credit card fraud

Find Friends and Credit Cards on Facebook: The New Cybercrime Reality

Social media attracts all kinds. These sites are used for catching up with friends on Facebook, instant news dissemination on Twitter, partisan political viewpoints expressed in online forums, real-time reach outs on Snapchat, professional networking on LinkedIn — and now, not surprisingly, they’re used as global havens for cybercrime. With the release of the second…

3D Secure Innovations: New Analytics Dashboard Helps Improve Response to Fraud

The 3D Secure protocol has been much (and somewhat unfairly!) maligned for the negative impact it has on the cardholder’s online experience. Requiring cardholders to produce their password each and every time they try to transact on a participating merchant site significantly disrupts purchase flow. Adding friction to the online checkout process leads to cart…

Hiding in Plain Sight: The Growth of Cybercrime in Social Media

Social media attracts all kinds. These sites are used for catching up with friends on Facebook, instant news dissemination on Twitter, partisan political viewpoints expressed in online forums, real-time reach outs on Snapchat, professional networking on LinkedIn — and now, not surprisingly, they’re used as global havens for cybercrime. Today, we are announcing the release…

Does EMV Make Online eCommerce Transactions Safer?

Ok, let’s get this quickly out of the way: EMV, the non-swipe chip-embedded credit cards are sturdy barriers against (in-person) credit card fraud.  However, when it comes to card-not-present eCommerce transactions (e.g. online ecommerce) where EMV is not a factor and where cybersecurity threats continue to proliferate, shouldn’t the customer experience be as secure and…

Securing eCommerce Transactions without Losing Customers Part 1 – Risk-Based Authentication

Yesterday afternoon I received one of the calls we all dread – my credit card company phoned to ask if my husband had purchased airline tickets within the last five minutes. Alas he wasn’t planning to whisk me away – a fraudster was using his credit card number to book a flight. Within twelve hours…

Four ways the financial industry could have fought Carbanak

It sounds like something out of a movie script — robbing a bank over the Internet — but that’s essentially what happened recently with the Carbanak malware. If you hadn’t heard about it, this was a campaign which ran over the course of 24 months and is believed to have netted thieves about US$1 billion.…

Understanding & Detecting Backoff POS Malware

Point of Sale (POS) malware has had its share of headlines this year. Now with the holiday shopping season underway POS systems will certainly be an enticing target for hackers to explore due to the payoff of thousands of fresh credit card numbers that will be run through these devices. “Backoff” is part of a…

Digital Identities: I Have One For Sale

The term digital identity is so suiting to who we really are online.  Think about the accounts you log in to on a regular basis, the activities you perform each day, the way you communicate with others…most of our lives are digital.  In a research study by Harris Polls (commissioned by RSA) on digital identities,…

’Tis the Season for Online Shopping: Why You Should Give Your Debit Card a Break

Let’s all go and do some on-line shopping!!  The holidays are upon us and wouldn’t you know it, the retailers are trying to entice us by moving up their online sales to match or even precede the traditional Black Friday deals.  You have to admit, it is pretty convenient to be able to replace the…

The eDead Trojan: A Synopsis of Geo-Targeted Spyware

While RSA FraudAction Research Labs does not usually focus on pure-play spyware, which is solely interested in users’ keyword searches and browsing habits, over the past year, the Lab has repeatedly detected and handled strains of malware called the eDead Trojan[1]. This highly-targeted spyware code was developed for the sole purpose of collecting keyword search…