ThreatMetrix Cybercrime Report: Q1 2015
|
|
|
- Aron Cox
- 10 years ago
- Views:
Transcription
1 Threatetrix Cybercrime Report: Q The Theatetrix Cybercrime Report examines actual cybercrime attacks detected and analyzed by the Threatetrix Digital Identity Network during Q and Q
2 Foreword I spend a lot of time talking to our customers. Standing alone they were drowning under wave after wave of bot attacks, data breaches and fraud losses, but combined they have been able to turn the tide on their attackers. Our Cybercrime Reports are intended to help educate and provide valuable insight into cyber threat and fraud trends that otherwise lurk beneath the surface and hide among, and hurt, your legitimate customers. With the world s largest digital identity network, built on the shared intelligence from over a billion transactions per month from some of the world s largest businesses, Threatetrix is in a unique position to monitor and analyze the key trends that are shaping the new age of connected commerce. During the 2014 holiday season, we saw record transaction volume across mobile and Web. These transactions further showcased that online/mobile commerce is the biggest emerging opportunity and risk for businesses trying to deliver frictionless experiences to their trusted customers without falling victim to the cybercriminals. Consumers are increasingly getting comfortable with using their connected devices to access content, conduct commercial activities and make purchases. As expected, online retailers reported strong volumes but consumer activity was significant across all industries as they streamed more content, bought more tickets and checked their account balances more often, more than 25% of the time using their mobile devices. This battle between the good guys and the cybercriminals will continue to intensify with consumer personally identifiable information data in the wild. At Threatetrix, we strongly believe that it takes a network to fight the sophisticated network of cybercriminals. Shared intelligence is the key to protect against the digital debris that comes from data breach fallouts. Alisdair Faulkner Chief Products Officer Threatetrix 2 THREATETRIX CYBERCRIE REPORT: Q1 2015
3 Report Overview The Q1 Threatetrix Cybercrime Report is based on actual cybercrime attacks from the October 2014 arch 2015 that were detected by the Threatetrix Digital Identity Network (The Network) during real-time analysis and interdiction of fraudulent online payments, logins and new account registrations. The Network analyzes more than one billion transactions per month, nearly a third from mobile devices, These transactions are analyzed for legitimacy based on hundreds of attributes, including device identification, geolocation, previous history and behavioral analytics. The Network and its real-time policy engine provide unique insight into legitimate end customers digital identities, even as they move between applications, devices, and networks. Threatetrix users benefit from a global view of risks, based on these attributes and rules specifically custom-tuned for their business. Attacks discussed are from high risk transactions scored by Threatetrix. 3 THREATETRIX CYBERCRIE REPORT: Q1 2015
4 Q Cybercrime Report Key Highlights 2014 holiday season was a period of record online transactions: Cyber onday online sales exceeded $2B for the first time with a significant portion coming from mobile devices. Through its analysis of the top customer transactions across industries, Threatmetrix highlights the following representative key market trends: Trust is critical for conversion and customer loyalty. 74% of holiday transactions originated from existing accounts as consumers returned to their favorite merchants. Impersonation or spoofing attacks continue to rise driven by the billions of breached identities in the wild and the prevalence of crimeware tools. Threatetrix identified more than 11.4 million fraud attempts during peak holiday shopping periods. obile usage continues to grow, accounting for up to 31% of transactions. With more than 20 million new mobile devices being added to The Network every month, this trend is expected to continue. ore Android devices were identified this period compared to before. We expect this trend to continue as emerging markets increasingly do business via more affordable Android devices. Despite more Android devices being added, ios devices accounted for two-thirds of mobile transactions. 4 THREATETRIX CYBERCRIE REPORT: Q1 2015
5 Attack Origins by Geography: Total number of attacks detected by geography of origin Cybercrime is a global phenomenon with fraudsters targeting businesses across countries. Despite the global nature of cybercrime, the majority of attacks originate in the countries with high online and mobile volume. Top 5 Top 6-10 Top Top Top THREATETRIX CYBERCRIE REPORT: Q1 2015
6 Top attack origins by Geographies The majority of attacks originated from and targeted the same country. Top 5 attack originations and target countries were: Canada United States France United Kingdom Germany 6 THREATETRIX CYBERCRIE REPORT: Q1 2015
7 Transaction Analyzed by Industries Threatetrix transactions span e-commerce, financial services, and media sectors. While login and new account creations are the primary use cases for Financial Services and edia, payment transactions are the dominant use case for the e-commerce sector. Payment transactions and login transactions grew significantly during this period as consumers revisited retailers to view offerings/deals and make their holiday purchases. Threatetrix is deployed on 10 of the top 20 e-commerce merchants in the U.S. While new account creation rates were lower than other transaction types, their share of fraudulent transactions rose, driven by the stolen identities made available to the cybercriminals following massive breaches. Volume by Transaction Types 2% Attacks by Transaction Type 3.2% Payments 18% 2.3% 80% Account login Account creation 4.0% Attack Percentages are based on transactions identified as high risk and classified as attacks, by use case. Events identified as attacks are typically blocked or rejected automatically in real time dependent on individual customer use cases. 7 THREATETRIX CYBERCRIE REPORT: Q1 2015
