Ecommerce / Retail

Loading...

Imagine the following scenario: an attacker acquires consumers’ login credentials through a data breach. They use these credentials to test account access and observe...

Published: August 1, 2015 by Guest Contributor

Apple eschewed banks for a retailer focus onstage at their Worldwide Developers Conference (WWDC) when it spoke to payments. I sense this is an intentional...

Published: June 9, 2015 by Cherian Abraham

Cont. Understanding Gift Card Fraud By: Angie Montoya In part one, we spoke about what an amazing deal gift cards (GCs) are, and why...

Published: March 26, 2015 by Guest Contributor

Gift card fraud Gift cards have risen in popularity over the last few years— National Retail Federation anticipated more than $31B in gift card...

Published: March 5, 2015 by Guest Contributor

The evolution of identity verification Knowing who you are doing business with isn’t just a sound business practice to protect your bottom line. In...

Published: February 17, 2015 by Guest Contributor

The news of the latest breach last week reported that tens of millions of customer and employee records were stolen by a sophisticated hacker...

Published: February 11, 2015 by Guest Contributor

In a recent webinar, we addressed how both the growing diversity of technology used for online transactions and the many different types of access can...

Published: October 3, 2014 by Guest Contributor

Fraud is not a point-in-time problem and data breaches should not be considered isolated attacks, which break through network defenses to abscond with credentials....

Published: September 29, 2014 by Guest Contributor

Online crooks are getting more sophisticated by the second. Nowadays, fraudsters have the ability to conduct “clean fraud,” obtaining legitimate identities of users from...

Published: August 8, 2014 by Guest Contributor

Surag Patel, vice president of global product management for 41st Parameter, led a panel discussion on Digital Consumer Trust with experts from the merchant...

Published: May 22, 2014 by Guest Contributor

As we prepare to attend next week’s FS-ISAC & BITS Summitwe know that the financial services industry is abuzz about massive losses from the...

Published: April 23, 2013 by Guest Contributor

By: Kennis Wong On the surface, it’s not difficult to define existing account fraud. Obviously, it is fraud perpetrated against an existing account. But...

Published: July 5, 2011 by Guest Contributor

Another consumer protection article in the news recently highlighted some fraud best practices for social networking sites. Click here to read the article. When...

Published: September 20, 2010 by Matt Ehrlich

The overarching ‘business driver’ in adopting a risk-based authentication strategy, particularly one that is founded in analytics and proven scores, is the predictive ‘lift’...

Published: August 23, 2010 by Keir Breitenfeld

By: Kristan Frend I recently gave a presentation on small business fraud at the annual National Association of Credit Managers (NACM) Credit Congress.  Following...

Published: June 1, 2010 by Guest Contributor

Subscribe to our blog

Enter your name and email for the latest updates.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Subscribe to our Experian Insights blog

Don't miss out on the latest industry trends and insights!
Subscribe