Feeds

Chip and PIN forces scammers to switch focus

Izzy whizzy, let's get busy

Security for virtualized datacentres

As Chip and PIN technology takes hold on the high street, credit card fraudsters have been forced to alter their techniques, new research reveals.

During the second half of 2005, the number of fraudulent transactions in high-street shops fell by 25 per cent compared to the first six months of the year, data from fraud detection specialists Retail Decisions (ReD) shows.

This change, the report said, coincides with the increased roll-out of the Chip and PIN scheme which requires card users to use a four-digit identification number rather than a signature when making a purchase.

The ReD study revealed that, as the amount of high-street counterfeit card transactions decrease, the number of fraudulent card-not-present (CNP) transactions is rising.

Attempted CNP fraud through mediums such as mail order, telephone order, interactive television and the internet increased by six per cent in the final quarter of 2005 compared to the same period a year before.

Activity was particularly strong in the run-up to Christmas, a peak time of year for retail websites.

ReD said fraudsters often target sites at the busiest times when purchase volumes are up in the hope they will be camouflaged.

The peak shopping hour over the festive season was between midday and 1pm on 23 December, with ReD's fraud detection system having its busiest minute at 12.41pm.

Among the most popular products targeted over Christmas were PSP consoles, the iPod Photo 60 and Sony and Acer laptops, ReD said.

Copyright © 2006, Startups.co.uk

Beginner's guide to SSL certificates

More from The Register

next story
The 'fun-nification' of computer education – good idea?
Compulsory code schools, luvvies love it, but what about Maths and Physics?
Facebook, Apple: LADIES! Why not FREEZE your EGGS? It's on the company!
No biological clockwatching when you work in Silicon Valley
Happiness economics is bollocks. Oh, UK.gov just adopted it? Er ...
Opportunity doesn't knock; it costs us instead
Ex-US Navy fighter pilot MIT prof: Drones beat humans - I should know
'Missy' Cummings on UAVs, smartcars and dying from boredom
Yes, yes, Steve Jobs. Look what I'VE done for you lately – Tim Cook
New iPhone biz baron points to Apple's (his) greatest successes
Lords take revenge on REVENGE PORN publishers
Jilted Johns and Jennies with busy fingers face two years inside
Sysadmin with EBOLA? Gartner's issued advice to debug your biz
Start hoarding cleaning supplies, analyst firm says, and assume your team will scatter
Edward who? GCHQ boss dodges Snowden topic during last speech
UK spies would rather 'walk' than do 'mass surveillance'
Doctor Who's Flatline: Cool monsters, yes, but utterly limp subplots
We know what the Doctor does, stop going on about it already
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.