8 E-Commerce Transactions and Attacks During the peak holiday shopping season, customers overwhelmingly went to the sites they trust to either shop for goods or browse for deals. Consumers typically store their payment information on file with 3-4 of their favorite/trusted merchants and have to log-in to their accounts to make purchase/save items for future purchase. As a result, account logins were a much larger portion of total transactions, during this period with customers revisiting their shopping carts to complete purchases. A significant portion of multi-device consumers move sequentially between several screens for everyday activities like booking a hotel or shopping for electronics. The Network is able to track and provide intelligence across these devices to identify trusted consumers. New account creations were significantly lower but represented the highest percentage of attacks as fraudsters increasingly used account creation as a means to make purchases using stolen credentials. Transactions by Type Attacks by Transaction Type 1% 19% 2.6% Payments 2.0% Account login Account creation 6.7% 81% E-Commerce includes retail, airlines, gambling, gaming, travel, marketplaces, ticketing and digital goods businesses. 8 THREATETRIX CYBERCRIE REPORT: Q1 2015
9 Financial Services Transactions and Attacks While online banking authentication transactions continue to dominate the financial services industry, the payment transactions increased during this period, driven by the increasing consumer adoption, use of alternate payment instruments and banking card authentication solutions, and increase in online gifting during the holiday season. In Financial Services transactions, the impact of consumer credentials made available by data breaches, was evidenced by a substantial increase in fraud rates across all transaction types. The prevalence of crimeware tools was also evidenced by the increase in the payment and login frauds over the previous period. Transactions by Type 1% 23% Attacks by Transaction Type 3.2% Payments 2.6% Account login 76% Account creation 2.0% Financial Services includes mobile banking, online banking, online money transfer, lending, brokerage and credit card issuance. 9 THREATETRIX CYBERCRIE REPORT: Q1 2015
10 edia Transactions and Attacks Threatetrix s analysis demonstrates a strong growth in payment transactions through media organization and a higher than average fraud levels compared to other industries. The large number of data breaches reported by US companies has led to hundreds of millions user credentials increasingly being used on media sites for criminal intent. odest sign-up and authentication requirements along with user password sharing across sites continue to attract the highest rate of cybercrime attacks per transaction. The Network saw a strong growth in payment transactions through edia organizations and higher than average fraud levels when compared to other industries. Illegal access to content outside of approved geographies, combined with spamming, and fraudulent bot-driven account creation, represent the key drivers of fraudulent transactions in the edia space. Transactions by Type Attacks by Transaction Type Payments 4.0% 22% 26% 6.2% 52% Account login Account creation 3.8% edia includes social networks, content streaming and online dating sites. 10 THREATETRIX CYBERCRIE REPORT: Q
11 Top Attack Vectors Impersonation or spoofing attacks continue to rise driven by the availability of more sophisticated device spoofing tools combined with hacked and breached identities. These crimeware tools target businesses that are using first generation browser fingerprinting technology. Threatetrix platform is built from the ground up to evaluate the normality and anomalies of the browser characteristics that these tools will exploit. This is done by fingerprinting the device at multiple layers to reveal inconsistencies, and detect spoofing. Threatetrix identified more than 11.4 million fraud attempts during peak holiday shopping (Nov Dec 2014). 10 Geo Spoofing 5.3% 5.6% 7.4% 7.6% 8.1% 4.1% 5.1% 6.3% 5.8% 5.9% IP Spoofing 4.9% 6.1% 7.3% 6.9% 7.2% Indentity Spoofing 4.9% 6.6% 8.3% 8.0% 8.5% itb or Bot 0.7% 0.8% 1.9% 1.5% 2.1% DE NO VE BE CE R 2 01 B JA ER 4 NU 20 AR 14 FE BR Y 20 UA 1 RY 5 AR 201 CH NO VE DE BE CE R 2 01 B JA ER 4 NU 20 AR 14 FE BR Y 20 UA 15 R Y2 AR 01 CH NO VE DE BE CE R 2 01 B JA ER 4 NU 20 AR 14 FE BR Y 20 UA 15 R Y2 AR 01 CH NO VE DE BE CE R 2 01 B JA ER 4 NU 20 AR 14 FE BR Y 20 UA 1 RY 5 AR 201 CH NO VE DE BE CE R 2 01 B JA ER 4 NU 20 AR 14 FE BR Y 20 UA 1 RY 5 AR 201 CH Device Spoofing 11 THREATETRIX CYBERCRIE REPORT: Q1 2015
12 Top Attack ethods Attack vectors are analyzed in real time by the Network s global policies. Some attacks use multiple vectors, but device spoofing remains the top attack vector, with more than six percent of transactions. As crimeware tools gain traction, increasing cloaked traffic is evidenced in Threatetrix s network analysis, specifically for new account creation wherein the fraudsters use stolen identities along with these tools to defraud businesses. Attack Vector by Event Type Attack by Vector Payments Account logins Account creations 3.4% 2.0% 0.8% itb or Bot 2.5% IP Spoofing 2.3% 4.0% 1.6% 6.5% Geo Spoofing 3.3% 5.3% 2.7% 5.8% Identity Spoofing 4.3% 4.5% 4.7% 7.5% Device Spoofing 6.1% 4.8% 6.5% 6.1% The bar charts represent percentage of total transactions that were recognized at attacks 12 THREATETRIX CYBERCRIE REPORT: Q
