SlideShare une entreprise Scribd logo
1  sur  6
Télécharger pour lire hors ligne
page 1R S A M O N T H LY F R A U D R E P O R T
F R A U D R E P O R T
E-COMMERCE FRAUD TRENDS 2014:
SECURING THE ONLINE SHOPPING CART
July 2014
The U.S payment card industry is undergoing a transformation. With the looming upgrade
to the EMV standard, it is expected that the U.S. will experience a significant increase in
card-not-present (CNP) fraud as have most other countries that have embraced it.
According to leading research firm Aite Group, CNP fraud will account for about $2.9
billion in fraud losses to U.S. issuers this year. However, by 2018 when about 98% of
payment cards in the U.S. will be enabled with the EMV capability, that number is
expected to more than double to $6.4 billion in losses1
.
That’s in the future. But what are we seeing today? RSA has gathered insight from the
billions of e-commerce transactions we secure each year, and here are some of the trends
we are seeing in 20142
.
TOP MERCHANT CATEGORIES FOR E-COMMERCE TRANSACTIONS
Following are the top ten merchant categories for e-commerce transactions:
Airlines (39%)
General Retail (15%)
Computers/Electronics (12%)
Ticketing (10%)
Telecom (mobile phones, apps, etc) (5%)
Money transfer (4%)
Automotive (3%)
Toys (3%)
Clothing (3%)
Restaurants and dining (1%)
1 Aite Group, “Card Not Present Fraud in a Post-EMV Environment: Combating the Fraud Spike,” June 2014.
2 RSA Adaptive Authentication for eCommerce, Jan – June 2014, U.S. only
page 2R S A M O N T H LY F R A U D R E P O R T
AVERAGE VALUE OF FRAUD TRANSACTIONS
While there are over 100 parameters that RSA’s risk-based authentication system looks at
in determining whether an e-commerce transaction is genuine or suspected fraud, one of
the leading indicators is the average value of a transaction. The chart below shows the
average value of legitimate transactions vs. fraudulent transactions, with the fraudulent
transactions most always bearing a significantly higher value than an average legitimate
transaction. For example, an average jewelry purchase online is $307 while an average
fraudulent purchase in the same category is $1,300, more than four times that value.
0
500
1000
1500
2000
2500
TOP MERCHANT CATEGORIES AFFECTED BY FRAUD
As consumers, we like to indulge once in a while with a random getaway, new electronic
gadget, or the latest fashion trend as seen by the average value of e-commerce
transactions. But cybercriminals find it even more enjoyable to use stolen payment cards
to indulge themselves with vacations, cash, and computers – and even to pay their
monthly household bills. The following chart represents the top merchants affected by
fraud transactions.
Source:RSAAnti-FraudCommandCenter
AirlinesPharmacy
MoneytransferAirlines
Computers/Electronics
Automotive
GeneralRetail
Jewelry
Clothing
Billpayments
Travel
Appliances
Gaming
Clothing
Toys
Travel
Jewelry
Insurance
Billpayments
Charity
Utilities
Average value of transaction
Average value of fraud
0
10
20
30
40
50
46%
264
1830
659
1480
331
1320
307
1300
931
1180
674
1140
495
1040
897
1000
585
702
104
581
467
552
16%
13%
9%
5%
1% 1% 1% 1% 1%
page 3R S A M O N T H LY F R A U D R E P O R T
CONCLUSION
In 2013, one out of every seven payment cards in the U.S. was exposed in a data breach3
.
With hundreds of millions of payment cards in use and circulation in the U.S., this is
quite noteworthy. Rapid changes are taking place beyond embracing the EMV standard.
In October, 2015, changes will go into effect modifying the liability rules concerning card
purchases for both issuers and merchants. Long overdue in the U.S., EMV adoption is
going to invoke rapid changes in the payment card landscape, and financial institutions
and retailers must be prepared to make the investments in technology to manage fraud
risk in e-commerce.
3 Discover Financial Services’ Pulse ATM Network
page 4R S A M O N T H LY F R A U D R E P O R T
Phishing Attacks per Month
RSA identified 55,813 phishing attacks in
June, marking a 43% increase from May.
Based on this figure, RSA estimates
phishing cost global organizations $476
million in losses in June.
US Bank Types Attacked
U.S. regional banks have consistently been
hit with 30 – 35% of phishing volume over
the last few months, targeted by about one
out of every three attacks.
Top Countries by Attack Volume
While the U.S. saw a 16% decline in
attacks, it still remained the most targeted
country in June with 57% of phishing
volume. Other top targeted countries
include the Netherlands, UK, Malaysia
and South Africa.
55,813
Attacks
Credit Unions
Regional
National
57%
7%
6%
5%
UK
Malaysia
Netherlands
U.S.
JULY 2014
Source: RSA Anti-Fraud Command Center
page 5R S A M O N T H LY F R A U D R E P O R T
Top Countries by Attacked Brands
U.S. and U.K brands were the most
affected by phishing in June, targeted
by 40% of attacks. Brands in India, the
Netherlands, and Canada were collectively
targeted by 16% of phishing attacks.
Top Hosting Countries
The number of phishing attacks hosted in
the U.S. remained relatively the same at
43% in June. Germany continues to be the
second top hosting country.
Top Merchant Categories Affected by Fraud
In the first half of 2014, the merchant
category most affected by e-commerce
fraud, with 46% of fraudulent transactions,
was airlines and travel. The second most
affected merchant category, with 16% of
fraudulent transactions, was money
payment processors.
11%
U.S.
UK
28%
5% 4%7%
43%
GLOBAL PHISHING LOSSES
JUNE 2014
46%Airlines
13%Computers/Electronics
16%Money transfer
www.emc.com/rsa
CONTACT US
To learn more about how RSA products, services, and solutions help solve your
business and IT challenges contact your local representative or authorized reseller –
or visit us at www.emc.com/rsa
©2014 EMC Corporation. EMC, RSA, the RSA logo, and FraudAction are trademarks or registered trademarks of EMC
Corporation in the U.S. and/or other countries. All other trademarks mentioned are the property of their respective
holders. JULY RPT 0714

