Imagine the following scenario: an attacker acquires consumers’ login credentials through a data breach. They use these credentials to test account access and observe...
Apple eschewed banks for a retailer focus onstage at their Worldwide Developers Conference (WWDC) when it spoke to payments. I sense this is an intentional...
Cont. Understanding Gift Card Fraud By: Angie Montoya In part one, we spoke about what an amazing deal gift cards (GCs) are, and why...
Gift card fraud Gift cards have risen in popularity over the last few years— National Retail Federation anticipated more than $31B in gift card...
The evolution of identity verification Knowing who you are doing business with isn’t just a sound business practice to protect your bottom line. In...
The news of the latest breach last week reported that tens of millions of customer and employee records were stolen by a sophisticated hacker...
In a recent webinar, we addressed how both the growing diversity of technology used for online transactions and the many different types of access can...
Fraud is not a point-in-time problem and data breaches should not be considered isolated attacks, which break through network defenses to abscond with credentials....
Online crooks are getting more sophisticated by the second. Nowadays, fraudsters have the ability to conduct “clean fraud,” obtaining legitimate identities of users from...
Surag Patel, vice president of global product management for 41st Parameter, led a panel discussion on Digital Consumer Trust with experts from the merchant...
As we prepare to attend next week’s FS-ISAC & BITS Summitwe know that the financial services industry is abuzz about massive losses from the...
By: Kennis Wong On the surface, it’s not difficult to define existing account fraud. Obviously, it is fraud perpetrated against an existing account. But...
Another consumer protection article in the news recently highlighted some fraud best practices for social networking sites. Click here to read the article. When...
The overarching ‘business driver’ in adopting a risk-based authentication strategy, particularly one that is founded in analytics and proven scores, is the predictive ‘lift’...
By: Kristan Frend I recently gave a presentation on small business fraud at the annual National Association of Credit Managers (NACM) Credit Congress. Following...