SlideShare a Scribd company logo
page 1R S A M O N T H LY F R A U D R E P O R T
F R A U D R E P O R T
E-COMMERCE FRAUD TRENDS 2014:
SECURING THE ONLINE SHOPPING CART
July 2014
The U.S payment card industry is undergoing a transformation. With the looming upgrade
to the EMV standard, it is expected that the U.S. will experience a significant increase in
card-not-present (CNP) fraud as have most other countries that have embraced it.
According to leading research firm Aite Group, CNP fraud will account for about $2.9
billion in fraud losses to U.S. issuers this year. However, by 2018 when about 98% of
payment cards in the U.S. will be enabled with the EMV capability, that number is
expected to more than double to $6.4 billion in losses1
.
That’s in the future. But what are we seeing today? RSA has gathered insight from the
billions of e-commerce transactions we secure each year, and here are some of the trends
we are seeing in 20142
.
TOP MERCHANT CATEGORIES FOR E-COMMERCE TRANSACTIONS
Following are the top ten merchant categories for e-commerce transactions:
Airlines (39%)
General Retail (15%)
Computers/Electronics (12%)
Ticketing (10%)
Telecom (mobile phones, apps, etc) (5%)
Money transfer (4%)
Automotive (3%)
Toys (3%)
Clothing (3%)
Restaurants and dining (1%)
1 Aite Group, “Card Not Present Fraud in a Post-EMV Environment: Combating the Fraud Spike,” June 2014.
2 RSA Adaptive Authentication for eCommerce, Jan – June 2014, U.S. only
page 2R S A M O N T H LY F R A U D R E P O R T
AVERAGE VALUE OF FRAUD TRANSACTIONS
While there are over 100 parameters that RSA’s risk-based authentication system looks at
in determining whether an e-commerce transaction is genuine or suspected fraud, one of
the leading indicators is the average value of a transaction. The chart below shows the
average value of legitimate transactions vs. fraudulent transactions, with the fraudulent
transactions most always bearing a significantly higher value than an average legitimate
transaction. For example, an average jewelry purchase online is $307 while an average
fraudulent purchase in the same category is $1,300, more than four times that value.
0
500
1000
1500
2000
2500
TOP MERCHANT CATEGORIES AFFECTED BY FRAUD
As consumers, we like to indulge once in a while with a random getaway, new electronic
gadget, or the latest fashion trend as seen by the average value of e-commerce
transactions. But cybercriminals find it even more enjoyable to use stolen payment cards
to indulge themselves with vacations, cash, and computers – and even to pay their
monthly household bills. The following chart represents the top merchants affected by
fraud transactions.
Source:RSAAnti-FraudCommandCenter
AirlinesPharmacy
MoneytransferAirlines
Computers/Electronics
Automotive
GeneralRetail
Jewelry
Clothing
Billpayments
Travel
Appliances
Gaming
Clothing
Toys
Travel
Jewelry
Insurance
Billpayments
Charity
Utilities
Average value of transaction
Average value of fraud
0
10
20
30
40
50
46%
264
1830
659
1480
331
1320
307
1300
931
1180
674
1140
495
1040
897
1000
585
702
104
581
467
552
16%
13%
9%
5%
1% 1% 1% 1% 1%
page 3R S A M O N T H LY F R A U D R E P O R T
CONCLUSION
In 2013, one out of every seven payment cards in the U.S. was exposed in a data breach3
.
With hundreds of millions of payment cards in use and circulation in the U.S., this is
quite noteworthy. Rapid changes are taking place beyond embracing the EMV standard.
In October, 2015, changes will go into effect modifying the liability rules concerning card
purchases for both issuers and merchants. Long overdue in the U.S., EMV adoption is
going to invoke rapid changes in the payment card landscape, and financial institutions
and retailers must be prepared to make the investments in technology to manage fraud
risk in e-commerce.
3 Discover Financial Services’ Pulse ATM Network
page 4R S A M O N T H LY F R A U D R E P O R T
Phishing Attacks per Month
RSA identified 55,813 phishing attacks in
June, marking a 43% increase from May.
Based on this figure, RSA estimates
phishing cost global organizations $476
million in losses in June.
US Bank Types Attacked
U.S. regional banks have consistently been
hit with 30 – 35% of phishing volume over
the last few months, targeted by about one
out of every three attacks.
Top Countries by Attack Volume
While the U.S. saw a 16% decline in
attacks, it still remained the most targeted
country in June with 57% of phishing
volume. Other top targeted countries
include the Netherlands, UK, Malaysia
and South Africa.
55,813
Attacks
Credit Unions
Regional
National
57%
7%
6%
5%
UK
Malaysia
Netherlands
U.S.
JULY 2014
Source: RSA Anti-Fraud Command Center
page 5R S A M O N T H LY F R A U D R E P O R T
Top Countries by Attacked Brands
U.S. and U.K brands were the most
affected by phishing in June, targeted
by 40% of attacks. Brands in India, the
Netherlands, and Canada were collectively
targeted by 16% of phishing attacks.
Top Hosting Countries
The number of phishing attacks hosted in
the U.S. remained relatively the same at
43% in June. Germany continues to be the
second top hosting country.
Top Merchant Categories Affected by Fraud
In the first half of 2014, the merchant
category most affected by e-commerce
fraud, with 46% of fraudulent transactions,
was airlines and travel. The second most
affected merchant category, with 16% of
fraudulent transactions, was money
payment processors.
11%
U.S.
UK
28%
5% 4%7%
43%
GLOBAL PHISHING LOSSES
JUNE 2014
46%Airlines
13%Computers/Electronics
16%Money transfer
www.emc.com/rsa
CONTACT US
To learn more about how RSA products, services, and solutions help solve your
business and IT challenges contact your local representative or authorized reseller –
or visit us at www.emc.com/rsa
©2014 EMC Corporation. EMC, RSA, the RSA logo, and FraudAction are trademarks or registered trademarks of EMC
Corporation in the U.S. and/or other countries. All other trademarks mentioned are the property of their respective
holders. JULY RPT 0714