Contenu connexe

Tendances

Tendances (19)

2015 CEB Tower Group Mar2015
2015 CEB Tower Group Mar20152015 CEB Tower Group Mar2015
2015 CEB Tower Group Mar2015
 
Product Brochure_Fraud in Global B2C E-Commerce and Online Payment 2014
Product Brochure_Fraud in Global B2C E-Commerce and Online Payment 2014Product Brochure_Fraud in Global B2C E-Commerce and Online Payment 2014
Product Brochure_Fraud in Global B2C E-Commerce and Online Payment 2014
 
5. gan plc (29 june 2019)
5. gan plc (29 june 2019)5. gan plc (29 june 2019)
5. gan plc (29 june 2019)
 
Secure Payments: How Card Issuers and Merchants Can Stay Ahead of Fraudsters
Secure Payments: How Card Issuers and Merchants Can Stay Ahead of FraudstersSecure Payments: How Card Issuers and Merchants Can Stay Ahead of Fraudsters
Secure Payments: How Card Issuers and Merchants Can Stay Ahead of Fraudsters
 
Driving Payment Innovation - Know Your Enemy
Driving Payment Innovation - Know Your EnemyDriving Payment Innovation - Know Your Enemy
Driving Payment Innovation - Know Your Enemy
 
Fraud and risk communication
Fraud and risk communicationFraud and risk communication
Fraud and risk communication
 
Fraud-Fighting Trends 2017
Fraud-Fighting Trends 2017Fraud-Fighting Trends 2017
Fraud-Fighting Trends 2017
 
Regulated Online Gambling: Building A Stronger New Jersey
Regulated Online Gambling: Building A Stronger New JerseyRegulated Online Gambling: Building A Stronger New Jersey
Regulated Online Gambling: Building A Stronger New Jersey
 
Big data analytical driven fraud detection for finance; banks and insurance
Big data analytical driven fraud detection for finance; banks and insuranceBig data analytical driven fraud detection for finance; banks and insurance
Big data analytical driven fraud detection for finance; banks and insurance
 
5 emerging opportunities for travel businesses
5 emerging opportunities for travel businesses5 emerging opportunities for travel businesses
5 emerging opportunities for travel businesses
 
What We Learned Working with Forter
What We Learned Working with ForterWhat We Learned Working with Forter
What We Learned Working with Forter
 
PayPal Cross Border Consumer Research 2016
PayPal Cross Border Consumer Research 2016PayPal Cross Border Consumer Research 2016
PayPal Cross Border Consumer Research 2016
 
FRISS_Insurance fraud report 2020
FRISS_Insurance fraud report 2020 FRISS_Insurance fraud report 2020
FRISS_Insurance fraud report 2020
 
Webinar: How can OTAs in EU Navigate the Impact of #COVID19?
Webinar: How can OTAs in EU Navigate the Impact of #COVID19?Webinar: How can OTAs in EU Navigate the Impact of #COVID19?
Webinar: How can OTAs in EU Navigate the Impact of #COVID19?
 