13 obile Transaction Prevalences Emerging markets are showing a rapid uptake of mobile phone ownership and usage of mobile services. While mobile is a vehicle to drive financial inclusion for unbanked consumers, mobile transactions will be active targets for fraudsters. The network analyzes mobile transactions from over 200 countries and territories across the globe. Consumers from emerging economies conduct a much higher percentage of transactions using mobile devices. Customers in the U.S, Canada and Western Europe use both channels equally, while countries in the iddle East, Africa and Southeast Asia, among others, have a much higher share of mobile transactions. Below average Average Above average Far above average 13 THREATETRIX CYBERCRIE REPORT: Q1 2015
14 obile vs. Desktop Transactions and Attacks obile device-based commerce represented nearly one third of the total analyzed. This number continues to grow across industries and transaction types. obile usage represented the largest usage percentage for media channel as users increasingly accessed content/services on the go. obile attacks continue to grow, driven by the prevalence of stolen identities and tools to enable cloaking/spoofing, but remain below the desktop volumes, as mobile devices are not yet conducive to massive fraud attacks. New account creation using mobile devices is increasing but has lower instances of attack compared to desktop. obile Desktop obile vs Desktop Transactions by Industry % 56% Payments 80 79% Account logins 31% 2.0% 3.4% 80% 20% 1.6% 4.0% 31% 2.1% 4.8% 44% Account Creation % 78% Attack Vector by Event Type obile vs Desktop Transactions by Type 21% THREATETRIX CYBERCRIE REPORT: Q %
15 obile Transactions and Attacks As mobile transactions are growing, so are the attacks targeted towards mobile devices and platforms. Spoofing or cybercriminals imperfectly impersonating a given mobile device (shown as Other ) constitute the most common source of these mobile attacks. Threatetrix s layered approach effectively detected and stopped these fraudulent transactions from devices masking their operating system (OS). ios devices (iphone and ipad) combined accounted for nearly two-thirds of total holiday transactions. Android showed strong growth driven by customer deployment, launch of Threatetrix mobile SDK for Android and high Android growth rates especially in emerging market. Despite Android s dominance in market and browser share, ios generates nearly twice the number of payments, logins, and authentications of the other mobile operating systems combined. ios transactions data highlights that convenience still trumps form factor, with ipad usage being larger than iphone even though iphone ownership is far more common. Volume per obile OS / Device Attack per obile OS / Device 1.3% 14.3% Other 3.5% 32% 47% 1.9% 1.7% 2% iphone ipad obile data includes transactions from both mobile browsers and mobile apps protected by Threatetrix TrustDefenderT obile. Windows 18% 3.0% 0 15 THREATETRIX CYBERCRIE REPORT: Q Android
16 % Identity Spoofing obile Transaction and Attack Trends % Device Spoofing The growth of mobile and the prevalence of stolen identities in the wild is causing an uplift in mobile attacks. % IP Spoofing % Geo Spoofing Fraudsters increasingly impersonate other devices to facilitate their attacks, and the Network sees through these attempts. % itb or Bot NOV 5 NOV 15 NOV 25 DEC THREATETRIX CYBERCRIE REPORT: Q DEC 15 DEC 25 JAN 4 JAN 14 FEB FEB 13 FEB 23
17 obile Transaction Trends The usage of obile continues to grow as more and more customers switch to mobile to access content, conduct commerce transactions and buy product and services. obile usage over the weekend is higher across industries as users increasingly rely on their connected devices. Using mobile devices to sign up for services continues to be a leading use case. This makes it critical for businesses to eliminate friction for trusted users while stopping fraudsters. Weekdays Weekends Login Payments Account creation % obile TXNS weekends v weekdays 54% edia 59% 18% 20% Finance 21% Ecommerce 40 % Transactions from obile devices per Transaction Type 24% AUG 3 AUG 17 AUG 31 SEP 14 SEP 28 OCT 12 OCT 26 NOV 9 17 THREATETRIX CYBERCRIE REPORT: Q NOV 23 DEC 7 DEC 21 JAN 4 JAN 18 FEB 1 FEB 15 AR 1
18 Conclusion It is evident that the payment and commerce landscape is rapidly evolving due to the digitization of consumers and merchants, proliferation of connected devices, rise in alternative payments and growth of social media. Online and mobile commerce growth continues to outpace offline (brick and mortar) as connected devices are fast becoming the leading way for users to access commerce and banking services. obile is the biggest emerging opportunity and risk for businesses and financial institutions trying to deliver frictionless experiences to their customers. As the businesses have evolved, so have Cybercriminals. This analysis confirms that Cybercrime continues to be a well-funded, organized business with sophisticated technology and strong knowledge sharing across organized crime rings, nation states and decentralized cyber gangs. Recent massive credit card and identity data breaches along with the growing sophistication of cybercriminals has resulted in an increase in attacks targeted toward businesses across all regions and industries. Cybercriminals continue to share information as well as develop tools that will help bypass the first generation fraud prevention solutions that rely on browser fingerprinting. This makes shared global intelligence a critical tool to fight crime. Threatetrix protects its customers and speeds the flow of business by quickly distinguishing trusted customers from cybercriminals. Threatetrix delivers advanced fraud protection, frictionless authentication, and customer protection through a real-time collective response using intelligence gathered from billions of transactions in the Threatetrix Network. 18 THREATETRIX CYBERCRIE REPORT: Q1 2015