More Related Content

What's hot

2015 CEB Tower Group Mar2015
2015 CEB Tower Group Mar20152015 CEB Tower Group Mar2015
2015 CEB Tower Group Mar2015
Ajay Alex
 
Product Brochure_Fraud in Global B2C E-Commerce and Online Payment 2014
Product Brochure_Fraud in Global B2C E-Commerce and Online Payment 2014Product Brochure_Fraud in Global B2C E-Commerce and Online Payment 2014
Product Brochure_Fraud in Global B2C E-Commerce and Online Payment 2014
yStats.com
 
5. gan plc (29 june 2019)
5. gan plc (29 june 2019)5. gan plc (29 june 2019)
5. gan plc (29 june 2019)
Dennis Chan, CAIA, IBFQ
 
Secure Payments: How Card Issuers and Merchants Can Stay Ahead of Fraudsters
Secure Payments: How Card Issuers and Merchants Can Stay Ahead of FraudstersSecure Payments: How Card Issuers and Merchants Can Stay Ahead of Fraudsters
Secure Payments: How Card Issuers and Merchants Can Stay Ahead of Fraudsters
Cognizant
 
Driving Payment Innovation - Know Your Enemy
Driving Payment Innovation - Know Your EnemyDriving Payment Innovation - Know Your Enemy
Driving Payment Innovation - Know Your Enemy
First Atlantic Commerce
 
Fraud and risk communication
Fraud and risk communicationFraud and risk communication
Fraud and risk communication
Rosetta
 
Fraud-Fighting Trends 2017
Fraud-Fighting Trends 2017Fraud-Fighting Trends 2017
Fraud-Fighting Trends 2017
Sarah Beldo
 
Regulated Online Gambling: Building A Stronger New Jersey
Regulated Online Gambling: Building A Stronger New JerseyRegulated Online Gambling: Building A Stronger New Jersey
Regulated Online Gambling: Building A Stronger New Jersey
Chris Grove
 
Big data analytical driven fraud detection for finance; banks and insurance
Big data analytical driven fraud detection for finance; banks and insuranceBig data analytical driven fraud detection for finance; banks and insurance
Big data analytical driven fraud detection for finance; banks and insurance
Syed Danish Ali
 
5 emerging opportunities for travel businesses
5 emerging opportunities for travel businesses5 emerging opportunities for travel businesses
5 emerging opportunities for travel businesses
TTC
 
What We Learned Working with Forter
What We Learned Working with ForterWhat We Learned Working with Forter
What We Learned Working with Forter
Simplifilm
 
PayPal Cross Border Consumer Research 2016
PayPal Cross Border Consumer Research 2016PayPal Cross Border Consumer Research 2016
PayPal Cross Border Consumer Research 2016
Ipsos UK
 
FRISS_Insurance fraud report 2020
FRISS_Insurance fraud report 2020 FRISS_Insurance fraud report 2020
FRISS_Insurance fraud report 2020
FinTech Belgium
 
Webinar: How can OTAs in EU Navigate the Impact of #COVID19?
Webinar: How can OTAs in EU Navigate the Impact of #COVID19?Webinar: How can OTAs in EU Navigate the Impact of #COVID19?
Webinar: How can OTAs in EU Navigate the Impact of #COVID19?
RateGain®
 