Latam 2020 - Internet & Mobile Market
Latam 2020 - Internet & Mobile MarketLatam 2020 - Internet & Mobile Market
Latam 2020 - Internet & Mobile Market
 
Australia's gambling statistics - sports-betting
Australia's gambling statistics - sports-bettingAustralia's gambling statistics - sports-betting
Australia's gambling statistics - sports-betting
 
Webinar : Car Rentals - Driving Towards a Better Tomorrow
Webinar : Car Rentals - Driving Towards a Better TomorrowWebinar : Car Rentals - Driving Towards a Better Tomorrow
Webinar : Car Rentals - Driving Towards a Better Tomorrow
 
Webinar: Navigating the Way Ahead for Corporate Travel beyond COVID19
Webinar: Navigating the Way Ahead for Corporate Travel beyond COVID19Webinar: Navigating the Way Ahead for Corporate Travel beyond COVID19
Webinar: Navigating the Way Ahead for Corporate Travel beyond COVID19
 
Tackling ad fraud in 2016
Tackling ad fraud in   2016Tackling ad fraud in   2016
Tackling ad fraud in 2016
 

En vedette

Block culture of nacirema
Block culture of naciremaBlock culture of nacirema
Block culture of nacirema
Travis Klein
 
Dia de la_democracia
Dia de la_democraciaDia de la_democracia
Dia de la_democracia
Lauma1416
 
Fri papal response to luther
Fri papal response to lutherFri papal response to luther
Fri papal response to luther
Travis Klein
 
Cơ bản về tủ lạnh
Cơ bản về tủ lạnhCơ bản về tủ lạnh
Cơ bản về tủ lạnh
machupilani
 
1 comprensión de oraciones
1 comprensión de oraciones1 comprensión de oraciones
1 comprensión de oraciones
Isabel Abanto
 
Tulhuur not 2
Tulhuur not 2Tulhuur not 2
Tulhuur not 2
pvsa_8990
 
Informe consulta general criterio
Informe consulta general criterioInforme consulta general criterio
Informe consulta general criterio
Nathalia Sanchez
 
Day 7 reconstuction
Day 7 reconstuctionDay 7 reconstuction
Day 7 reconstuction
Travis Klein
 

En vedette (19)

види таблиць конструктор
види таблиць конструкторвиди таблиць конструктор
види таблиць конструктор
 
Block culture of nacirema
Block culture of naciremaBlock culture of nacirema
Block culture of nacirema
 
Animal power pont
Animal power pontAnimal power pont
Animal power pont
 
Dia de la_democracia
Dia de la_democraciaDia de la_democracia
Dia de la_democracia
 
Mit2 092 f09_lec11
Mit2 092 f09_lec11Mit2 092 f09_lec11
Mit2 092 f09_lec11
 
PyCon PL 2014 executable api
PyCon PL 2014   executable apiPyCon PL 2014   executable api
PyCon PL 2014 executable api
 
Fri papal response to luther
Fri papal response to lutherFri papal response to luther
Fri papal response to luther
 
SAP HANA in an EMC Private Cloud
SAP HANA in an EMC Private CloudSAP HANA in an EMC Private Cloud
SAP HANA in an EMC Private Cloud
 
אחריות תאגידית במדיה חברתית
אחריות תאגידית במדיה חברתיתאחריות תאגידית במדיה חברתית
אחריות תאגידית במדיה חברתית
 
White Paper: Advanced Cyber Analytics with Greenplum Database
White Paper: Advanced Cyber Analytics with Greenplum DatabaseWhite Paper: Advanced Cyber Analytics with Greenplum Database
White Paper: Advanced Cyber Analytics with Greenplum Database
 
