SlideShare a Scribd company logo
1 of 14
Credit Card Frauds
Modern Day Pick pocketing…
Definition and Meaning
• Credit card fraud is a wide-
  ranging term for theft and
  fraud committed using a
  credit card or any similar
  payment mechanism as a
  fraudulent source of funds in
  a transaction.
• The purpose may be to
  obtain goods without
  paying, or to obtain
  unauthorized funds from an
  account.
• Credit card fraud is also an
  adjunct to identity theft.
Hard Facts
• "Lost or stolen wallets, checkbooks and credit and debit
  cards" made up 43 percent of all ID theft incidents in which
  the "method of access" was known. (Source: Javelin
  Strategy & Research, February 2009 study.)
• Credit and debit card fraud is the No. 1 fear of Americans in
  the midst of the global financial crisis. Concern about fraud
  supersedes that of terrorism, computer and health viruses
  and personal safety. (Source: Unisys Security Index: United
  States, March 2009)
• Arizona leads the nation in identity theft complaints per
  100,000 people. In 2008, the state had 149 complaints
  about ID theft per 100,000 people. California
  (139.1), Florida (133.3), Texas (130.3) and Nevada (126.0)
  rounded out the top five. (Source: Federal Trade
  Commission, February 2009 survey)
• South Dakota has the fewest identity theft complaints
  per 100,000 people in the nation. In 2008, the state
  had 33.8 complaints about ID theft per 100,000
  people. North Dakota (35.7), Iowa (44.9), Montana
  (46.5) and Wyoming (46.9) rounded out the bottom
  five. (Source: Federal Trade Commission, February
  2009 survey)
• Brownsville-Harlingen, Texas, is the metropolitan area
  with the largest number of ID theft complaints per
  100,000 people. In 2008, the area had 366.8
  complaints per 100,000 people. Napa, Calif., was
  second with 351.3. (Source: Federal Trade
  Commission, February 2009 survey)
Types of Frauds
• 1. Counterfeit credit card
      Makes up for 37% of all funds lost through credit card frauds. To make
  fake cards criminals use the newest technology to “skim” information
  contained on magnetic stripes of cards and to pass security features such
  as holograms

• 2. Lost or Stolen Cards
      Cards stolen from their cardholders or lost by them account for 23% of
  all card frauds. Often, cards are stolen from the workplace, gym, and
  unattended vehicles

• 3. No-Card Fraud
      Comprises 10% of all the losses and is completed without the physical
  card in hand. This can happen by giving your credit card information on
  the phone to shady telemarketers and deceptive Internet sites that are
  promoting the sales of their non-existent goods and services.
• 4.Non-Receipt Fraud
      Is responsible for 7% of all losses. It occurs
  when new or replaced cards mailed by your card
  company are stolen during the process of being
  mailed.

• 5.Identity Theft Fraud
        Accounts for 4% of all losses, and occurs
  when criminals apply for a card using someone
  else’ identity and information
Case Study
• In what is seen as a problem that could
  affect the aam aadmi, estimates show
  that Rs 8.2 crore is lost annually in India
  due to credit card fraud. From Kumar
  Mangalam Birla to the aam
  aadmi, there have been all sorts of
  victims.
• Ram Shanker Shukla from Lucknow got
  the biggest surprise when he recieved
  SMS alerts saying Rs 20,000 were
  deducted from his bank account and
  that too, to pay utility bills in Delhi and
  Jaipur. By the time he realised it, Shukla
  had become the latest victim of online
  fraud.
• "It must be the job of a hacker because I have
  never used a public computer nor have I shared
  the financial details of my card with anyone,"
  Shukla said.
• Not just Shukla, recently, industrialist Kumar
  Mangalam Birla's credit card was reportedly
  cloned and used to make a purchases worth Rs
  2.8 lakh in Bangalore, while Birla was in Mumbai.
• The crime isn't that difficult to pull off. The first
  way is by cloning or skimming your credit
  card, where all the details are obtained through a
  pager-sized scanner and copied on to a
  counterfeit card. Often, this is done with the help
  of a bartender or a salesperson.
Know your Card well
Understanding of root cause:
Save Yourself!!
DOs                                           DON’Ts
If you lose your credit card, please report   Please do not disclose your Credit Card
the loss immediately.                         Number/ATM PIN to anyone.
When you dispose of a card at the time of Please do not hand over the card to
renewal/upgradation, please make sure     anyone, even if he/she claims to
to cut it diagonally before disposal.     represent the Bank.
Please keep your card in a safe place.        Never get carried away by strangers who
Treat it as carefully as you would treat      try to help you use the ATM machine.
your cash.
Please ensure the card is swiped in your      Please do not write the ATM PIN on the
presence.                                     card or on a paper which you carry along
                                              with the card.
Please make sure you conduct any ATM          Hand over your phone with activated
transaction in complete privacy. If your      banking services to anybody.
card is held back by the ATM, please
inform the concerned Call Center/Branch
personnel immediately.
Before you use an ATM, please ensure
that there are no strange objects in the
insertion panel of the ATM. Please
remember to take your Debit/Credit Card
back after completing your ATM
transaction.