Latam 2020 - Internet & Mobile Market
Latam 2020 - Internet & Mobile MarketLatam 2020 - Internet & Mobile Market
Latam 2020 - Internet & Mobile Market
RecargaPay
 
Australia's gambling statistics - sports-betting
Australia's gambling statistics - sports-bettingAustralia's gambling statistics - sports-betting
Australia's gambling statistics - sports-betting
Alan Pedley
 
Webinar : Car Rentals - Driving Towards a Better Tomorrow
Webinar : Car Rentals - Driving Towards a Better TomorrowWebinar : Car Rentals - Driving Towards a Better Tomorrow
Webinar : Car Rentals - Driving Towards a Better Tomorrow
RateGain®
 
Webinar: Navigating the Way Ahead for Corporate Travel beyond COVID19
Webinar: Navigating the Way Ahead for Corporate Travel beyond COVID19Webinar: Navigating the Way Ahead for Corporate Travel beyond COVID19
Webinar: Navigating the Way Ahead for Corporate Travel beyond COVID19
RateGain®
 
Tackling ad fraud in 2016
Tackling ad fraud in   2016Tackling ad fraud in   2016
Tackling ad fraud in 2016
9Media Online
 

What's hot (19)

2015 CEB Tower Group Mar2015
2015 CEB Tower Group Mar20152015 CEB Tower Group Mar2015
2015 CEB Tower Group Mar2015
 
Product Brochure_Fraud in Global B2C E-Commerce and Online Payment 2014
Product Brochure_Fraud in Global B2C E-Commerce and Online Payment 2014Product Brochure_Fraud in Global B2C E-Commerce and Online Payment 2014
Product Brochure_Fraud in Global B2C E-Commerce and Online Payment 2014
 
5. gan plc (29 june 2019)
5. gan plc (29 june 2019)5. gan plc (29 june 2019)
5. gan plc (29 june 2019)
 
Secure Payments: How Card Issuers and Merchants Can Stay Ahead of Fraudsters
Secure Payments: How Card Issuers and Merchants Can Stay Ahead of FraudstersSecure Payments: How Card Issuers and Merchants Can Stay Ahead of Fraudsters
Secure Payments: How Card Issuers and Merchants Can Stay Ahead of Fraudsters
 
Driving Payment Innovation - Know Your Enemy
Driving Payment Innovation - Know Your EnemyDriving Payment Innovation - Know Your Enemy
Driving Payment Innovation - Know Your Enemy
 
Fraud and risk communication
Fraud and risk communicationFraud and risk communication
Fraud and risk communication
 
Fraud-Fighting Trends 2017
Fraud-Fighting Trends 2017Fraud-Fighting Trends 2017
Fraud-Fighting Trends 2017
 
Regulated Online Gambling: Building A Stronger New Jersey
Regulated Online Gambling: Building A Stronger New JerseyRegulated Online Gambling: Building A Stronger New Jersey
Regulated Online Gambling: Building A Stronger New Jersey
 
Big data analytical driven fraud detection for finance; banks and insurance
Big data analytical driven fraud detection for finance; banks and insuranceBig data analytical driven fraud detection for finance; banks and insurance
Big data analytical driven fraud detection for finance; banks and insurance
 
5 emerging opportunities for travel businesses
5 emerging opportunities for travel businesses5 emerging opportunities for travel businesses
5 emerging opportunities for travel businesses
 
What We Learned Working with Forter
What We Learned Working with ForterWhat We Learned Working with Forter
What We Learned Working with Forter
 
PayPal Cross Border Consumer Research 2016
PayPal Cross Border Consumer Research 2016PayPal Cross Border Consumer Research 2016
PayPal Cross Border Consumer Research 2016
 
FRISS_Insurance fraud report 2020
FRISS_Insurance fraud report 2020 FRISS_Insurance fraud report 2020
FRISS_Insurance fraud report 2020
 
Webinar: How can OTAs in EU Navigate the Impact of #COVID19?
Webinar: How can OTAs in EU Navigate the Impact of #COVID19?Webinar: How can OTAs in EU Navigate the Impact of #COVID19?
Webinar: How can OTAs in EU Navigate the Impact of #COVID19?
 
