2016 FRAUD.

Slides:



Advertisements
Similar presentations
Identity theft Protecting your credit identity. Identity Theft Three hundred forty three million was lost from consumers in 2002 The number of complaints.
Advertisements

Session 4: Data Privacy and Fraud Moderator: Bill Houck, Director, Risk Management, UATP Panelist: Peter Warner, EVP, Retail Decisions Cherie Lauretta,
JPMorgan Chase Purchasing Card Training
Government Prepaid Card
A business makes payments for what it buys, In return it receives payments for goods it sells or services it provides.
Cross Border E-commerce: Challenges and Opportunities
Zenith Visa Web Acquiring A quick over view. Web Acquiring Allows merchants to receive payments for goods and services through the Internet Allows customers.
ICT at Work Banking and Finance.
1 Credit card operation and the recent CardSystems incident HONG KONG MONETARY AUTHORITY 4 July 2005.
Debit cards Shumate – 5th Period.
Contactless Payment. © Family Economics & Financial Education – January 2007 –– Financial Institution Unit – Contactless Payment - 2 Funded by a grant.
Carl Lui Hung Sun Karen Chung Tin Yu Louis Lo Wan Shuen Peggy Fan King Yi Yolanda Wong Yee Ting Cream Chung Suet Ying
FINANCIAL SOCCER Module 3 Credit, debit and prepaid cards Collect a quiz and worksheet from your teacher.
E-Banking is the use of electronic means to conduct banking business, such as telephone, Internet, cell phone, or other device by way of secure internet.
Ecommerce Applications 2009/10 Session 31 E-Commerce Applications E-payment.
Traditional and Electronic Payment Methods Chapter 3.
3. 18 Methods of making and receiving payments Methods of making and receiving payments Banks and bank accounts  All businesses have bank accounts.
The Kent Card Supporting Direct Payments Jean Penney - Project Manager, Independent Living - KCC.
Electronic Payment. Amounts transferred through accounts Money transfer instructions Bank’s computer system Other banks / Businesses.
BZUPAGES.COM Electronic Payment Systems Most of the electronic payment systems on internet use cryptography in one way or the other to ensure confidentiality.
An owner or “holder” of a credit or debit card or the person who is using a credit card to pay for goods or services CARDHOLDER.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Safe and Secure Internet Gambling Financial Model.
Payroll Program. Introduction Andean Marketing Group envisions a very successful and profitable source of revenue for all new employers who choose our.
© 2014 CustomerXPs Software Pvt Ltd | | Confidential 1 Tentacles of Fraud #StarfishBanks CustomerXPs Software Private Limited.
Traditional and Electronic Payment Methods Chapter 3.
Controlling Fraud Risk Exposure and Loss Sherri Goodman Director of Fraud Operations September 22, 2005.
1.Understand the shifts that are occurring with regard to online payments. 2.Discuss the players and processes involved in using credit cards online.
Business Administration term project 2 (25%) financial Management Systems Debit card and credit card payments By Ashleigh Gray.
e-Learning Module Credit/Debit Payment Card Acceptance and Security
Execute sales transactions. Sales transactions include: Cash or check Debit card sales Credit card sales Layaway sales On approval sale Cash-on-delivery.
ANS(Prepared by: Mazhar Javed )1 Computer crime The growth of use of computerised payment systems – particularly the use of credit cards and debit cards.
Improve Your Experience ExpressRelease Debit Card.
T O S H I B AT O S H I B A Fraud & Disputes – Know Who You Are Trading With.
Step 2 – Register a Card To register a UR Card, you can send an to or fill out the registration form at one of our awesome
Confidential and Proprietary - NOT TO BE DISTRIBUTED WITHOUT THE EXPRESS WRITTEN PERMISSION OF BANK OF AMERICA MERCHANT SERVICES. ASTRA EMV Review/Best.
WHAT NEW, WHAT NEXT IN PAYMENT PROCESSING. EMV WHAT IS EMV? 3  An acronym created by Europay ®, MasterCard ® and Visa ®  The global standard for the.
CNP Fraud. Occurs when a fraudster falsifies an application to acquire a credit card using an individual’s personal information. (Eg: postal intercept)
ELECTRONIC PAYMENT SYSTEM
Take Charge of your Finances
Lesson 5.2 Banking Services and Fees
Card fraud in Hungary (case study ) and MON™ fraud prevention system
Presenter: Dennis Pope Executive Manager Merchant Fraud, Compliance & Chargebacks National Australia Bank (NAB) Ph: Mob:
Regular Payments First and Subsequent Payments
Introduction to Depository Institutions
Electronic/Online Banking & Bill Pay
Unit 3 Personal & Business Finance
Take Charge of your Finances
Credit Cards What You Need To KNOW.
Own Your Identity.
Internal Controls.
Depository Institution Essentials
Credit vs. Debit What is Credit?.
Depository Institution Essentials
Third-party Payment options, PayPal Implementation
Own Your Identity.
Everything old is new again
Protecting Yourself from Fraud including Identity Theft
Depository Institution Essentials
ELECTRONIC PAYMENT SYSTEMS
Mastercard® Threat scan
ENDORSING, DEPOSITING & RECONCILING
TERMINOLOGY & WHY WE BANK
Take Charge of your Finances
Lesson #1 - How to write a check
Mastercard® Threat scan
Internal Controls.
Lesson 4.2 Banking Services and Fees
Financial Service Providers
Internal Controls.
Presentation transcript:

FRAUD

 Over 50 public sector clients with over 100 live programmes and £12 million GBP loaded monthly  10 staff in our fraud team  Every Council transaction is monitored by our fraud engine In the news recently: 145m eBay customers had to reset passwords after hack 32m Twitter accounts hacked and passwords leaked Fraudsters can clone 15 bank cards a second with hi-tech contactless device How Even the FTC’s Lead Technologist Can Get Hacked….. Even billionaire tech entrepreneurs get hacked! (Admitted re-using passwords) Some PFS Statistics

One example – BIN range attempts  Generating multiple card numbers based on known BIN/card numbers  Use software to generate the numbers – hundreds per second in sequential order (with the same expiry date)  Card numbers that generate a ‘hit’ are then ‘tested’ with merchants, usually for a very small value transaction  Numbers that prove successful are then used at other internet sites  Fraudsters have no personal details in these instances  PFS is exposed to this type of attack in the same way as every other debit, credit and prepaid card provider is globally  PFS invest millions into security and fraud prevention annually

 Example A – 8 Cards targeted  7 cards successfully declined by our fraud engine  1 card attempt successful for £ – a counterfeit card was created  Fraud loss refunded in full by PFS within 3 days (if this was cash it would have been lost forever)  New fraud monitoring rules implemented as a result of this attack  Example B – 46 cards targeted  £0.03p transactions all for University of Toronto book store (which has very little security – easy target)  No transactions were successful as our fraud engine detected and declined all  The cards were placed in a “Deposit Only” status where no spend can occur  Cards were replaced instantly  PFS report the cards to Mastercard as being compromised 2016 Fraud Attempts

Other fraud types and our anti-fraud rules  Lost cards  Identity theft  Skimming/cloning (using a magnetic card reader to copy the genuine card details on the blank card)  We use a variety of rules to monitor card activity which are constantly reviewed and refined and updated as fraudsters are constantly coming up with new ways to attack us: –Velocity rules – multiple transactions made within a certain timeframe –Geo-location rules – multiple transactions are made within a certain timeframe in a higher risk country –Volume rules – large amounts of money are spent in a certain timeframe –Security rules – multiple invalid PIN/CVV attempts are made –Loading rules – card load is immediately followed by a cash withdrawal –Merchant rules – a transaction occurs at certain higher risk merchants

3D Secure  PFS have enrolled all public sector programmes to 3D secure (Three Domain secure.)  Designed to improve both cardholder and merchant confidence in internet purchases and to reduce disputes and fraudulent activity related to card use  Cardholder creates a unique password to authorise payments on-line as part of the authentication process prior to approving transactions  Merchant does need to be 3D enabled (we should win chargebacks if fraud was committed with a merchant who did not enable this.)  3D secure requires 4 identifiers  Name  Valid mobile telephone number  Date of Birth  Postcode  Enrolment process procedure document available

Cash –No monitoring possible, if money is stolen there is no audit trail, no comeback, no reclaim/chargeback process (for prepaid the chargeback process applies) –Safeguarding issues Bank accounts/debit cards –The Public sector organisation has no oversight, no monitoring access –Cannot liaise with the bank due to data protection rules so account holder must do so  PFS will invoke the chargeback policy and retrieve funds instantly  Cards will be replaced immediately  In most cases we will refund the cardholder whilst the chargeback process progresses (as we did in the scenarios detailed earlier) Cards v Alternatives (re. Fraud)

Deanna Fernandez & Lee Britton Anti-Fraud Team Contact Us