If you spot any suspicious looking people
at or around any ATM, please inform the
security guard immediately.


Please change your ATM PIN once every 3
months.

More Related Content

What's hot

Mobile security issues & frauds in India
Mobile security issues & frauds in IndiaMobile security issues & frauds in India
Mobile security issues & frauds in IndiaYogesh Lolge
 
Skimming: Review of Credit & Debit Card Fraud
Skimming: Review of Credit & Debit Card FraudSkimming: Review of Credit & Debit Card Fraud
Skimming: Review of Credit & Debit Card FraudJason Sookram
 
Atm frauds
Atm fraudsAtm frauds
Atm fraudsGPERI
 
Cyber crime types
Cyber crime typesCyber crime types
Cyber crime typeskiran yadav
 
Credit card fraud detection pptx (1) (1)
Credit card fraud detection pptx (1) (1)Credit card fraud detection pptx (1) (1)
Credit card fraud detection pptx (1) (1)ajmal anbu
 
Cyber Crime and Prevention Tips
Cyber Crime and Prevention TipsCyber Crime and Prevention Tips
Cyber Crime and Prevention TipsTayyab Farooq
 
Credit card fraud detection
Credit card fraud detectionCredit card fraud detection
Credit card fraud detectionvineeta vineeta
 
Analysis of-credit-card-fault-detection
Analysis of-credit-card-fault-detectionAnalysis of-credit-card-fault-detection
Analysis of-credit-card-fault-detectionJustluk Luk
 
Unified payment interface and its security
Unified payment interface and its security Unified payment interface and its security
Unified payment interface and its security Akshay Dixit
 
Cyber Crime and a Case Study
Cyber Crime and a Case StudyCyber Crime and a Case Study
Cyber Crime and a Case StudyPratham Jaiswal
 
Cybercrime And Cyber forensics
Cybercrime And  Cyber forensics Cybercrime And  Cyber forensics
Cybercrime And Cyber forensics sunanditaAnand
 
E crime thesis Cyber Crime and its several types
E crime thesis  Cyber Crime and its several typesE crime thesis  Cyber Crime and its several types
E crime thesis Cyber Crime and its several typesAssignment Studio
 
How to identify credit card fraud
How to identify credit card fraudHow to identify credit card fraud
How to identify credit card fraudHenley Walls
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentationSomya Johri
 

What's hot (20)

Mobile security issues & frauds in India
Mobile security issues & frauds in IndiaMobile security issues & frauds in India
Mobile security issues & frauds in India
 
Skimming: Review of Credit & Debit Card Fraud
Skimming: Review of Credit & Debit Card FraudSkimming: Review of Credit & Debit Card Fraud
Skimming: Review of Credit & Debit Card Fraud
 
Atm frauds
Atm fraudsAtm frauds
Atm frauds
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Electronic payment by ahmad
Electronic payment by ahmadElectronic payment by ahmad
Electronic payment by ahmad
 
Credit card fraud
Credit card fraudCredit card fraud
Credit card fraud
 
ELECTRONIC FRAUD TACTICS
ELECTRONIC FRAUD TACTICS ELECTRONIC FRAUD TACTICS
ELECTRONIC FRAUD TACTICS
 
Cyber crime types
Cyber crime typesCyber crime types
Cyber crime types
 
Credit card fraud detection pptx (1) (1)
Credit card fraud detection pptx (1) (1)Credit card fraud detection pptx (1) (1)
Credit card fraud detection pptx (1) (1)
 