Latam 2020 - Internet & Mobile Market
Latam 2020 - Internet & Mobile MarketLatam 2020 - Internet & Mobile Market
Latam 2020 - Internet & Mobile Market
 
Australia's gambling statistics - sports-betting
Australia's gambling statistics - sports-bettingAustralia's gambling statistics - sports-betting
Australia's gambling statistics - sports-betting
 
Webinar : Car Rentals - Driving Towards a Better Tomorrow
Webinar : Car Rentals - Driving Towards a Better TomorrowWebinar : Car Rentals - Driving Towards a Better Tomorrow
Webinar : Car Rentals - Driving Towards a Better Tomorrow
 
Webinar: Navigating the Way Ahead for Corporate Travel beyond COVID19
Webinar: Navigating the Way Ahead for Corporate Travel beyond COVID19Webinar: Navigating the Way Ahead for Corporate Travel beyond COVID19
Webinar: Navigating the Way Ahead for Corporate Travel beyond COVID19
 
Tackling ad fraud in 2016
Tackling ad fraud in   2016Tackling ad fraud in   2016
Tackling ad fraud in 2016
 

Viewers also liked

Block culture of nacirema
Block culture of naciremaBlock culture of nacirema
Block culture of naciremaTravis Klein
 
Dia de la_democracia
Dia de la_democraciaDia de la_democracia
Dia de la_democraciaLauma1416
 
Mit2 092 f09_lec11
Mit2 092 f09_lec11Mit2 092 f09_lec11
Mit2 092 f09_lec11
Rahman Hakim
 
PyCon PL 2014 executable api
PyCon PL 2014   executable apiPyCon PL 2014   executable api
PyCon PL 2014 executable api
Wojtek Erbetowski
 
Fri papal response to luther
Fri papal response to lutherFri papal response to luther
Fri papal response to lutherTravis Klein
 
SAP HANA in an EMC Private Cloud
SAP HANA in an EMC Private CloudSAP HANA in an EMC Private Cloud
SAP HANA in an EMC Private Cloud
EMC
 
אחריות תאגידית במדיה חברתית
אחריות תאגידית במדיה חברתיתאחריות תאגידית במדיה חברתית
אחריות תאגידית במדיה חברתית
Shirley Kantor
 
White Paper: Advanced Cyber Analytics with Greenplum Database
White Paper: Advanced Cyber Analytics with Greenplum DatabaseWhite Paper: Advanced Cyber Analytics with Greenplum Database
White Paper: Advanced Cyber Analytics with Greenplum Database
EMC
 
Cơ bản về tủ lạnh
Cơ bản về tủ lạnhCơ bản về tủ lạnh
Cơ bản về tủ lạnhmachupilani
 
1 comprensión de oraciones
1 comprensión de oraciones1 comprensión de oraciones
1 comprensión de oracionesIsabel Abanto
 
Tulhuur not 2
Tulhuur not 2Tulhuur not 2
Tulhuur not 2pvsa_8990
 
Informe consulta general criterio
Informe consulta general criterioInforme consulta general criterio
Informe consulta general criterioNathalia Sanchez
 
Mon roman empire lang
Mon roman empire langMon roman empire lang
Mon roman empire lang
Travis Klein
 
Day 7 reconstuction
Day 7 reconstuctionDay 7 reconstuction
Day 7 reconstuctionTravis Klein
 
Intelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityIntelligence-Driven GRC for Security
Intelligence-Driven GRC for Security
EMC
 

Viewers also liked (19)

види таблиць конструктор
види таблиць конструкторвиди таблиць конструктор
види таблиць конструктор
 
Block culture of nacirema
Block culture of naciremaBlock culture of nacirema
Block culture of nacirema
 
Animal power pont
Animal power pontAnimal power pont
Animal power pont
 
Dia de la_democracia
Dia de la_democraciaDia de la_democracia
Dia de la_democracia
 
Mit2 092 f09_lec11
Mit2 092 f09_lec11Mit2 092 f09_lec11
Mit2 092 f09_lec11
 
PyCon PL 2014 executable api
PyCon PL 2014   executable apiPyCon PL 2014   executable api
PyCon PL 2014 executable api
 
Fri papal response to luther
Fri papal response to lutherFri papal response to luther
Fri papal response to luther
 
SAP HANA in an EMC Private Cloud
SAP HANA in an EMC Private CloudSAP HANA in an EMC Private Cloud
SAP HANA in an EMC Private Cloud
 
אחריות תאגידית במדיה חברתית
אחריות תאגידית במדיה חברתיתאחריות תאגידית במדיה חברתית
אחריות תאגידית במדיה חברתית
 
White Paper: Advanced Cyber Analytics with Greenplum Database
White Paper: Advanced Cyber Analytics with Greenplum DatabaseWhite Paper: Advanced Cyber Analytics with Greenplum Database
White Paper: Advanced Cyber Analytics with Greenplum Database
 
