Join the Community

22,017
Expert opinions
44,203
Total members
434
New members (last 30 days)
171
New opinions (last 30 days)
28,675
Total comments

Transaction Fraud Systems and Analysis

A community for discussion of Transaction Fraud systems and anlaytical techniques for bank card and financial services organisations.

Varun Maggon

Varun Maggon Senior Business Consultant at CustomerXPs Software Pvt. Ltd.

Countering Remittance Frauds with an Enterprise-wide Fraud Management Approach

Cybercrime continues to be an unending botheration for banks. While the focus of attempts and attacks until recently, tended to be on the banks’ customers (via card and account detail compromises), of late fraudsters have become more sophisticated and have raised the stakes. They have shifted their focus and are now directly targeting banks. They ...

/payments /regulation

Retired Member

Retired Member 

Real-Time Forensics: Effective Strategies to Combat Payments Fraud

The wave of payments fraud that continues to sweep the globe shows no signs of receding, leaving the financial services community anxiously in search of reliable ways to stay one step ahead. Just as payment processing becomes faster, so too are the cyber attackers moving quickly to find new ways to compromise sensitive data, transactions, and infr...

/security /payments

Ben Marsh

Ben Marsh CEO at iMeta Technologies

How can you really Know Your Client if you don’t have the full picture?

KYC is essential for two key reasons; the first is to ensure financial institutions are not enabling criminal activities and secondly to optimise important client relationships. It is now mandatory for all firms to be able to demonstrate that watertight KYC procedures are in place across every department within the organisation. Compliance needs t...

/wholesale

Varun Maggon

Varun Maggon Senior Business Consultant at CustomerXPs Software Pvt. Ltd.

Providing a Frictionless and Secure Customer Journey in PSD2

European leaders have long identified that the future of the financial services lies in the co-existence of the conventional banks with emerging fintech. However, to reach to that stage, security of the customer data is the major challenge. Despite industry efforts, fraudulent transaction levels are on the rise in Europe. Payments Services Direct...

/payments /regulation

Retired Member

Retired Member 

EBA Sets Tough Rules On Online Payments Fraud

The final PSD2 draft regulatory technical standards (RTS) issued by the European Banking Authority last week clearly set out the very limited circumstances in which risk-based assessments may be used in authenticating online transactions. The standards are much more stringent than many had hoped after EBA Chairman Andrea Enria revealed in a speech...

/payments /retail

Cedric Pariente

Cedric Pariente Stanford Certified Project Manager at EFFI Consultants

Skype Tapping Trojan Online

The creator of Skype Trojan decided to publish the source code of his program that is able to intercept VOIP communications of Skype. Nice intentions but bad execution He pretends that his first goal is to allow antivirus software companies to update signatures to be able to detect it more easily. This trojan records your VOIP communications befo

/security

Cedric Pariente

Cedric Pariente Stanford Certified Project Manager at EFFI Consultants

How to Crack WiFi Encryption in 1 Minute

Computer scientists in Japan say they've developed a way to break the WPA encryption system used in wireless routers in about one minute. How do they do? The attack gives hackers a way to read encrypted traffic sent between computers and certain types of routers that use the WPA (Wi-Fi Protected Access) encryption system. The attack was developed

/security

Cedric Pariente

Cedric Pariente Stanford Certified Project Manager at EFFI Consultants

Hidden Risks of Cloud Computing

Lots of users are moving their computing lives from the desktop to the cloud. They rely on hosted web applications to access emails, store photos and documents. But even if it comes with a lot of convenience, there are some hidden risks. Less Privacy Protection under the Law To search your house or your office (including documents stored on your ...

/security

Cedric Pariente

Cedric Pariente Stanford Certified Project Manager at EFFI Consultants

Never Use Hotmail as Secondary Email Account

Registering for an account at any web site almost always requires an email address, and some people use a secondary address they don't care about instead of their real email address to avoid spam. If you do this, be very careful. Microsoft shuts down Hotmail accounts that haven't been logged into after nine months. So if you registered for your G

/security

Cedric Pariente

Cedric Pariente Stanford Certified Project Manager at EFFI Consultants

Windows 7 RTM Activation Already Cracked

It's been less than a week since Windows 7 was released to manufacturer and already we're seeing reports that Windows 7 RTM Ultimate has been cracked using an OEM product key from computer manufacturer Lenovo (though the crack isn't limited to their hardware). Download Squad points out that, while Microsoft could potentially sort this out, it seem...

/security /regulation

Now Hiring