Feeds

Cardiff tops UK plastic fraud list

Er, in your face, London!

The Power of One eBook: Top reasons to choose HP BladeSystem

Cardiff has displaced London as the worst place in the UK for card fraud, according to a new survey of fraud hotspots.

More than a third (37 per cent) of residents of the Welsh capital have been victims of card fraud at least once since 2007, according to an annual update to a Card Fraud Index maintained by CPP, which sells fraud insurance services to consumers.

London remains a hotspot, with 35 per cent of adult cardholders having been victimised since 2007, followed by Norwich (30 per cent), Southampton (28 per cent) and Leeds (27 per cent).

Overall incidents of card fraud increased by more than six per cent over the last two years, equating to 2.75 million extra UK victims. Online fraud affected a third of those hit by credit card fraud, while the use of counterfeit cards at cash points or elsewhere accounted for 17 per cent of cases handled by CPP.

Almost half (43 per cent) of plastic fraud victims only discovered they had been defrauded after their bank got in touch. CPP reports that the average sum involved in frauds was £590, with one in six victims (16 per cent) reporting losses of over £1,000.

CPP's study also notes that cardholders were sometimes their own worst enemy, after taking actions that left them open to fraud. One in eight admitted to writing down their card details, one in ten let others take out money on their behalf from ATM machines, and 16 per cent let a shop assistant take their card out of sight.

Sarah Blaney, card fraud expert at CPP, said that card ID theft (where crooks hijack a victim's bank account, usually by changing the address details and then requesting a new card and PIN) makes up around half of its fraud cases. Consumers should regularly check their bank accounts to uncover incidents of fraud, she urged. ®

Designing a Defense for Mobile Applications

More from The Register

next story
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.