Cơ bản về tủ lạnh
Cơ bản về tủ lạnhCơ bản về tủ lạnh
Cơ bản về tủ lạnh
 
1 comprensión de oraciones
1 comprensión de oraciones1 comprensión de oraciones
1 comprensión de oraciones
 
Recording Reccy
Recording ReccyRecording Reccy
Recording Reccy
 
Tulhuur not 2
Tulhuur not 2Tulhuur not 2
Tulhuur not 2
 
Informe consulta general criterio
Informe consulta general criterioInforme consulta general criterio
Informe consulta general criterio
 
Mon roman empire lang
Mon roman empire langMon roman empire lang
Mon roman empire lang
 
Day 7 reconstuction
Day 7 reconstuctionDay 7 reconstuction
Day 7 reconstuction
 
Intelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityIntelligence-Driven GRC for Security
Intelligence-Driven GRC for Security
 
Consulta general
Consulta generalConsulta general
Consulta general
 

Similar to RSA Online Fraud Report - July 2014

CONSUMER PERCEPTIONS ON SECURITY: DO THEY STILL CARE?
CONSUMER PERCEPTIONS  ON SECURITY: DO THEY STILL CARE?CONSUMER PERCEPTIONS  ON SECURITY: DO THEY STILL CARE?
CONSUMER PERCEPTIONS ON SECURITY: DO THEY STILL CARE?
- Mark - Fullbright
 
RSA MONTHLY FRAUD REPORT - September 2014
RSA MONTHLY FRAUD REPORT - September 2014RSA MONTHLY FRAUD REPORT - September 2014
RSA MONTHLY FRAUD REPORT - September 2014
EMC
 
Main Street vs. Wall Street: Who is to Blame for Data Breaches?
Main Street vs. Wall Street: Who is to Blame for Data Breaches?Main Street vs. Wall Street: Who is to Blame for Data Breaches?
Main Street vs. Wall Street: Who is to Blame for Data Breaches?
Brunswick Group
 
TEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docxTEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docx
deanmtaylor1545
 
TEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docxTEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docx
bradburgess22840
 
TEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docxTEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docx
erlindaw
 
Card Not Present (CNP) Fraud in a Post-EMV Environment: Combating the Fraud S...
Card Not Present (CNP) Fraud in a Post-EMV Environment: Combating the Fraud S...Card Not Present (CNP) Fraud in a Post-EMV Environment: Combating the Fraud S...
Card Not Present (CNP) Fraud in a Post-EMV Environment: Combating the Fraud S...
EMC
 
2014 Cybercrime Roundup: The Year of the POS Breach
2014 Cybercrime Roundup: The Year of the POS Breach2014 Cybercrime Roundup: The Year of the POS Breach
2014 Cybercrime Roundup: The Year of the POS Breach
EMC
 
Holiday Season Fraud Forecast
Holiday Season Fraud ForecastHoliday Season Fraud Forecast
Holiday Season Fraud Forecast
Zachary Shaw
 
Eight Months of EMV: Early Fraud Shifts and Trajectory
Eight Months of EMV: Early Fraud Shifts and TrajectoryEight Months of EMV: Early Fraud Shifts and Trajectory
Eight Months of EMV: Early Fraud Shifts and Trajectory
TransUnion
 
RSA Monthly Online Fraud Report -- October 2013
RSA Monthly Online Fraud Report -- October 2013RSA Monthly Online Fraud Report -- October 2013
RSA Monthly Online Fraud Report -- October 2013
EMC
 
Sas wp enterrprise fraud management
Sas wp enterrprise fraud managementSas wp enterrprise fraud management
Sas wp enterrprise fraud management
rkappear
 
Tentacles of fraud
Tentacles of fraud Tentacles of fraud
state-of-fraud-2021.pdf
state-of-fraud-2021.pdfstate-of-fraud-2021.pdf
state-of-fraud-2021.pdf
Syafiq Jamaludin
 
COVID-19 Impact on E-commerce and Payments: Newsflash April 9-15, 2020 by ySt...
COVID-19 Impact on E-commerce and Payments: Newsflash April 9-15, 2020 by ySt...COVID-19 Impact on E-commerce and Payments: Newsflash April 9-15, 2020 by ySt...
COVID-19 Impact on E-commerce and Payments: Newsflash April 9-15, 2020 by ySt...
yStats.com
 
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docxRunning head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
wlynn1
 
Visa report 02.04.16
Visa report 02.04.16Visa report 02.04.16
Visa report 02.04.16
Andrea Casati
 
RSA Monthly Online Fraud Report -- May 2013
RSA Monthly Online Fraud Report -- May 2013RSA Monthly Online Fraud Report -- May 2013
RSA Monthly Online Fraud Report -- May 2013
EMC
 
