Current Fraud Trends Kathy Druckenmiller, CFCI, CIRM, ACT Specialist April 29, 2014 4/29/2014.

Slides:



Advertisements
Similar presentations
TWO STEP EQUATIONS 1. SOLVE FOR X 2. DO THE ADDITION STEP FIRST
Advertisements

AN ATM WITH AN EYE THE FUTURE,S TECHNOLOGY
Four ways to give electronically 1. Making it easy for givers to give! 2.
1 Copyright © 2010, Elsevier Inc. All rights Reserved Fig 2.1 Chapter 2.
By D. Fisher Geometric Transformations. Reflection, Rotation, or Translation 1.
Business Transaction Management Software for Application Coordination 1 Business Processes and Coordination.
Viet Nam Hitech Crime Investigation Department Dr. Tran Van Hoa
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Exit a Customer Chapter 8. Exit a Customer 8-2 Objectives Perform exit summary process consisting of the following steps: Review service records Close.
0 - 0.
DIVIDING INTEGERS 1. IF THE SIGNS ARE THE SAME THE ANSWER IS POSITIVE 2. IF THE SIGNS ARE DIFFERENT THE ANSWER IS NEGATIVE.
ADDING INTEGERS 1. POS. + POS. = POS. 2. NEG. + NEG. = NEG. 3. POS. + NEG. OR NEG. + POS. SUBTRACT TAKE SIGN OF BIGGER ABSOLUTE VALUE.
SUBTRACTING INTEGERS 1. CHANGE THE SUBTRACTION SIGN TO ADDITION
MULT. INTEGERS 1. IF THE SIGNS ARE THE SAME THE ANSWER IS POSITIVE 2. IF THE SIGNS ARE DIFFERENT THE ANSWER IS NEGATIVE.
Addition Facts
ZMQS ZMQS
Banking Services AVAILABLE FOR A SMALL BUSINESS. BANKING SERVICES 2 Welcome 1. Agenda 2. Ground Rules 3. Introductions.
BT Wholesale October Creating your own telephone network WHOLESALE CALLS LINE ASSOCIATED.
Katarína Koščová Tatiana Krišpinská Marek Demín Martin Valdner E-business and E-marketing Electronic payment systems.
PRESENTED BY: FATIMA ALSALEH Credit Cards Fraud - skimmers -
Combating Fraud Risk in Payment Systems. 2 Defining Fraud..a deliberate act of omission or commission by any person, carried out in the course of a banking.
© S Haughton more than 3?
PowerPoint 1: fraud/ phishing Lesson 2-2. WHAT IS PHISHING?
1 And Tips to Avoid Becoming a Victim Recent Cyber Crime Cases.
Take Charge of Your Finances
1.7.6.G1 © Family Economics & Financial Education –March 2008 – Financial Institutions – Online Banking – Slide 1 Funded by a grant from Take Charge America,
Addition 1’s to 20.
25 seconds left…...
Test B, 100 Subtraction Facts
Week 1.
We will resume in: 25 Minutes.
1 Unit 1 Kinematics Chapter 1 Day
Display slides 2 and 3 with Procedure step 2 in the lesson.
User Security for e-Post Applications Dr Chandana Gamage University of Moratuwa.
Credit Card Fraud. Credit card fraud - situation when an individual uses another individual’s credit card for personal reasons while the owner is not.
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
1. 2 Someone steals your personal information to commit fraud. A “buy now, pay never” shopping experience. What is Identity Theft?
Warm Up: Identity Theft: Quick Write 1. What is Identity Theft? 2. What is Fraud?
Credit Card Fraud, Jan Prochazka, Credit Card Fraud on the Web Jan Prochazka.
Payment Fraud Trends : What Can you do? Protect Yourself and Your Business from Financial Fraud.
Electronic ATM Fraud. ATM Fraud is where you goto an ATM and you insert your card into a skimmer which is placed in the card slot and it will take all.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
AS Level ICT Selection and use of input devices and input media: Capturing transaction data.
Bridge to the Future MCUL 2007 Executive Summit
Electronic Payment Systems
Chapter © 2010 South-Western, Cengage Learning Checking Accounts and Banking Services Banking Services and Fees 9.
Seth Houts Data Processing Manager Debit/Credit Card Fraud.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
Confidential – For Discussion & General Information Purposes Only EMV to Card Not Present Fraud Gavin Levin, CTP eReceivables Consultant.
Getnationwide.com Let’s Talk about EMV Danielle Rourke.
Onebeaconpro.com t f Cyber Liability Insurance Coverages and Trends Affecting Community Banks Craig M. Collins President,
IT Banking Advantages and Disadvantages. Advantages IT banking is faster and more convenient for the user as they no longer are required to be at the.
Business Administration term project 2 (25%) financial Management Systems Debit card and credit card payments By Ashleigh Gray.
e-Learning Module Credit/Debit Payment Card Acceptance and Security
Security A Payments Perspective Terry Dooley EVP & CIO SHAZAM Network.
Midsouth User Group Annual Conference
U.S. Department of Homeland Security United States Secret Service MCPF PRESENTATION Evolving Financial CrimeTrends & The Gateway ECTF ASAIC Doug Roberts.
How to Write Checks and Balance Accounts. Checking Account An account at a bank against which checks can be drawn by the account depositor Check – A document.
Frauds, Scams and Slams: Credit Card and ATM Fraud Prepared by Dr. Jan Park Gerontology Specialist Oklahoma Cooperative Extension service April 2002.
WHAT NEW, WHAT NEXT IN PAYMENT PROCESSING. EMV WHAT IS EMV? 3  An acronym created by Europay ®, MasterCard ® and Visa ®  The global standard for the.
Warm Up: Identity Theft: Quick Write 1. What is Identity Theft? 2. What is Fraud?
CNP Fraud. Occurs when a fraudster falsifies an application to acquire a credit card using an individual’s personal information. (Eg: postal intercept)
CNP, Malware & Physical Attacks; The Future of Fraud in an EMV World.
EMV.
Mrs. Esman Computer Special
What every consumer should know
Chip & Pin and Apple Pay: Vulnerabilities of the Changing Payment Systems Jay Isaacson.
A Secret Service Perspective on Credit Card Fraud
Presentation transcript:

Current Fraud Trends Kathy Druckenmiller, CFCI, CIRM, ACT Specialist April 29, /29/2014

Phishing Vishing Smishing Hijacked Social Media Sweetheart Scams Online Job Scams Social Engineering 4/29/2014

Phishing Using electronic communication to manipulate someone into giving private information Social Engineering Phishing Using electronic communication to manipulate someone into giving private information 4/29/2014

4 Vishing Utilizing VOIP or traditional telephone lines to trick someone into giving confidential information Social Engineering 4/29/2014

5 Smishing Using SMS test messages to obtain sensitive data Social Engineering 4/29/2014

6 Hijacked Taking over a personal account and masquerading as the customer Social Engineering 4/29/2014

7 Social Media Using social media as resource to obtain your identity or commit fraud against you Social Engineering 4/29/2014

8 Sweetheart Scams Fraudsters trolling online dating websites and social media sites, looking for partners that will ultimately send their own funds to the fraudster or will be used to launder stolen funds through their personal accounts Social Engineering 4/29/2014

9 Online Job Applications Phony job postings placed on legitimate employment websites that trick applicants into becoming money mules for stolen funds Social Engineering 4/29/2014

10 Mitigation for Social Engineering Fraud? Education for Customers – to avoid involvement in scams Education for Employees – to recognize the signs of transactions that may be the result of social engineering Social Engineering 4/29/2014

11 Current Debit and Credit Card Fraud Counterfeit Skimmed Debit and Credit Cards Data Breaches Cybercrime 4/29/2014

12 Counterfeit/Skimmed Cards Skimmer Clone Magnetic stripe data Capture CVV and CVD codes Data can be transferred to card stock or white plastic Skimming Equipment : Handheld skimmer Alternate skimmers Skimming device placed over legitimate card reader 4/29/2014

13 Skimming Equipment Handheld Skimmer Requires human assistance Requires card to be out of site of customer Targets restaurant patrons Information re-encoded onto plastic or sold on internet carder sites 4/29/2014

14 Skimming Equipment Handheld Skimmer 4/29/2014

15 Skimming Equipment Alternate Skimmers 4/29/2014

16 Skimmed Cards Reader placed directly over legitimate card reader : Does not requires human assistance Does not require card to be out of site of customer Targets: ATM machines, Gas pumps and readers that are remote and can be tampered with without witnesses. Information re-encoded onto plastic or sold on internet carder sites 4/29/2014

17 ATM Skimming Equipment ATM Skimmer Examples 4/29/2014

18 ATM Skimming Equipment ATM Skimmer Examples 4/29/2014

19 EMV (Europay, MasterCard and Visa) Chip and PIN technology Fraud liability shift to POS merchants - October 2015, ATMs - October 2016 and Gas Pumps - October 2017 EMV will not affect Data Breaches 4/29/2014

20 EMV (Europay, MasterCard and Visa) EMV Chip and PIN reader 4/29/2014

21 Data Breaches Malware that targets corporate servers Operation can be completely remote Mass amounts of data at once Information sold on internet carder sites EMV removes the magnetic stripe, compromised data cannot be re-encoded onto card 4/29/2014

QUESTIONS ? 4/29/2014