19 Glossary: Industry Types Financial Services includes mobile banking, online banking, online money transfer, lending, brokerage and credit card issuance. E-Commerce includes retail, airlines, gambling, gaming, travel, marketplaces, ticketing and digital goods businesses. edia includes social networks, content streaming and online dating sites. Glossary: Common Attacks Account Creation Fraud: Using stolen, compromised or synthetic identities, typically through a spoofed location, to create a new account to access online services or obtain lines of credit. Account Login Fraud: Attacks targeted at taking over user accounts using previously stolen credentials available in the wild or credentials compromised by malware or man-in-the-middle attacks. Payments Fraud: Using stolen payment credentials to conduct Illegal money transfers or online payments via alternative online payment methods such as direct deposit. Glossary: Percentages Transaction Type Percentages are based on the number of event types (account creation, account login and payments) from mobile devices and computers received and processed by the Threatetrix Global Threat Intelligence Network. Attack Percentages are based on event types identified as high risk and classified as attacks, by use case. Events identified as attacks are typically blocked or rejected automatically, in real time dependent on individual customer use cases. 19 THREATETRIX CYBERCRIE REPORT: Q1 2015
20 Glossary: Attack Explanations Device Spoofing: Hackers delete and change browser settings in order to change their device identity or fingerprint, or attempt to appear to come from a victim s device. Threatetrix-patented cookieless device identification is able to detect returning visitors even when cookies are deleted or changes are made to browser settings. To differentiate between cybercriminals and legitimate customers who occasionally clear cookies, only high risk / high velocity cookie deletions (such as a high number of repeat visits per hour / day) are included in the analysis. Identity Spoofing: Using a stolen identity, credit card or compromised username / password combination to attempt fraud or account takeover. Typically, identity spoofing is detected based on high velocity of identity usage for a given device, detecting the same device accessing multiple unrelated user accounts or unusual identity linkages and usage. Geographic Spoofing: Hackers hide their true locations online through use of proxies, VPNs, or by spoofing browser language or time zone settings. To eliminate false positives, geo-spoofing as defined in this analysis is when the attackers to appear to be from a different country. Threatetrix examines a multitude of signals to determine if the computer originating a transaction or login attempt is in a different geography than where it is pretending to be, such as time zone irregularities, but one of the most effective is the use of Threatetrix-patented proxy piercing techniques. IP Address Spoofing: Cybercriminals use proxies to bypass traditional IP geolocation filters, and use IP spoofing techniques to evade velocity filters and blacklists. Threatetrix directly detects IP spoofing via both active and passive browser and network packet fingerprinting techniques. an-in-the-browser (itb) and Bot Detection: an-in-the-browser attacks use sophisticated Trojans to steal login information and one-time-passwords (such as SS out-of-band authentication messages) from a user s browser. Bots are automated scripts that attempt to gain access to accounts with stolen credentials or create fake accounts and transactions. Crimeware: Crimeware refers to malware specifically designed to automate cybercrime. These tools help fraudsters create, customize and distribute malware to perpetrate identity theft through social engineering or technical stealth. 20 THREATETRIX CYBERCRIE REPORT: Q1 2015
21 For ore Information: For more information on how Threatetrix can prevent fraud and reduce transaction friction, visit our website at or contact CONTACT US 2015 Threatetrix. All rights reserved. Threatetrix, TrustDefender ID, TrustDefender Cloud, TrustDefender obile, TrustDefender Client, the TrustDefender Cybercrime Protection Platform, Threatetrix Labs, and the Threatetrix logo are trademarks or registered trademarks of Threatetrix in the United States and other countries. All other brand, service or product names are trademarks or registered trademarks of their respective companies or owners.
Top 10 Anti-fraud Tips: The Cybersecurity Breach Aftermath
ebook Top 10 Anti-fraud Tips: The Cybersecurity Breach Aftermath Protecting against downstream fraud attacks in the wake of large-scale security breaches. Digital companies can no longer trust static login
Five Trends to Track in E-Commerce Fraud
Five Trends to Track in E-Commerce Fraud Fraud is nothing new if you re in the e-commerce business you probably have a baseline level of fraud losses due to stolen credit cards, return fraud and other
WHITEPAPER. Fraud Protection for Native Mobile Applications Benefits for Business Owners and End Users
Fraud Protection for Native Mobile Applications Benefits for Business Owners and End Users Table of Contents How TrustDefender Mobile Works 4 Unique Capabilities and Technologies 5 Host Application Integrity
ACI Response to FFIEC Guidance
ACI Response to FFIEC Guidance Version 1 July 2011 Table of contents Introduction 3 FFIEC Supervisory Expectations 4 ACI Online Banking Fraud Management 8 Online Banking Fraud Detection and Prevention
TrustDefender Mobile Technical Brief
TrustDefender Mobile Technical Brief Fraud Protection for Native Mobile Applications TrustDefender Mobile from ThreatMetrix is a lightweight SDK library for Google Android and Apple ios mobile devices.