Ali AlMeshal - The need for a secure & trusted payment - ArmIGF 2015
Ali AlMeshal - The need for a secure & trusted payment - ArmIGF 2015Ali AlMeshal - The need for a secure & trusted payment - ArmIGF 2015
Ali AlMeshal - The need for a secure & trusted payment - ArmIGF 2015
Arm Igf
 
Product Brochure: Fraud And Security In Global Online Payments 2019
Product Brochure: Fraud And Security In Global Online Payments 2019Product Brochure: Fraud And Security In Global Online Payments 2019
Product Brochure: Fraud And Security In Global Online Payments 2019
yStats.com
 

Similar to RSA Online Fraud Report - July 2014 (20)

CONSUMER PERCEPTIONS ON SECURITY: DO THEY STILL CARE?
CONSUMER PERCEPTIONS  ON SECURITY: DO THEY STILL CARE?CONSUMER PERCEPTIONS  ON SECURITY: DO THEY STILL CARE?
CONSUMER PERCEPTIONS ON SECURITY: DO THEY STILL CARE?
 
RSA MONTHLY FRAUD REPORT - September 2014
RSA MONTHLY FRAUD REPORT - September 2014RSA MONTHLY FRAUD REPORT - September 2014
RSA MONTHLY FRAUD REPORT - September 2014
 
Main Street vs. Wall Street: Who is to Blame for Data Breaches?
Main Street vs. Wall Street: Who is to Blame for Data Breaches?Main Street vs. Wall Street: Who is to Blame for Data Breaches?
Main Street vs. Wall Street: Who is to Blame for Data Breaches?
 
TEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docxTEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docx
 
TEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docxTEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docx
 
TEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docxTEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docx
 
Card Not Present (CNP) Fraud in a Post-EMV Environment: Combating the Fraud S...
Card Not Present (CNP) Fraud in a Post-EMV Environment: Combating the Fraud S...Card Not Present (CNP) Fraud in a Post-EMV Environment: Combating the Fraud S...
Card Not Present (CNP) Fraud in a Post-EMV Environment: Combating the Fraud S...
 
2014 Cybercrime Roundup: The Year of the POS Breach
2014 Cybercrime Roundup: The Year of the POS Breach2014 Cybercrime Roundup: The Year of the POS Breach
2014 Cybercrime Roundup: The Year of the POS Breach
 
Holiday Season Fraud Forecast
Holiday Season Fraud ForecastHoliday Season Fraud Forecast
Holiday Season Fraud Forecast
 
Eight Months of EMV: Early Fraud Shifts and Trajectory
Eight Months of EMV: Early Fraud Shifts and TrajectoryEight Months of EMV: Early Fraud Shifts and Trajectory
Eight Months of EMV: Early Fraud Shifts and Trajectory
 
RSA Monthly Online Fraud Report -- October 2013
RSA Monthly Online Fraud Report -- October 2013RSA Monthly Online Fraud Report -- October 2013
RSA Monthly Online Fraud Report -- October 2013
 
Sas wp enterrprise fraud management
Sas wp enterrprise fraud managementSas wp enterrprise fraud management
Sas wp enterrprise fraud management
 
Tentacles of fraud
Tentacles of fraud Tentacles of fraud
Tentacles of fraud
 
state-of-fraud-2021.pdf
state-of-fraud-2021.pdfstate-of-fraud-2021.pdf
state-of-fraud-2021.pdf
 
COVID-19 Impact on E-commerce and Payments: Newsflash April 9-15, 2020 by ySt...
COVID-19 Impact on E-commerce and Payments: Newsflash April 9-15, 2020 by ySt...COVID-19 Impact on E-commerce and Payments: Newsflash April 9-15, 2020 by ySt...
COVID-19 Impact on E-commerce and Payments: Newsflash April 9-15, 2020 by ySt...
 
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docxRunning head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
 
Visa report 02.04.16
Visa report 02.04.16Visa report 02.04.16
Visa report 02.04.16
 
RSA Monthly Online Fraud Report -- May 2013
RSA Monthly Online Fraud Report -- May 2013RSA Monthly Online Fraud Report -- May 2013
RSA Monthly Online Fraud Report -- May 2013
 
Ali AlMeshal - The need for a secure & trusted payment - ArmIGF 2015
Ali AlMeshal - The need for a secure & trusted payment - ArmIGF 2015Ali AlMeshal - The need for a secure & trusted payment - ArmIGF 2015
Ali AlMeshal - The need for a secure & trusted payment - ArmIGF 2015
 
