Blog Posts Tagged with "Device Reputation"

37d5f81e2277051bc17116221040d51c

One-Third of Banking Account Takeover Attempts Successful

August 20, 2012 Added by:Robert Siciliano

While less money was ultimately siphoned from banks and customers than in past years, there are new attack strategies on the horizon, which may push these numbers up in 2012. Threats, defenses, and vulnerabilities continually emerge, so stay tuned as we track the shifts in our evolving security landscape...

Comments  (0)

37d5f81e2277051bc17116221040d51c

What Does it Take to be Digitally Secure?

July 09, 2012 Added by:Robert Siciliano

It’s no longer possible to deny that your life in the physical world and your digital life are one and the same. While you are present here on the ground, you also exist online, whether you know it or like it or not. Coming to terms with this reality will help you make better decisions in many aspects of your life...

Comments  (0)

37d5f81e2277051bc17116221040d51c

POS Skimming: Bad News for Banks and Merchants

June 12, 2012 Added by:Robert Siciliano

EFTPOS skimming — which stands for “electronic funds transfers at the point of sale” — involves either replacing the self-swipe point of sale terminals at cash registers with devices that record credit and debit card data, or remotely hacking a retailer’s POS server...

Comments  (0)

37d5f81e2277051bc17116221040d51c

The Evolution of Holiday Thievery

November 30, 2011 Added by:Robert Siciliano

As far back as I can remember, police have been warning of thieves who target cars in parking lots, smashing windows to steal shopping bags left in plain sight. Now the warnings are different: no longer so focused on crime in the physical world, but instead, on threats in the virtual world...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Javelin Study Shows Increased Credit Card Fraud Risk

November 01, 2011 Added by:Robert Siciliano

Not a week goes by when we don’t hear of another major breach affecting thousands or even millions of customer accounts. Criminal hackers are getting smarter and savvier all the time, and they often have better technology than the banks and retailers tasked with protecting your data...

Comments  (0)

37d5f81e2277051bc17116221040d51c

The Evolution of Online Fraud Prevention

October 27, 2011 Added by:Robert Siciliano

When merchants moved from catalogs to websites, IP addresses were used to track transactions. But bad guys figured out how to spoof them. Now we have a number of new technologies designed to fight credit card fraud. The most effective and widely implemented is device reputation...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Why Complex Device Identification Isn’t Enough

August 07, 2011 Added by:Robert Siciliano

“Complex device identification” is more sophisticated. This security technique relies on disposable, one-time cookies, and creates a complex digital fingerprint based on characteristics including PC configuration, Internet protocol addresses, and geolocation...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Fraudulent Credit Applications Start with the Device

June 28, 2011 Added by:Robert Siciliano

Device fingerprinting coupled with the device’s reputation and risk profile helps identify the bad guys in the acquisition channel, so you don’t have to rely on other fraud detection tools that drive up the cost to decision an application...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Card Not Present Fraud Burdens eTailers

May 21, 2011 Added by:Robert Siciliano

Device reputation, an effective online fraud prevention method, helps protect retailers from fraudulent CNP transactions by examining the computer or other device for a history of unwanted behavior plus any suspicious activity at the time of transaction...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Twenty Percent of Online Fraud is “Friendly”

April 08, 2011 Added by:Robert Siciliano

Friendly fraud accounted for twenty percent of fraud affecting merchants. Friendly fraud is when a consumer purchases an item online, receives it, but claims they did not, then requests a refund or chargeback from the merchant or delivery of a duplicate item...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Ten Types of Criminal Social Media Impersonators

March 09, 2011 Added by:Robert Siciliano

Rather than looking at the information provided by the user, go deeper to identify the computer being used so that negative behaviors are exposed early and access to threatening accounts are denied before your business reputation is damaged and your users abused...

Comments  (1)

37d5f81e2277051bc17116221040d51c

How Does Device Reputation Protect Me?

February 16, 2011 Added by:Robert Siciliano

Device reputation spots online evildoers by examining the computer, smartphone, or tablet they are using to connect to any website. If a device is recognized as having previously committed some type of unwanted behavior, the website has the opportunity to reject the transaction...

Comments  (2)