WHITEPAPER. Real Time Trust Analytics Next Generation Cybercrime Protection
Real Time Trust Analytics Next Generation Cybercrime Protection Table of Contents Assessing Trust in a Zero-Trust World 3 Identity: the new perimeter of defense 3 Bigger Data or Better Intelligence? 3
How To Protect Your Online Banking From Fraud
DETECT MONITORING SERVICES AND DETECT SAFE BROWSING: Empowering Tools to Prevent Account Takeovers SUMMARY The Federal Financial Institutions Examination Council (FFIEC) is planning to update online transaction
Device Fingerprinting and Fraud Protection Whitepaper
Device Fingerprinting and Fraud Protection Whitepaper 1 of 6 Table Of Contents 1 Overview... 3 2 What is Device Fingerprinting?... 3 3 Why is Device fingerprinting necessary?... 3 4 How can Device Fingerprinting
Combating Cybercrime A Collective Global Response
Combating Cybercrime A Collective Global Response ThreatMetrix Global Trust Intelligence Network Contents Executive Summary 3 Cybercrime Onslaught Enemy at the Gates 4 Evil Nexus of Data Breaches and Fraud
Protect Your Business and Customers from Online Fraud
DATASHEET Protect Your Business and Customers from Online Fraud What s Inside 2 WebSafe 5 F5 Global Services 5 More Information Online services allow your company to have a global presence and to conveniently
EMAIL ACCOUNT TAKEOVER TO IDENTITY TAKEOVER
EMAIL ACCOUNT TAKEOVER TO IDENTITY TAKEOVER March 2013 Phishing attacks are notorious for their potential harm to online banking and credit card users who may fall prey to phishers looking to steal information
CUSTOMERS & CRIMINALS: USE WEB SESSION INTELLIGENCE TO DETECT WHO IS WHO ONLINE
CUSTOMERS & CRIMINALS: USE WEB SESSION INTELLIGENCE TO DETECT WHO IS WHO ONLINE Jason Sloderbeck Silver Tail Systems, Part of RSA Session ID: SPO1-W22 Session Classification: General Track Question Do
WHITE PAPER Moving Beyond the FFIEC Guidelines
WHITE PAPER Moving Beyond the FFIEC Guidelines How Device Reputation Offers Protection Against Future Security Threats Table of Contents Introduction 1 The FFIEC Guidelines 2 Why Move Beyond Complex Device
WHITE PAPER. Internet Gambling Sites. Expose Fraud Rings and Stop Repeat Offenders with Device Reputation
WHITE PAPER Internet Gambling Sites Expose Fraud Rings and Stop Repeat Offenders with Device Reputation Table of Contents Confident Casinos: How to stop fraud before it starts 1 Organized Fraud: A Growing
PHISHING IN SEASON TAX TIME MALWARE, PHISHING AND FRAUD
PHISHING IN SEASON TAX TIME MALWARE, PHISHING AND FRAUD April 2013 As cybercriminals will have it, phishing attacks are quite the seasonal trend. It seems that every April, after showing a slight decline
WHITE PAPER Fighting Mobile Fraud
WHITE PAPER Fighting Mobile Fraud Protecting Businesses and Consumers from Cybercrime Table of Contents Executive Summary 1 Introduction 2 The Challenge 3 Keeping Pace with Mobile Innovation 4 Business
A CHASE PAYMENTECH WHITE PAPER. Expanding internationally: Strategies to combat online fraud
A CHASE PAYMENTECH WHITE PAPER Expanding internationally: Strategies to combat online fraud Fraud impacts nearly eight in every ten international online retailers 1. It hampers prospects for growth, restricts
THE 2014 THREAT DETECTION CHECKLIST. Six ways to tell a criminal from a customer.
THE 2014 THREAT DETECTION CHECKLIST Six ways to tell a criminal from a customer. Telling criminals from customers online isn t getting any easier. Attackers target the entire online user lifecycle from
Statement of. Mark Nelsen. Senior Vice President, Risk Products and Business Intelligence. Visa Inc. House Ways & Means Subcommittee.
