123456, password, password1: These are a few of the top passwords used by Fortune 1000 employees whose passwords and personally identifiable information have been exposed in third-party breaches. While the dangers of easy-to-guess passwords are well-known, even employees at top companies are guilty of bad password...
To explore how credential stuffing attacks and brute force attacks differ, we need to understand what they are and how they operate. Here is a quick summary.
Adapting fraud systems from desktop to mobile is no simple task. Retailers may misinterpret legitimate shopping behavior as 'risky' due to the nature of cellular connections (e.g. a mobile carrier may shift your browsing to another location).
To deal with the increase in mobile usage, organizations must also make...
Customer accounts are an integral tool to help merchants foster customer loyalty. But when login credentials are compromised, they present a unique opportunity for fraudsters to commit CNP fraud and steal customer PII. In 2018 alone, Account Takeover attacks resulted in over $11 billion in losses.
The fallout from...
In this cutthroat environment, any overlooked leak in the eCommerce payment funnel can be devastating. But most merchants don't realize that around 10% of revenue that reaches checkout is declined even before they have a chance to capture funds.
Fear of CNP fraud leads to businesses falsely declining up to 5.5% of...
Fraud is scary, and there are many valid reasons for merchants to decline suspicious transactions in the name of fraud prevention. But often, in the quest to avoid abuse, risk-averse vendors take defensive measures too far.
Download this whitepaper to learn more about:
How false declines leave money on the...
Online fraud is becoming more sophisticated as cyber-criminals try to stay a step ahead of fraud solutions and tools. Not only are ATO attacks tough to spot, they can also cause harm that goes beyond just stolen goods and chargebacks.
Download this whitepaper to learn more about:
How fraudsters get credentials to...
In the competitive world of eCommerce, online retailers must provide an optimal customer experience or risk losing business. Many are seeing hard-earned revenue fall victim to costly credit card chargebacks.
Download this whitepaper to learn more about:
Why chargebacks are filed
The ramifications of too many...
The goals of cybercriminals using automated bots are always the same - account takeovers, fake account creation, theft of unused gift card balances, and similar types of criminal activity that disrupt normal business operations.
This report presents the results of an in-depth survey on current practices that larger...
Despite the growing cybersecurity threat targeting mobile financial services applications, many financial institutions are failing when it comes to protecting their apps. Research conducted by advisory firm Aite Group uncovered widespread security deficiencies among mobile consumer finance apps leading to the exposure...
In this solution approach guide, we'll discuss how using an IBM i2® solution to investigate fraud and financial crimes can help an organization achieve an asymmetrical advantage by removing the fraudsters greatest weapon, their ability to remain concealed. IBM i2's industry-leading, multidimensional intelligence...
The impact of chargeback rates is abundantly clear and easily measurable, but the financial impact of false declines - rejecting perfectly good customers over fear of fraud - is largely underestimated. In reality, these
mistakes, which are all too common but difficult to track, end up costing merchants significantly...
By 2020, 75% of omni-channel customer-facing organizations will sustain a targeted, cross-channel fraud attack with the contact center as the primary point of compromise.*
Read "Don't Let the Contact Center Be Your Fraud Achilles Heel" to learn why Gartner believes the technologies and techniques available to...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing ffiec.bankinfosecurity.com, you agree to our use of cookies.