get daily updates: www.nottinghamshire.police.uk www.twitter.com/nottspolice www.facebook.com/nottspolice www.youtube.com/nottinghampolice

More information

Realex Payments Resource Document. Version: v1.1

Realex Payments Resource Document. Version: v1.1 Realex Payments Resource Document Version: v1.1 Document Information Document Name: Realex Payments Resource Document Document Version: 1.0 Release Date: 30 August 2010 Legal Statement This guide, in addition

More information

Agent Registration. Program Guidelines. (For use in Asia Pacific, Central Europe, Middle East and Africa)

Agent Registration. Program Guidelines. (For use in Asia Pacific, Central Europe, Middle East and Africa) (For use in Asia Pacific, Central Europe, Middle East and Africa) January 2012 Contents 1 INTRODUCTION... 3 1.1 BACKGROUND... 3 1.2 PURPOSE OF DOCUMENT... 4 1.3 WHO NEEDS TO BE REGISTERED?... 5 1.4 WHY

More information

IS YOUR CUSTOMERS PAYMENT DATA REALLY THAT SAFE? A Chase Paymentech Paper

IS YOUR CUSTOMERS PAYMENT DATA REALLY THAT SAFE? A Chase Paymentech Paper IS YOUR CUSTOMERS PAYMENT DATA REALLY THAT SAFE? A Chase Paymentech Paper A data breach has the potential to cost retailers millions in lost customers and sales. In this paper we discuss a number of possible

More information

Credit/Debit Card Processing Requirements and Best Practices. Adele Honeyman Oregon State Treasury Training Specialist

Credit/Debit Card Processing Requirements and Best Practices. Adele Honeyman Oregon State Treasury Training Specialist Credit/Debit Card Processing Requirements and Best Practices Adele Honeyman Oregon State Treasury Training Specialist 1 What? What do I need to know about excepting credit cards? Who s involved, how it

More information

Network Security & Privacy Landscape

Network Security & Privacy Landscape Network Security & Privacy Landscape Presented By: Greg Garijanian Senior Underwriter Professional Liability 1 Agenda Network Security Overview -Latest Threats - Exposure Trends - Regulations Case Studies

More information

Protect Yourself. Who is asking? What information are they asking for? Why do they need it?

Protect Yourself. Who is asking? What information are they asking for? Why do they need it? Protect Yourself Your home computer serves many purposes: email, shopping, social networking and more. As you surf the Internet, you should be aware of the various ways to protect yourself. Of primary

More information

Security in connection with card payments. Non-face-to-face transactions (e-commerce/mail and telephone order)

Security in connection with card payments. Non-face-to-face transactions (e-commerce/mail and telephone order) Security in connection with card payments Non-face-to-face transactions (e-commerce/mail and telephone order) Most people are honest luckily Every year, millions of transactions are carried out with payment

More information

Online Payment Processing Definitions From Credit Research Foundation (http://www.crfonline.org/)

Online Payment Processing Definitions From Credit Research Foundation (http://www.crfonline.org/) Online Payment Processing Definitions From Credit Research Foundation (http://www.crfonline.org/) The following glossary represents definitions for commonly-used terms in online payment processing. Address

More information

Five Trends to Track in E-Commerce Fraud

Five Trends to Track in E-Commerce Fraud Five Trends to Track in E-Commerce Fraud Fraud is nothing new if you re in the e-commerce business you probably have a baseline level of fraud losses due to stolen credit cards, return fraud and other

More information

Card Acceptance Best Practices Playing it Safe at the Point of Sale

Card Acceptance Best Practices Playing it Safe at the Point of Sale White Paper Card Acceptance Best Practices Playing it Safe at the Point of Sale Fraudulent activity costs U.S. businesses billions. And that is just lost revenue. When you consider the associated damage

More information

Identity Theft Prevention Presented by: Matt Malone Assero Security www.asserosecurity.com

Identity Theft Prevention Presented by: Matt Malone Assero Security www.asserosecurity.com Bringing enterprise level security to your business Identity Theft Prevention Presented by: Matt Malone Assero Security www.asserosecurity.com Matt Malone Fall 2015 Spring 2016 IDENTITY THEFT Identity

More information

Protecting your business from fraud

Protecting your business from fraud Protecting your business from fraud KEY TAKEAWAYS > Understand the most common types of fraud and how to identify them. > What to do if you uncover fraudulent activity or suspect you are a victim of fraud.

More information

ACQUIRER OR ACQUIRING BANK A financial institution (often a bank) where a merchant has an account to process transactions and card payments

ACQUIRER OR ACQUIRING BANK A financial institution (often a bank) where a merchant has an account to process transactions and card payments A TO Z JARGON BUSTER A ACQUIRER OR ACQUIRING BANK A financial institution (often a bank) where a merchant has an account to process transactions and card payments ATM Automated Teller Machine. Unattended,

More information

How To Help Protect Yourself From Identity Theft

How To Help Protect Yourself From Identity Theft How To Help Protect Yourself From Identity Theft January 20, 2015 Bryan Strong Senior Vice President and Director Information Security This complimentary interactive webinar is sponsored by Zions Bank

More information