Statement of Mark Nelsen Senior Vice President, Risk Products and Business Intelligence Visa Inc. House Ways & Means Subcommittee on Oversight Hearing on The Use of Data to Stop Medicare Fraud March 24,
WHITE PAPER Fighting Banking Fraud Without Driving Away Customers
WHITE PAPER Fighting Banking Fraud Without Driving Away Customers Effective Methods for Targeting Cybercrime in Financial Services Table of Contents Introduction 1 Stopping Fraud: One Goal Among Many 2
Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation. By Marc Ostryniec, vice president, CSID
Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation By Marc Ostryniec, vice president, CSID The increase in volume, severity, publicity and fallout of recent data breaches
WHITEPAPER. OFAC Compliance. Best Practices in Knowing Where and With Whom You Are Conducting Business
OFAC Compliance Best Practices in Knowing Where and With Whom You Are Conducting Business Table of Contents OFAC Sanctioned Countries, Entities, and Individuals 3 OFAC Requirements 4 Blocked Transactions
ThreatMetrix Persona DB Technical Brief
ThreatMetrix Persona DB Technical Brief Private and Scalable Entity/Attribute Database Persona DB is part of the TrustDefender Cybercrime Prevention Platform from ThreatMetrix. It s an extensible, enterprise-accessible
RSA Adaptive Authentication For ecommerce
RSA Adaptive Authentication For ecommerce Risk-based 3D Secure for Credit Card Issuers SOLUTION BRIEF RSA FRAUD & RISK INTELLIGENCE The Threat of ecommerce Fraud ecommerce fraud is a threat to both issuers
Kaspersky Fraud Prevention platform: a comprehensive solution for secure payment processing
Kaspersky Fraud Prevention platform: a comprehensive solution for secure Today s bank customers can perform most of their financial operations online. According to a global survey of Internet users conducted
10 Things Every Web Application Firewall Should Provide Share this ebook
The Future of Web Security 10 Things Every Web Application Firewall Should Provide Contents THE FUTURE OF WEB SECURITY EBOOK SECTION 1: The Future of Web Security SECTION 2: Why Traditional Network Security
Learn How to Defend Your Online Marketplace from Unwanted Traffic
Learn How to Defend Your Online Marketplace from Unwanted Traffic Speakers Rami Essaid CEO & Co-founder Distil in Classifieds The Basics of Bots A Bot is an automated program that runs on the internet
Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking
Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking Today s bank customers can perform most of their financial activities online. According to a global survey
Best Practices in Account Takeover
WHITEPAPER Best Practices in Account Takeover July 2013 2 Table of Contents Introduction 3 Account Takeover is Painful 4 Differences between Account Takeover and Account Compromise 4 Why Account Compromise
Smart Device Identification for Cloud-Based Fraud Prevention. Alisdair Faulkner Chief Products Officer
Smart Device Identification for Cloud-Based Fraud Prevention Alisdair Faulkner Chief Products Officer Contents Basic Device Identification is no longer enough... 3 Times have changed but your Device ID
Why Device Fingerprinting Provides Better Network Security than IP Blocking. How to transform the economics of hacking in your favor
Why Device Fingerprinting Provides Better Network Security than IP Blocking How to transform the economics of hacking in your favor Why Device Fingerprinting Provides Better Network Security than IP Blocking
A strategic approach to fraud
A strategic approach to fraud A continuous cycle of fraud risk management The risk of fraud is rising at an unprecedented rate. Today s tough economic climate is driving a surge in first party fraud for
Emerging Trends in the Payment Ecosystem: The Good, the Bad and the Ugly DAN KRAMER
Emerging Trends in the Payment Ecosystem: The Good, the Bad and the Ugly DAN KRAMER SHAZAM, Senior Vice President Agenda The Ugly Fraud The Bad EMV? The Good Tokenization and Other Emerging Payment Options
CITADEL TROJAN OUTGROWING ITS ZEUS ORIGINS
CITADEL TROJAN OUTGROWING ITS ZEUS ORIGINS May 2012 As of April 30th, 2012 the Citadel Trojan was at its fourth upgrade with Version 1.3.4.0 already in the hands of its customers. Citadel s features, bug
BioCatch Fraud Detection CHECKLIST. 6 Use Cases Solved with Behavioral Biometrics Technology
BioCatch Fraud Detection CHECKLIST 6 Use Cases Solved with Behavioral Biometrics Technology 1 2 MAN-IN-THE- BROWSER MALWARE ATTACK DETECTION (E.G. DYRE, NEVERQUEST) REMOTE ACCESS (RAT) DETECTION Challenge:
State of Mobile Commerce Growing like a weed
State of Mobile Commerce Growing like a weed Q1 2015 Executive Summary Mobile commerce is growing like a weed. Mobile is 29% of ecommerce transactions in the US and 34% globally. By the end of 2015, mobile
BUGAT TROJAN JOINS THE MOBILE REVOLUTION
BUGAT TROJAN JOINS THE MOBILE REVOLUTION June 2013 RSA researchers analyzing Bugat Trojan attacks have recently learned that Bugat s developers managed to develop and deploy mobile malware designed to
Evaluating DMARC Effectiveness for the Financial Services Industry
Evaluating DMARC Effectiveness for the Financial Services Industry by Robert Holmes General Manager, Email Fraud Protection Return Path Executive Summary Email spoofing steadily increases annually. DMARC
Copyright 2015 Criteo. State of Mobile Commerce Apps and cross-device lead mobile business Q2 2015
State of Mobile Commerce Apps and cross-device lead mobile business Q2 2015 Mobile Commerce Report Methodology Individual transaction data analyzed How can marketers use this data? Over 3,000 online retail
Fraud Threat Intelligence
About ERM About The Speaker Safe Browsing, Monitoring Services Product Manager, Easy Solutions Inc. 8+ years anti-fraud, fraud risk, and security intelligence programs Previously licensed Securities Principle
Supplement to Authentication in an Internet Banking Environment
Federal Financial Institutions Examination Council 3501 Fairfax Drive Room B7081a Arlington, VA 22226-3550 (703) 516-5588 FAX (703) 562-6446 http://www.ffiec.gov Purpose Supplement to Authentication in
Threats and Attacks. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1
Threats and Attacks Modifications by Prof. Dong Xuan and Adam C. Champion Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to:
Understanding and Combating Online Fraud in 2014
Understanding and Combating Online Fraud in 2014 Fraud is pervasive online and high-risk merchants must be vigilant in employing a multi-layered, comprehensive approach to security and risk management.