Digital Signature ppt
Digital Signature pptDigital Signature ppt
Digital Signature ppt
 
Credit Card Frauds
Credit Card FraudsCredit Card Frauds
Credit Card Frauds
 
Cyber Crime and Prevention Tips
Cyber Crime and Prevention TipsCyber Crime and Prevention Tips
Cyber Crime and Prevention Tips
 
Credit card fraud detection
Credit card fraud detectionCredit card fraud detection
Credit card fraud detection
 
Analysis of-credit-card-fault-detection
Analysis of-credit-card-fault-detectionAnalysis of-credit-card-fault-detection
Analysis of-credit-card-fault-detection
 
Unified payment interface and its security
Unified payment interface and its security Unified payment interface and its security
Unified payment interface and its security
 
Cyber Crime and a Case Study
Cyber Crime and a Case StudyCyber Crime and a Case Study
Cyber Crime and a Case Study
 
Cybercrime And Cyber forensics
Cybercrime And  Cyber forensics Cybercrime And  Cyber forensics
Cybercrime And Cyber forensics
 
E crime thesis Cyber Crime and its several types
E crime thesis  Cyber Crime and its several typesE crime thesis  Cyber Crime and its several types
E crime thesis Cyber Crime and its several types
 
How to identify credit card fraud
How to identify credit card fraudHow to identify credit card fraud
How to identify credit card fraud
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentation
 

Viewers also liked

Credit Card Fraud 97
Credit Card Fraud 97Credit Card Fraud 97
Credit Card Fraud 97alessio d
 
Example-Dependent Cost-Sensitive Credit Card Fraud Detection
Example-Dependent Cost-Sensitive Credit Card Fraud DetectionExample-Dependent Cost-Sensitive Credit Card Fraud Detection
Example-Dependent Cost-Sensitive Credit Card Fraud DetectionAlejandro Correa Bahnsen, PhD
 
Mac os installation and Hardware Report
Mac os installation and Hardware ReportMac os installation and Hardware Report
Mac os installation and Hardware ReportPratik Vyas
 
PhD thesis presentation 2012
PhD thesis presentation 2012PhD thesis presentation 2012
PhD thesis presentation 2012vsharma78
 
Lee Clark 7th June 2010
Lee Clark 7th June 2010Lee Clark 7th June 2010
Lee Clark 7th June 2010leewclark
 
아름다운+이별 김건모
아름다운+이별 김건모아름다운+이별 김건모
아름다운+이별 김건모Soo Jeong Cheong
 
Пространственно-распределенная мультикластерная вычислительная система: архит...
Пространственно-распределенная мультикластерная вычислительная система: архит...Пространственно-распределенная мультикластерная вычислительная система: архит...
Пространственно-распределенная мультикластерная вычислительная система: архит...Mikhail Kurnosov
 
Linux Installation And Shamba Server
Linux Installation And Shamba ServerLinux Installation And Shamba Server
Linux Installation And Shamba ServerMayur Verma
 
Almoços Convívio Cerberus
Almoços Convívio CerberusAlmoços Convívio Cerberus
Almoços Convívio CerberusCerberus Pt
 
DSS ITSEC 2013 Conference 07.11.2013 - Accellion - The Secure File-Sharing P...
DSS ITSEC 2013 Conference 07.11.2013  - Accellion - The Secure File-Sharing P...DSS ITSEC 2013 Conference 07.11.2013  - Accellion - The Secure File-Sharing P...
DSS ITSEC 2013 Conference 07.11.2013 - Accellion - The Secure File-Sharing P...Andris Soroka
 
An Introduction To Linux Development Environment
An Introduction To Linux Development EnvironmentAn Introduction To Linux Development Environment
An Introduction To Linux Development EnvironmentS. M. Hossein Hamidi
 
Introducción a la administración f08
Introducción a la administración f08Introducción a la administración f08
Introducción a la administración f08Skepper63
 

Viewers also liked (20)

Credit Card Fraud 97
Credit Card Fraud 97Credit Card Fraud 97
Credit Card Fraud 97
 
