News, Education and Events Decoding Digital Payments & Fraud

News, Education and Events Decoding Digital Payments & Fraud

Whitepapers

Holiday Fraud Trends Targeting Retailers

Pre-Holidays Guide: Adjusting Anti-Fraud Measures To Hit Revenue Goals

With large order volumes expected this holiday season, fraud departments must prepare for massive amounts of transactions. Without proper preparation, you could experience fulfillment delays, false declines, and costly chargebacks. Reviewing data from previous years can yield unexpected insights. Analysis of Riskified data from previous holiday seasons reveals that shopping behavior and fraud trends are not consistent throughout the holiday season. In fact, the data suggests that the holiday season comprises 4 ‘sub-seasons,’ each with its unique consumer preferences and fraud trends. Get this guide to understand how to determine what your holiday ‘sub-seasons’ may be and make the most of the end of year online sales.

Get Your Pre-Holidays Guide


Holiday Fraud Trends Targeting Retailers

The Winding Road Toward IoT Commerce: Considering the Opportunities and Risks of Selling Through Connected Devices

The Internet of Things (IoT) consists of billions of connected devices—a number that will quickly accelerate—enabling rich, frictionless shopping experiences. But, while plenty of innovators are thinking about, and working on how to deliver those experiences, experts say relatively few are thinking about the associated risks. Get our white paper to learn what IoT commerce will do to data creation and storage requirements, how bots and botnets can turn our devices against us, which vulnerabilities specifically affect digital goods sellers and what this all means to merchants.

Read the Whitepaper

CNP Fraud

Bot Management: An Overlooked Layer in Account Takeover Defense

Bot Management: An Overlooked Layer in Account Takeover Defense

Bots are able to test hundreds of millions of username/password combinations stolen in data breaches across the Internet at scale, yielding a significant number of valid login credentials fraudsters can then use to take over accounts, becoming the most dangerous foe there is: criminals with bad intentions masquerading as legitimate users. Get this white paper to learn how fraud professionals can benefit from upstream solutions that detect and mitigate bot attacks, resulting in less ATO.

Read the Whitepaper


Two Models Equals a Perfect 10: Attacking Account Takeover Fraud with Separate Scoring

Two Models Equals a Perfect 10: Attacking Account Takeover Fraud with Separate Scoring

The number and variety of online accounts that contain stored value or to which consumers are attaching payment credentials has proliferated significantly, and all of them are currently secured with passwords that consumers reuse frequently, opening a vulnerability that is leveraged by stolen data. Get this white paper to understand the best way to attack ATO fraudsters. And, in a merchant case study, find out how implementing technology developed specifically to identify account takeovers measures can enhance the performance of your overall fraud detection and prevention.

Read the Whitepaper


False Positives: The Monster That’s Really Killing You and How to Survive

False Positives: The Monster That’s Really Killing You and How to Survive

False positives are a bogeyman that fraud professionals know exist. Intuitively, merchants understand that delaying, declining or canceling an order can result in the immediate loss of the sale in question and, more importantly, subsequent sales to a customer who, out of frustration, turns to a competitor—maybe for life. Get this white paper to uncover the real financial impact of false positives and why it’s an aspect of fraud prevention that is too often overlooked.

Read the Whitepaper


From Universal Identifier to Fraud Buster

From Universal Identifier to Fraud Buster

Why does a former hacker and card-not-present fraud pioneer think email risk assessment could be the most important weapon in your antifraud arsenal? Because it's an identifying piece of information that accompanies every online transaction. While fraudsters may try to adapt, to cash out they must ultimately steal or create an email address. Get this white paper to find out how you can put the email address to use to prevent fraud and approve more transactions.

Read the Whitepaper


The Anatomy of Account Takeover Fraud

The Anatomy of Account Takeover Fraud

Online fraud is exploding and, at the moment, account takeover (ATO) is a major culprit. Hackers are stealing username/password combos in droves—information that consumers are using multiple times, compromising their own identities and giving fraudsters the tools they need to operate under the guise of a trusted customer. Get our white paper to learn how to detect and prevent ATO fraud by fraudsters who utilize stolen pii, bots and your employees against you.

Read the Whitepaper


Has Your Fraud Team Hit The Breaking Point

Has Your Fraud Team Hit The Breaking Point

Most fraud teams begin with one person responding to customers who are calling because they saw an unfamiliar charge on their credit card bill. Or, maybe a company is experiencing chargebacks for the first time and one person is tasked to learn about the issue. In any event, for small merchants, the process is intensely manual. As a company grows, it may add a person or two, but merchants can gain substantial size without significantly altering the way they fight fraud. This can result in a personal cost for the employees. Get this white paper to learn how to manage growth and fraud prevention in an 'always on' environment.

Read the Whitepaper


Chargebacks and Gift Cards

Chargebacks and Gift Cards

Understand the e-gift card landscape: Get this white paper to understand actionable recommendations that will mitigate your risk in a channel where fraud is taking an increasingly significant bite out of revenue, examine the full scope of gift card fraud and learn how to identify and prevent fraud schemes affecting open-loop, closed-loop and e-gift cards while maintaining a healthy sales flow.

Read the Whitepaper


Account Takeover and Account Creation Fraud

Account Takeover and Account Creation Fraud

As veritable oceans of stolen usernames and passwords become available for sale and mobile develops into the preferred method of accessing the Internet, e-commerce businesses large and small are reporting significant increases in a new method of attack. Account takeover and account creation fraud are on the rise. Get this white paper to better understand account takeover fraud and the options available to protect yourself and your customers from this new scourge.

Read the Whitepaper

CNP Payments

Optimizing Cross-Border E-Commerce

Optimizing Cross-Border E-Commerce

How a merchant chooses to present itself to consumers through its Website in another country will contribute mightily to the success that merchant enjoys in that part of the world. Another factor that varies, naturally, from region to region around the world is currency. Offering products and services in a currency a consumer is comfortable with is vital, but comes with pitfalls. Get this white paper to understand how to manage multiple conversion options to optimize cross-border e-commerce.

Read the Whitepaper


Aligning Payment Security to Your Digital Business Transformation Strategy

Aligning Payment Security to Your Digital Business Transformation Strategy

Today, customers expect their digital experience to be faster, more convenient and more secure than ever before. This is becoming even more evident in the financial services industry. Get our white paper to learn the 5 key considerations to align your payment security to your digital business strategy and help build a secure e-commerce strategy centered on customer value, while also facilitating a broader digital business transformation plan focused on competitive advantage.

Read the Whitepaper

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.