Product Brochure: Fraud And Security In Global Online Payments 2019
Product Brochure: Fraud And Security In Global Online Payments 2019Product Brochure: Fraud And Security In Global Online Payments 2019
Product Brochure: Fraud And Security In Global Online Payments 2019
 

More from EMC

INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDINDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
EMC
 
Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote
EMC
 
EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX
EMC
 
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOTransforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
EMC
 
Citrix ready-webinar-xtremio
Citrix ready-webinar-xtremioCitrix ready-webinar-xtremio
Citrix ready-webinar-xtremio
EMC
 
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC
 
EMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC with Mirantis Openstack
EMC with Mirantis Openstack
EMC
 
Modern infrastructure for business data lake
Modern infrastructure for business data lakeModern infrastructure for business data lake
Modern infrastructure for business data lakeEMC
 
Force Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereForce Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop Elsewhere
EMC
 
Pivotal : Moments in Container History
Pivotal : Moments in Container History Pivotal : Moments in Container History
Pivotal : Moments in Container History
EMC
 
Data Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewData Lake Protection - A Technical Review
Data Lake Protection - A Technical Review
EMC
 
Mobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeMobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or Foe
EMC
 
Virtualization Myths Infographic
Virtualization Myths Infographic Virtualization Myths Infographic
Virtualization Myths Infographic EMC
 
The Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeThe Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure Age
EMC
 
EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015
EMC
 
EMC Academic Summit 2015
EMC Academic Summit 2015EMC Academic Summit 2015
EMC Academic Summit 2015
EMC
 
Data Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesData Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesEMC
 
Using EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsUsing EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere Environments
EMC
 
Using EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookUsing EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBook
EMC
 
EMC Isilon Best Practices for Hadoop Data Storage
EMC Isilon Best Practices for Hadoop Data StorageEMC Isilon Best Practices for Hadoop Data Storage
EMC Isilon Best Practices for Hadoop Data Storage
EMC
 

More from EMC (20)

INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDINDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
 
Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote
 
EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX
 
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOTransforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
 
Citrix ready-webinar-xtremio
Citrix ready-webinar-xtremioCitrix ready-webinar-xtremio
Citrix ready-webinar-xtremio
 
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
 
EMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC with Mirantis Openstack
EMC with Mirantis Openstack
 
Modern infrastructure for business data lake
Modern infrastructure for business data lakeModern infrastructure for business data lake
Modern infrastructure for business data lake
 
Force Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereForce Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop Elsewhere
 
Pivotal : Moments in Container History
Pivotal : Moments in Container History Pivotal : Moments in Container History
Pivotal : Moments in Container History
 
Data Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewData Lake Protection - A Technical Review
Data Lake Protection - A Technical Review
 
Mobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeMobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or Foe
 
Virtualization Myths Infographic
Virtualization Myths Infographic Virtualization Myths Infographic
Virtualization Myths Infographic
 
The Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeThe Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure Age
 
EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015
 
EMC Academic Summit 2015
EMC Academic Summit 2015EMC Academic Summit 2015
EMC Academic Summit 2015
 
Data Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesData Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education Services
 
Using EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsUsing EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere Environments
 
Using EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookUsing EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBook
 
EMC Isilon Best Practices for Hadoop Data Storage
EMC Isilon Best Practices for Hadoop Data StorageEMC Isilon Best Practices for Hadoop Data Storage
EMC Isilon Best Practices for Hadoop Data Storage
 

Recently uploaded

How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 

Recently uploaded (20)

