Feeds

Crooks beat anti-fraud cops with old-school bank scams

Fraud losses fell overall

The Power of One eBook: Top reasons to choose HP BladeSystem

Payment card and banking fraud losses fell this year against a rise in cash pilfered through old-school cheque and telephone banking fraud, according to figures released today for the UK.

Total fraudulent losses dropped to £169.8m between January and June 2011, down 9 per cent from £187m in the same period last year. Losses fell to their lowest in 11 years, according to banking industry group the UK Cards Association.

The association credits improved fraud detection software and the rollout of updated chip and PIN technology outside the UK for the decline. Lost and stolen card fraud losses, by contrast, rose from £21.3m to £24.7m.

Online banking fraud losses reached £16.9m during the first half of 2011, down 32 per cent on the same period last year.

However, phone banking fraud losses rose to £8.6m during this period, a 48 per cent rise on figures from the first six months of 2010. Most of these losses arise as a consequence of simple con tricks, according to the UK Cards Association.

"As with card fraud, criminals are focusing on the straightforward crime of duping a customer into believing they are dealing with a bank or police representative and getting them to disclose their financial security details – such as PINs, passwords and login details - which the criminal then uses to access the customer’s bank account over the phone," the association said in a statement.

Cheque fraud losses increased to £16.4m during 1H2011, up from £14m in 1H2010. A further £254m of attempted cheque fraud was spotted and stopped before losses occurred.

DCI Paul Barnard, head of the Dedicated Cheque and Plastic Crime Unit - the special police squad that is sponsored by the banking industry - said consumers need to be on their guard against the return of "old fashioned" scams.

“Losses are appreciably lower than they were a few years ago and everyone involved in tackling fraud has reason to be encouraged by this – and that includes bank customers who, as their own frontline of defence, have certainly played their part too," DCI Barnard said.

“However, there has been an increase in old fashioned scams – criminals using distraction techniques and social engineering methods to get hold of people’s cards or phone banking details. We are urging everyone to be on their guard.

"Your bank or the police will never cold call you or email you and ask you for your login details, cards or PINs. If anyone does, they are probably a criminal, so hang up the phone or delete the email."

The UK Cards Association has a full breakdown of the figures - along with a series of top tips on avoiding fraud – in a statement on the losses here [PDF]. ®

Designing a Defense for Mobile Applications

More from The Register

next story
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.