Feeds

Red alert over London on credit card fraud map

London's burning

Secure remote control for conventional and virtual desktops

London is the UK capital of credit card fraud, according to a study by online fraud prevention firm Early Warning.

Early Warning's latest figures for Cardholder Not Present (CNP) fraud show that Greater London clocked up largest number of fraudulent transactions in the past year, followed by Manchester and Kilmarnock.

Early Warning has produced a map (PDF) that identifies the postcode areas from which the fraudsters operate, put together by tracking the delivery addresses for fraudulently obtained goods – typically accommodation addresses and "dead letter boxes".

It reckons the technique represents the only reliable method for mapping credit card fraud. The areas with the biggest fraud problems are the Central London postcodes, together with Romford and Ilford in Essex, and Twickenham in Middlesex.

Outside the capital, cities and towns where CNP fraud is on the increase include Bournemouth, Northampton, Portsmouth, and Stockport.

Nationwide, CNP fraud last year cost £183.2m, according to figures from banking organisation APACS. Stats from Early Warning say CNP fraud has shot up by 38 per cent in the past 12 months.

Using Early Warning's CardAware fraud detection systems, retailers and other online traders can check credit card orders against a database of known frauds. The firm has added a postcode-based risk assessment tool. It reports that the geographical spread of CNP fraud changes rapidly.

"Some postcode areas both inside and outside the Capital that last year recorded only negligible numbers of frauds are now reporting 'low' or 'medium' numbers," said Andrew Goodwill, managing director of Early Warning. "No single area of the UK is untouched by this problem."

The introduction of Chip and PIN systems on credit and debit cards in the UK to validate purchases as an alternative to signatures has pushed fraud onto the internet, Goodwill added. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
Why did it take antivirus giants YEARS to drill into super-scary Regin? Symantec responds...
FYI this isn't just going to target Windows, Linux and OS X fans
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Reducing the cost and complexity of web vulnerability management
How using vulnerability assessments to identify exploitable weaknesses and take corrective action can reduce the risk of hackers finding your site and attacking it.