Community
A community for discussion of Transaction Fraud systems and anlaytical techniques for bank card and financial services organisations.
As the owner, you will also give up ownership if you leave this group.
Varun Maggon Senior Business Consultant at CustomerXPs Software Pvt. Ltd.
Cybercrime continues to be an unending botheration for banks. While the focus of attempts and attacks until recently, tended to be on the banks’ customers (via card and account detail compromises), of late fraudsters have become more sophisticated and have raised the stakes. They have shifted their focus and are now directly targeting banks. They ...
02 April 2018 /payments /regulation
Retired Member
The wave of payments fraud that continues to sweep the globe shows no signs of receding, leaving the financial services community anxiously in search of reliable ways to stay one step ahead. Just as payment processing becomes faster, so too are the cyber attackers moving quickly to find new ways to compromise sensitive data, transactions, and infr...
28 March 2018 /security /payments
Ben Marsh CEO at iMeta Technologies
KYC is essential for two key reasons; the first is to ensure financial institutions are not enabling criminal activities and secondly to optimise important client relationships. It is now mandatory for all firms to be able to demonstrate that watertight KYC procedures are in place across every department within the organisation. Compliance needs t...
13 February 2018 /wholesale
European leaders have long identified that the future of the financial services lies in the co-existence of the conventional banks with emerging fintech. However, to reach to that stage, security of the customer data is the major challenge. Despite industry efforts, fraudulent transaction levels are on the rise in Europe. Payments Services Direct...
26 September 2017 /payments /regulation
The final PSD2 draft regulatory technical standards (RTS) issued by the European Banking Authority last week clearly set out the very limited circumstances in which risk-based assessments may be used in authenticating online transactions. The standards are much more stringent than many had hoped after EBA Chairman Andrea Enria revealed in a speech...
01 March 2017 /payments /retail
Cedric Pariente Stanford Certified Project Manager at EFFI Consultants
The creator of Skype Trojan decided to publish the source code of his program that is able to intercept VOIP communications of Skype. Nice intentions but bad execution He pretends that his first goal is to allow antivirus software companies to update signatures to be able to detect it more easily. This trojan records your VOIP communications befo
29 August 2009 /security
Computer scientists in Japan say they've developed a way to break the WPA encryption system used in wireless routers in about one minute. How do they do? The attack gives hackers a way to read encrypted traffic sent between computers and certain types of routers that use the WPA (Wi-Fi Protected Access) encryption system. The attack was developed
28 August 2009 /security
Lots of users are moving their computing lives from the desktop to the cloud. They rely on hosted web applications to access emails, store photos and documents. But even if it comes with a lot of convenience, there are some hidden risks. Less Privacy Protection under the Law To search your house or your office (including documents stored on your ...
25 August 2009 /security
Registering for an account at any web site almost always requires an email address, and some people use a secondary address they don't care about instead of their real email address to avoid spam. If you do this, be very careful. Microsoft shuts down Hotmail accounts that haven't been logged into after nine months. So if you registered for your G
30 July 2009 /security
It's been less than a week since Windows 7 was released to manufacturer and already we're seeing reports that Windows 7 RTM Ultimate has been cracked using an OEM product key from computer manufacturer Lenovo (though the crack isn't limited to their hardware). Download Squad points out that, while Microsoft could potentially sort this out, it seem...
30 July 2009 /security /regulation
Welcome to Finextra. We use cookies to help us to deliver our services. You may change your preferences at our Cookie Centre.
Please read our Privacy Policy.