Credit card fraud
Credit card fraudCredit card fraud
Credit card fraud
 
Example-Dependent Cost-Sensitive Credit Card Fraud Detection
Example-Dependent Cost-Sensitive Credit Card Fraud DetectionExample-Dependent Cost-Sensitive Credit Card Fraud Detection
Example-Dependent Cost-Sensitive Credit Card Fraud Detection
 
Jaba sat explorer-710
Jaba sat explorer-710Jaba sat explorer-710
Jaba sat explorer-710
 
Mac os installation and Hardware Report
Mac os installation and Hardware ReportMac os installation and Hardware Report
Mac os installation and Hardware Report
 
PhD thesis presentation 2012
PhD thesis presentation 2012PhD thesis presentation 2012
PhD thesis presentation 2012
 
Lee Clark 7th June 2010
Lee Clark 7th June 2010Lee Clark 7th June 2010
Lee Clark 7th June 2010
 
아름다운+이별 김건모
아름다운+이별 김건모아름다운+이별 김건모
아름다운+이별 김건모
 
Пространственно-распределенная мультикластерная вычислительная система: архит...
Пространственно-распределенная мультикластерная вычислительная система: архит...Пространственно-распределенная мультикластерная вычислительная система: архит...
Пространственно-распределенная мультикластерная вычислительная система: архит...
 
Linux Installation And Shamba Server
Linux Installation And Shamba ServerLinux Installation And Shamba Server
Linux Installation And Shamba Server
 
Sp ws1 ulrich teichler
Sp ws1 ulrich teichlerSp ws1 ulrich teichler
Sp ws1 ulrich teichler
 
Finding Time to Study for the CIH Exam
Finding Time to Study for the CIH ExamFinding Time to Study for the CIH Exam
Finding Time to Study for the CIH Exam
 
Almoços Convívio Cerberus
Almoços Convívio CerberusAlmoços Convívio Cerberus
Almoços Convívio Cerberus
 
cIHMS
cIHMScIHMS
cIHMS
 
DSS ITSEC 2013 Conference 07.11.2013 - Accellion - The Secure File-Sharing P...
DSS ITSEC 2013 Conference 07.11.2013  - Accellion - The Secure File-Sharing P...DSS ITSEC 2013 Conference 07.11.2013  - Accellion - The Secure File-Sharing P...
DSS ITSEC 2013 Conference 07.11.2013 - Accellion - The Secure File-Sharing P...
 
An Introduction To Linux Development Environment
An Introduction To Linux Development EnvironmentAn Introduction To Linux Development Environment
An Introduction To Linux Development Environment
 
QIP 2012
QIP 2012QIP 2012
QIP 2012
 
Lecture 13
Lecture 13Lecture 13
Lecture 13
 
Introducción a la administración f08
Introducción a la administración f08Introducción a la administración f08
Introducción a la administración f08
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 

Similar to Credit card frauds

creditcardfrauds-120711055059-phpapp01.pptx
creditcardfrauds-120711055059-phpapp01.pptxcreditcardfrauds-120711055059-phpapp01.pptx
creditcardfrauds-120711055059-phpapp01.pptxMerhabaResturant
 
Identity Fraud Precautions
Identity Fraud PrecautionsIdentity Fraud Precautions
Identity Fraud PrecautionsTwinVasion
 
Identity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullyingIdentity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullyingMatt Smith
 
How Credit Card Fraud Happens and How You Can Protect Yourself
How Credit Card Fraud Happens and How You Can Protect YourselfHow Credit Card Fraud Happens and How You Can Protect Yourself
How Credit Card Fraud Happens and How You Can Protect YourselfDigital EYE Media
 
Identity Fraud Precautions
Identity Fraud PrecautionsIdentity Fraud Precautions
Identity Fraud Precautionsquentinz52
 
Identity Fraud Precautions
Identity Fraud PrecautionsIdentity Fraud Precautions
Identity Fraud Precautionsquentinz52
 
Identity Theft nigerian fraud cross border fraud
Identity Theft nigerian fraud cross border fraudIdentity Theft nigerian fraud cross border fraud
Identity Theft nigerian fraud cross border fraudMatt Smith
 
Identity Fraud Precautions
Identity Fraud PrecautionsIdentity Fraud Precautions
Identity Fraud Precautionstheresa34
 
