Fraud

PSD2 – Can your transaction risk analysis and strong customer authentication comply?

February 23, 2017 the European Banking Authority (EBA) released the Final Report of the Draft Regulatory Technical Standards on Strong Customer Authentication and Common Secure Communication for the Payment Services Directive 2 (PSD2). This final report heralded a welcome change in the EBA’s position on the exemption to Strong Customer Authentication (SCA) based on transaction…

What do RSA Conference 2017 and my DVR have in common?

Another year, another RSA Conference. At this point, I have lost count of my appearances at this annual gathering of all things security – I believe it was number 15 or 16 for me. I say “appearances” because the days blur into such a steady stream of meetings, discussions and general sensory overload that at…

Fraud Insights Through Integration

Another great conference at the Moscone Center in San Francisco. On the heels of RSA Conference, it’s fair to ask: When was the last time you counted the number of anti-fraud tools you are using to protect your consumer-facing environment?  Now, when was the last time you thought about the connective tissue tying data sources…

What Peanut Butter Cups Can Teach Us About Fraud Prevention

Reese’s® Peanut Butter Cups are a “so-good-it-has-to-be-bad-for-you” treat adored by candy lovers everywhere. The combination of peanut butter and chocolate is such a classic it’s hard to remember there was a time no one thought about putting these two together. In fact, Reese’s built an entire advertising campaign around the odd couple concept. The original…

Act at the Speed of Fraud: Take the Challenge

How fast can you find fraud?  That is the challenge put forth by the RSA Fraud & Risk Intelligence team at RSA Conference 2017. Why the emphasis on speed? Simply put, the faster an organization can isolate the source of fraud, the faster they can respond. And based on RSA’s research, there is a gaping…

The $5 Billion Fraud Problem

When explaining my profession to people I meet, they often tell me about the time their card was “frauded.” I always enjoy this conversation, as it provides insight into the human victim element of a fraud event. The breadth of emotions typically ranges from, “How did this happen and how do we track down the…

Defending a Decade of Phishing and Cybercrime

With holiday shopping season in full swing, many of us are feeling just like the guy in the song, “The 12 Pains of Christmas.”  I have my own two personal pains with the holidays, and I am still deciding which one is more annoying: Elf on the Shelf, or, the mountain of phishing emails I have…

Living With The Hacker-Industrial Complex

At one of my previous cybersecurity jobs, I received a frantic call from a man whose production company had just been hit with a massive breach. The company’s main summer release was in final post-production when it was hacked, and within a day had over 100,000 downloads. It hadn’t crossed anyone’s mind that the company’s…

Cybercrime in Social Media Grows 70% in Six Months

These days, all you need to do is type “botnet,” “hacking,” “DDoS,” “CVV2,” or any other cybercrime-related term into the search bar on most social media platforms, and you will find a plethora of fraud activity occurring in plain sight.  As reported earlier this year by RSA, social media has become a breeding ground for cybercrime-related…

2017 Global Fraud and Cybercrime Forecast

From mobile threats and malware, to the organizations on the target lists of e-commerce fraud – a myriad of threats exist across the cyber landscape and the commoditization of cybercrime is making it easier and cheaper to launch attacks on a global scale.  If you are a believer that the best predictor of future events…