FICO Enterprise Fraud and Security Management. > Protection with a holistic view.
FICO Enterprise Fraud and Security Management > Protection with a holistic view. > Fraud is everywhere. It s pervasive, invasive and harms customers, merchants and institutions alike. How can you keep
The Hidden Dangers of Public WiFi
WHITEPAPER: OCTOBER 2014 The Hidden Dangers of Public WiFi 2 EXECUTIVE SUMMARY 4 MARKET DYNAMICS 4 The Promise of Public WiFi 5 The Problem with Public WiFi 6 MARKET BEHAVIOR 6 Most People Do Not Protect
Phishing Activity Trends Report for the Month of December, 2007
Phishing Activity Trends Report for the Month of December, 2007 Summarization of December Report Findings The total number of unique phishing reports submitted to APWG in December 2007 was 25,683, a decrease
State of Mobile Commerce. Q1 2015
State of Mobile Commerce. Q1 2015 MARCH 2015 Executive Summary Mobile commerce is growing like a weed. Mobile is now 29% of ecommerce transactions in the US and 34% globally. Mobile shopping trends ecommerce
Fighting Future Fraud A Strategy for Using Big Data, Machine Learning, and Data Lakes to Fight Mobile Communications Fraud
Fighting Future Fraud A Strategy for Using Big Data, Machine Learning, and Data Lakes to Fight Mobile Communications Fraud Authored by: Dr. Ian Howells Dr. Volkmar Scharf-Katz Padraig Stapleton 1 TABLE
White paper. Phishing, Vishing and Smishing: Old Threats Present New Risks
White paper Phishing, Vishing and Smishing: Old Threats Present New Risks How much do you really know about phishing, vishing and smishing? Phishing, vishing, and smishing are not new threats. They have
Mobile Application Security. Helping Organizations Develop a Secure and Effective Mobile Application Security Program
Mobile Application Security Helping Organizations Develop a Secure and Effective Mobile Application Security Program by James Fox [email protected] Shahzad Zafar [email protected] Mobile applications
FRAUD PREVENTION IN M-COMMERCE: ARE YOU FUTURE PROOFED? A Chase Paymentech Paper
FRAUD PREVENTION IN M-COMMERCE: ARE YOU FUTURE PROOFED? A Chase Paymentech Paper In the UK, Europe s largest online market, consumers continue to embrace m-commerce at an astonishing speed with an estimated
ADAPTIVE AUTHENTICATION ADAPTER FOR JUNIPER SSL VPNS. Adaptive Authentication in Juniper SSL VPN Environments. Solution Brief
ADAPTIVE AUTHENTICATION ADAPTER FOR JUNIPER SSL VPNS Adaptive Authentication in Juniper SSL VPN Environments Solution Brief RSA Adaptive Authentication is a comprehensive authentication platform providing
How To Deal With A Converged Threat From A Cloud And Mobile Device To A Business Or A Customer'S Computer Or Network To A Cloud Device
Ten Tips for Managing Risks on Convergent Networks The Risk Management Group April 2012 Sponsored by: Lavastorm Analytics is a global business performance analytics company that enables companies to analyze,
Identity Theft. CHRISTOS TOPAKAS Head of Group IT Security and Control Office
Identity Theft CHRISTOS TOPAKAS Head of Group IT Security and Control Office Agenda Identity Theft Threats and Techniques Identity Theft Definition and Facts Identity Theft & Financial Institutions Prevention
Fighting Cyber Crime in the Telecommunications Industry. Sachi Chakrabarty
Fighting Cyber Crime in the Telecommunications Industry Sachi Chakrabarty Agenda Cyber Crime What s all the fuss about CyberCrime? DoS Attacks Telco Solutions Cybercrime? Cybercrime Definition All criminal
Anthony Minnaar Dept of Criminology & Security Science School of Criminal Justice College of Law University of South Africa
SECURING THE DIGITAL DIVIDE: COMBATING CYBERCRIME Anthony Minnaar Dept of Criminology & Security Science School of Criminal Justice College of Law University of South Africa INTRODUCTION q Given modern
Gladiator NetTeller Enterprise Security Monitoring Online Fraud Detection INFORMATION SECURITY & RISK MANAGEMENT
Gladiator NetTeller Enterprise Security Monitoring Online Fraud Detection INFORMATION SECURITY & RISK MANAGEMENT Gladiator NetTeller Enterprise Security Monitoring Online Fraud Detection Foreword The consumerization
DETECTING SOPHISTICATED ONLINE ATTACKS WITH STREAMING ANALYTICS
DETECTING SOPHISTICATED ONLINE ATTACKS WITH STREAMING ANALYTICS RSA Web Threat Detection Operationalizes Big Data to Provide Real-Time Protection from Business Logic Abuse Threats Security professionals
September 20, 2013 Senior IT Examiner Gene Lilienthal
Cyber Crime September 20, 2013 Senior IT Examiner Gene Lilienthal The following presentation are views and opinions of the speaker and does not necessarily reflect the views of the Federal Reserve Bank