How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 

RSA Online Fraud Report - July 2014

  • 1. page 1R S A M O N T H LY F R A U D R E P O R T F R A U D R E P O R T E-COMMERCE FRAUD TRENDS 2014: SECURING THE ONLINE SHOPPING CART July 2014 The U.S payment card industry is undergoing a transformation. With the looming upgrade to the EMV standard, it is expected that the U.S. will experience a significant increase in card-not-present (CNP) fraud as have most other countries that have embraced it. According to leading research firm Aite Group, CNP fraud will account for about $2.9 billion in fraud losses to U.S. issuers this year. However, by 2018 when about 98% of payment cards in the U.S. will be enabled with the EMV capability, that number is expected to more than double to $6.4 billion in losses1 . That’s in the future. But what are we seeing today? RSA has gathered insight from the billions of e-commerce transactions we secure each year, and here are some of the trends we are seeing in 20142 . TOP MERCHANT CATEGORIES FOR E-COMMERCE TRANSACTIONS Following are the top ten merchant categories for e-commerce transactions: Airlines (39%) General Retail (15%) Computers/Electronics (12%) Ticketing (10%) Telecom (mobile phones, apps, etc) (5%) Money transfer (4%) Automotive (3%) Toys (3%) Clothing (3%) Restaurants and dining (1%) 1 Aite Group, “Card Not Present Fraud in a Post-EMV Environment: Combating the Fraud Spike,” June 2014. 2 RSA Adaptive Authentication for eCommerce, Jan – June 2014, U.S. only
  • 2. page 2R S A M O N T H LY F R A U D R E P O R T AVERAGE VALUE OF FRAUD TRANSACTIONS While there are over 100 parameters that RSA’s risk-based authentication system looks at in determining whether an e-commerce transaction is genuine or suspected fraud, one of the leading indicators is the average value of a transaction. The chart below shows the average value of legitimate transactions vs. fraudulent transactions, with the fraudulent transactions most always bearing a significantly higher value than an average legitimate transaction. For example, an average jewelry purchase online is $307 while an average fraudulent purchase in the same category is $1,300, more than four times that value. 0 500 1000 1500 2000 2500 TOP MERCHANT CATEGORIES AFFECTED BY FRAUD As consumers, we like to indulge once in a while with a random getaway, new electronic gadget, or the latest fashion trend as seen by the average value of e-commerce transactions. But cybercriminals find it even more enjoyable to use stolen payment cards to indulge themselves with vacations, cash, and computers – and even to pay their monthly household bills. The following chart represents the top merchants affected by fraud transactions. Source:RSAAnti-FraudCommandCenter AirlinesPharmacy MoneytransferAirlines Computers/Electronics Automotive GeneralRetail Jewelry Clothing Billpayments Travel Appliances Gaming Clothing Toys Travel Jewelry Insurance Billpayments Charity Utilities Average value of transaction Average value of fraud 0 10 20 30 40 50 46% 264 1830 659 1480 331 1320 307 1300 931 1180 674 1140 495 1040 897 1000 585 702 104 581 467 552 16% 13% 9% 5% 1% 1% 1% 1% 1%
  • 3. page 3R S A M O N T H LY F R A U D R E P O R T CONCLUSION In 2013, one out of every seven payment cards in the U.S. was exposed in a data breach3 . With hundreds of millions of payment cards in use and circulation in the U.S., this is quite noteworthy. Rapid changes are taking place beyond embracing the EMV standard. In October, 2015, changes will go into effect modifying the liability rules concerning card purchases for both issuers and merchants. Long overdue in the U.S., EMV adoption is going to invoke rapid changes in the payment card landscape, and financial institutions and retailers must be prepared to make the investments in technology to manage fraud risk in e-commerce. 3 Discover Financial Services’ Pulse ATM Network
  • 4. page 4R S A M O N T H LY F R A U D R E P O R T Phishing Attacks per Month RSA identified 55,813 phishing attacks in June, marking a 43% increase from May. Based on this figure, RSA estimates phishing cost global organizations $476 million in losses in June. US Bank Types Attacked U.S. regional banks have consistently been hit with 30 – 35% of phishing volume over the last few months, targeted by about one out of every three attacks. Top Countries by Attack Volume While the U.S. saw a 16% decline in attacks, it still remained the most targeted country in June with 57% of phishing volume. Other top targeted countries include the Netherlands, UK, Malaysia and South Africa. 55,813 Attacks Credit Unions Regional National 57% 7% 6% 5% UK Malaysia Netherlands U.S. JULY 2014 Source: RSA Anti-Fraud Command Center
  • 5. page 5R S A M O N T H LY F R A U D R E P O R T Top Countries by Attacked Brands U.S. and U.K brands were the most affected by phishing in June, targeted by 40% of attacks. Brands in India, the Netherlands, and Canada were collectively targeted by 16% of phishing attacks. Top Hosting Countries The number of phishing attacks hosted in the U.S. remained relatively the same at 43% in June. Germany continues to be the second top hosting country. Top Merchant Categories Affected by Fraud In the first half of 2014, the merchant category most affected by e-commerce fraud, with 46% of fraudulent transactions, was airlines and travel. The second most affected merchant category, with 16% of fraudulent transactions, was money payment processors. 11% U.S. UK 28% 5% 4%7% 43% GLOBAL PHISHING LOSSES JUNE 2014 46%Airlines 13%Computers/Electronics 16%Money transfer
  • 6. www.emc.com/rsa CONTACT US To learn more about how RSA products, services, and solutions help solve your business and IT challenges contact your local representative or authorized reseller – or visit us at www.emc.com/rsa ©2014 EMC Corporation. EMC, RSA, the RSA logo, and FraudAction are trademarks or registered trademarks of EMC Corporation in the U.S. and/or other countries. All other trademarks mentioned are the property of their respective holders. JULY RPT 0714