ATM Skimming in the Caribbean
ATM Skimming in the CaribbeanATM Skimming in the Caribbean
ATM Skimming in the CaribbeanGiovanni James
 
Fraudulent in plastic currency
Fraudulent in plastic currencyFraudulent in plastic currency
Fraudulent in plastic currencyGopika Babu
 
CNP Payment Fraud and its Affect on Gift Cards
CNP Payment Fraud and its Affect on Gift CardsCNP Payment Fraud and its Affect on Gift Cards
CNP Payment Fraud and its Affect on Gift CardsChristopher Uriarte
 
AN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MINING
AN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MININGAN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MINING
AN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MININGijmnct
 
AN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MINING
AN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MININGAN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MINING
AN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MININGijmnct
 

Similar to Credit card frauds (20)

creditcardfrauds-120711055059-phpapp01.pptx
creditcardfrauds-120711055059-phpapp01.pptxcreditcardfrauds-120711055059-phpapp01.pptx
creditcardfrauds-120711055059-phpapp01.pptx
 
Identity Fraud Precautions
Identity Fraud PrecautionsIdentity Fraud Precautions
Identity Fraud Precautions
 
ATM.pdf.pptx
ATM.pdf.pptxATM.pdf.pptx
ATM.pdf.pptx
 
Identity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullyingIdentity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullying
 
How Credit Card Fraud Happens and How You Can Protect Yourself
How Credit Card Fraud Happens and How You Can Protect YourselfHow Credit Card Fraud Happens and How You Can Protect Yourself
How Credit Card Fraud Happens and How You Can Protect Yourself
 
Atm theft
Atm theftAtm theft
Atm theft
 
Identity Fraud Precautions
Identity Fraud PrecautionsIdentity Fraud Precautions
Identity Fraud Precautions
 
Identity Fraud Precautions
Identity Fraud PrecautionsIdentity Fraud Precautions
Identity Fraud Precautions
 
Identity Theft nigerian fraud cross border fraud
Identity Theft nigerian fraud cross border fraudIdentity Theft nigerian fraud cross border fraud
Identity Theft nigerian fraud cross border fraud
 
Identity Fraud Precautions
Identity Fraud PrecautionsIdentity Fraud Precautions
Identity Fraud Precautions
 
Credit Card Fraud
Credit Card FraudCredit Card Fraud
Credit Card Fraud
 
ATM Skimming in the Caribbean
ATM Skimming in the CaribbeanATM Skimming in the Caribbean
ATM Skimming in the Caribbean
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Identity Theft: The Other You
Identity Theft: The Other YouIdentity Theft: The Other You
Identity Theft: The Other You
 
NR ATM Frauds.pptx
NR ATM Frauds.pptxNR ATM Frauds.pptx
NR ATM Frauds.pptx
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Fraudulent in plastic currency
Fraudulent in plastic currencyFraudulent in plastic currency
Fraudulent in plastic currency
 
CNP Payment Fraud and its Affect on Gift Cards
CNP Payment Fraud and its Affect on Gift CardsCNP Payment Fraud and its Affect on Gift Cards
CNP Payment Fraud and its Affect on Gift Cards
 
AN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MINING
AN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MININGAN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MINING
AN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MINING
 
AN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MINING
AN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MININGAN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MINING
AN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MINING
 

Recently uploaded

Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Lviv Startup Club
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Centuryrwgiffor
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Roland Driesen
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876dlhescort
 
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 DelhiCall Girls in Delhi
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...lizamodels9
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsMichael W. Hawkins
 
Understanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key InsightsUnderstanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key Insightsseri bangash
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsP&CO
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...Aggregage
 

Recently uploaded (20)

Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael Hawkins
 
Understanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key InsightsUnderstanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key Insights
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 