The New Reality of Synthetic ID Fraud How to Battle the Leading Identity Fraud Tactic in The Digital Age
How to Battle the Leading Identity Fraud Tactic in The Digital Age In the 15 years since synthetic identity fraud emerged as a significant threat, it has become the predominant tactic for fraudsters. The
Webroot Security Intelligence for Mobile Suite. Cloud-based security solutions for mobile management providers
Webroot Security Intelligence for Mobile Suite Cloud-based security solutions for mobile management providers TABLE OF CONTENTS INTRODUCTION 3 WEBROOT INTELLIGENCE NETWORK 4 MOBILE SECURITY INTELLIGENCE
Beyond passwords: Protect the mobile enterprise with smarter security solutions
IBM Software Thought Leadership White Paper September 2013 Beyond passwords: Protect the mobile enterprise with smarter security solutions Prevent fraud and improve the user experience with an adaptive
Summary. U.S. Retail Cyber Monday Report 2014
U.S. Retail Report 2014 IBM DIGITAL ANALYTICS BENCHMARK 2 Summary Heading back to work, consumers clicked their way to the best deals on which remained the busiest online shopping day of the holiday season.
OVERVIEW. 1. Cyber Crime Unit organization. 2. Legal framework. 3. Identity theft modus operandi. 4. How to avoid online identity theft
OVERVIEW 2 1. Cyber Crime Unit organization 2. Legal framework 3. Identity theft modus operandi 4. How to avoid online identity theft 5. Main challenges for investigation 6. Conclusions ORGANIZATION 3
CYBERCRIMINAL IN BRAZIL SHARES MOBILE CREDIT CARD STORE APP
CYBERCRIMINAL IN BRAZIL SHARES MOBILE CREDIT CARD STORE APP August 2014 RSA agents recently traced a threat actor advertising a mobile credit card store application. The cybercriminal shared the information
RSA Web Threat Detection
RSA Web Threat Detection Online Threat Detection in Real Time Matthew Joseff, Sr. Technology Evangelist, RSA 2 RSA Web Threat Detection Online Threat Detection in Real Time Matthew Joseff, Sr. Technology
Mitigating Fraudulent CNP Transactions
Examination of Safeguards Electronic commerce has become a wildly successful channel for merchants and their customers. While the ability to shop online or through mail order catalogs is not new, the explosion
Protecting Online Customers from Man-inthe-Browser and Man-in-the-Middle Attacks
Protecting Online Customers from Man-inthe-Browser and Man-in-the-Middle Attacks Whitepaper W H I T E P A P E R OVERVIEW Arcot s unmatched authentication expertise and unique technology give organizations
Don t Fall Victim to Cybercrime:
Don t Fall Victim to Cybercrime: Best Practices to Safeguard Your Business Agenda Cybercrime Overview Corporate Account Takeover Computer Hacking, Phishing, Malware Breach Statistics Internet Security
The dramatic growth in mobile device malware. continues to escalate at an ever-accelerating. pace. These threats continue to become more
The dramatic growth in mobile device malware continues to escalate at an ever-accelerating pace. These threats continue to become more sophisticated while the barrier to entry remains low. As specific
The battle to contain fraud is as old as
22 SPONSORED FEATURE COMBATTING DIGITAL FRAUD Combatting digital fraud Combatting digital fraud has become a strategic business issue for today s CIOs. The battle to contain fraud is as old as business
Selecting the right cybercrime-prevention solution
IBM Software Thought Leadership White Paper Selecting the right cybercrime-prevention solution Key considerations and best practices for achieving effective, sustainable cybercrime prevention Contents
Addressing Big Data Security Challenges: The Right Tools for Smart Protection
Addressing Big Data Security Challenges: The Right Tools for Smart Protection Trend Micro, Incorporated A Trend Micro White Paper September 2012 EXECUTIVE SUMMARY Managing big data and navigating today
Here are the trends as of 12:00 a.m. PST this morning, at the official close of the two-day shopping period:
1 U.S. Retail Report 2014 IBM DIGITAL ANALYTICS BENCHMARK 2 Summary For the first time, online traffic from mobile devices outpaced traditional PCs on Thanksgiving Day. As IBM predicted within one percent
How Retailers Can Automate the Screening Process for Online Fraud While Preserving the Customer Shopping Experience
How Retailers Can Automate the Screening Process for Online Fraud While Preserving the Customer Shopping Experience Managing Online Payments Fraud Is a Balancing Act Today s online world is a place where
