Feeds

Chip and PIN forces scammers to switch focus

Izzy whizzy, let's get busy

Application security programs and practises

As Chip and PIN technology takes hold on the high street, credit card fraudsters have been forced to alter their techniques, new research reveals.

During the second half of 2005, the number of fraudulent transactions in high-street shops fell by 25 per cent compared to the first six months of the year, data from fraud detection specialists Retail Decisions (ReD) shows.

This change, the report said, coincides with the increased roll-out of the Chip and PIN scheme which requires card users to use a four-digit identification number rather than a signature when making a purchase.

The ReD study revealed that, as the amount of high-street counterfeit card transactions decrease, the number of fraudulent card-not-present (CNP) transactions is rising.

Attempted CNP fraud through mediums such as mail order, telephone order, interactive television and the internet increased by six per cent in the final quarter of 2005 compared to the same period a year before.

Activity was particularly strong in the run-up to Christmas, a peak time of year for retail websites.

ReD said fraudsters often target sites at the busiest times when purchase volumes are up in the hope they will be camouflaged.

The peak shopping hour over the festive season was between midday and 1pm on 23 December, with ReD's fraud detection system having its busiest minute at 12.41pm.

Among the most popular products targeted over Christmas were PSP consoles, the iPod Photo 60 and Sony and Acer laptops, ReD said.

Copyright © 2006, Startups.co.uk

Mobile application security vulnerability report

More from The Register

next story
Airbus promises Wi-Fi – yay – and 3D movies (meh) in new A330
If the person in front reclines their seat, this could get interesting
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
Want to beat Verizon's slow Netflix? Get a VPN
Exec finds stream speed climbs when smuggled out
Samsung threatens to cut ties with supplier over child labour allegations
Vows to uphold 'zero tolerance' policy on underage workers
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
US freemium mobile network eyes up Europe
FreedomPop touts 'free' calls, texts and data
Big Blue Apple: IBM to sell iPads, iPhones to enterprises
iOS/2 gear loaded with apps for big biz ... uh oh BlackBerry
Price cuts, new features coming for Office 365 small biz customers
New plans for companies with up to 300 staff to launch in fall
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.