Credit card frauds

  • 1. Credit Card Frauds Modern Day Pick pocketing…
  • 2. Definition and Meaning • Credit card fraud is a wide- ranging term for theft and fraud committed using a credit card or any similar payment mechanism as a fraudulent source of funds in a transaction. • The purpose may be to obtain goods without paying, or to obtain unauthorized funds from an account. • Credit card fraud is also an adjunct to identity theft.
  • 3. Hard Facts • "Lost or stolen wallets, checkbooks and credit and debit cards" made up 43 percent of all ID theft incidents in which the "method of access" was known. (Source: Javelin Strategy & Research, February 2009 study.) • Credit and debit card fraud is the No. 1 fear of Americans in the midst of the global financial crisis. Concern about fraud supersedes that of terrorism, computer and health viruses and personal safety. (Source: Unisys Security Index: United States, March 2009) • Arizona leads the nation in identity theft complaints per 100,000 people. In 2008, the state had 149 complaints about ID theft per 100,000 people. California (139.1), Florida (133.3), Texas (130.3) and Nevada (126.0) rounded out the top five. (Source: Federal Trade Commission, February 2009 survey)
  • 4. • South Dakota has the fewest identity theft complaints per 100,000 people in the nation. In 2008, the state had 33.8 complaints about ID theft per 100,000 people. North Dakota (35.7), Iowa (44.9), Montana (46.5) and Wyoming (46.9) rounded out the bottom five. (Source: Federal Trade Commission, February 2009 survey) • Brownsville-Harlingen, Texas, is the metropolitan area with the largest number of ID theft complaints per 100,000 people. In 2008, the area had 366.8 complaints per 100,000 people. Napa, Calif., was second with 351.3. (Source: Federal Trade Commission, February 2009 survey)
  • 5.
  • 6. Types of Frauds • 1. Counterfeit credit card Makes up for 37% of all funds lost through credit card frauds. To make fake cards criminals use the newest technology to “skim” information contained on magnetic stripes of cards and to pass security features such as holograms • 2. Lost or Stolen Cards Cards stolen from their cardholders or lost by them account for 23% of all card frauds. Often, cards are stolen from the workplace, gym, and unattended vehicles • 3. No-Card Fraud Comprises 10% of all the losses and is completed without the physical card in hand. This can happen by giving your credit card information on the phone to shady telemarketers and deceptive Internet sites that are promoting the sales of their non-existent goods and services.
  • 7. • 4.Non-Receipt Fraud Is responsible for 7% of all losses. It occurs when new or replaced cards mailed by your card company are stolen during the process of being mailed. • 5.Identity Theft Fraud Accounts for 4% of all losses, and occurs when criminals apply for a card using someone else’ identity and information
  • 8. Case Study • In what is seen as a problem that could affect the aam aadmi, estimates show that Rs 8.2 crore is lost annually in India due to credit card fraud. From Kumar Mangalam Birla to the aam aadmi, there have been all sorts of victims. • Ram Shanker Shukla from Lucknow got the biggest surprise when he recieved SMS alerts saying Rs 20,000 were deducted from his bank account and that too, to pay utility bills in Delhi and Jaipur. By the time he realised it, Shukla had become the latest victim of online fraud.
  • 9. • "It must be the job of a hacker because I have never used a public computer nor have I shared the financial details of my card with anyone," Shukla said. • Not just Shukla, recently, industrialist Kumar Mangalam Birla's credit card was reportedly cloned and used to make a purchases worth Rs 2.8 lakh in Bangalore, while Birla was in Mumbai. • The crime isn't that difficult to pull off. The first way is by cloning or skimming your credit card, where all the details are obtained through a pager-sized scanner and copied on to a counterfeit card. Often, this is done with the help of a bartender or a salesperson.
  • 12.
  • 13. Save Yourself!! DOs DON’Ts If you lose your credit card, please report Please do not disclose your Credit Card the loss immediately. Number/ATM PIN to anyone. When you dispose of a card at the time of Please do not hand over the card to renewal/upgradation, please make sure anyone, even if he/she claims to to cut it diagonally before disposal. represent the Bank. Please keep your card in a safe place. Never get carried away by strangers who Treat it as carefully as you would treat try to help you use the ATM machine. your cash. Please ensure the card is swiped in your Please do not write the ATM PIN on the presence. card or on a paper which you carry along with the card. Please make sure you conduct any ATM Hand over your phone with activated transaction in complete privacy. If your banking services to anybody. card is held back by the ATM, please inform the concerned Call Center/Branch personnel immediately.
  • 14. Before you use an ATM, please ensure that there are no strange objects in the insertion panel of the ATM. Please remember to take your Debit/Credit Card back after completing your ATM transaction. If you spot any suspicious looking people at or around any ATM, please inform the security guard immediately. Please change your ATM PIN once every 3 months.