Cơ bản về tủ lạnh
Cơ bản về tủ lạnhCơ bản về tủ lạnh
Cơ bản về tủ lạnh
 
1 comprensión de oraciones
1 comprensión de oraciones1 comprensión de oraciones
1 comprensión de oraciones
 
Recording Reccy
Recording ReccyRecording Reccy
Recording Reccy
 
Tulhuur not 2
Tulhuur not 2Tulhuur not 2
Tulhuur not 2
 
Informe consulta general criterio
Informe consulta general criterioInforme consulta general criterio
Informe consulta general criterio
 
Mon roman empire lang
Mon roman empire langMon roman empire lang
Mon roman empire lang
 
Day 7 reconstuction
Day 7 reconstuctionDay 7 reconstuction
Day 7 reconstuction
 
Intelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityIntelligence-Driven GRC for Security
Intelligence-Driven GRC for Security
 
Consulta general
Consulta generalConsulta general
Consulta general
 

Similaire à RSA Online Fraud Report - July 2014

TEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docxTEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docx
deanmtaylor1545
 
TEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docxTEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docx
bradburgess22840
 
TEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docxTEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docx
erlindaw
 
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docxRunning head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
wlynn1
 

Similaire à RSA Online Fraud Report - July 2014 (20)

CONSUMER PERCEPTIONS ON SECURITY: DO THEY STILL CARE?
CONSUMER PERCEPTIONS  ON SECURITY: DO THEY STILL CARE?CONSUMER PERCEPTIONS  ON SECURITY: DO THEY STILL CARE?
CONSUMER PERCEPTIONS ON SECURITY: DO THEY STILL CARE?
 
RSA MONTHLY FRAUD REPORT - September 2014
RSA MONTHLY FRAUD REPORT - September 2014RSA MONTHLY FRAUD REPORT - September 2014
RSA MONTHLY FRAUD REPORT - September 2014
 
Main Street vs. Wall Street: Who is to Blame for Data Breaches?
Main Street vs. Wall Street: Who is to Blame for Data Breaches?Main Street vs. Wall Street: Who is to Blame for Data Breaches?
Main Street vs. Wall Street: Who is to Blame for Data Breaches?
 
TEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docxTEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docx
 
TEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docxTEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docx
 
TEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docxTEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docx
 
Card Not Present (CNP) Fraud in a Post-EMV Environment: Combating the Fraud S...
Card Not Present (CNP) Fraud in a Post-EMV Environment: Combating the Fraud S...Card Not Present (CNP) Fraud in a Post-EMV Environment: Combating the Fraud S...
Card Not Present (CNP) Fraud in a Post-EMV Environment: Combating the Fraud S...
 
2014 Cybercrime Roundup: The Year of the POS Breach
2014 Cybercrime Roundup: The Year of the POS Breach2014 Cybercrime Roundup: The Year of the POS Breach
2014 Cybercrime Roundup: The Year of the POS Breach
 
Holiday Season Fraud Forecast
Holiday Season Fraud ForecastHoliday Season Fraud Forecast
Holiday Season Fraud Forecast
 
Eight Months of EMV: Early Fraud Shifts and Trajectory
Eight Months of EMV: Early Fraud Shifts and TrajectoryEight Months of EMV: Early Fraud Shifts and Trajectory
Eight Months of EMV: Early Fraud Shifts and Trajectory
 
RSA Monthly Online Fraud Report -- October 2013
RSA Monthly Online Fraud Report -- October 2013RSA Monthly Online Fraud Report -- October 2013
RSA Monthly Online Fraud Report -- October 2013
 
Sas wp enterrprise fraud management
Sas wp enterrprise fraud managementSas wp enterrprise fraud management
Sas wp enterrprise fraud management
 
Tentacles of fraud
Tentacles of fraud Tentacles of fraud
Tentacles of fraud
 
state-of-fraud-2021.pdf
state-of-fraud-2021.pdfstate-of-fraud-2021.pdf
state-of-fraud-2021.pdf
 
COVID-19 Impact on E-commerce and Payments: Newsflash April 9-15, 2020 by ySt...
COVID-19 Impact on E-commerce and Payments: Newsflash April 9-15, 2020 by ySt...COVID-19 Impact on E-commerce and Payments: Newsflash April 9-15, 2020 by ySt...
COVID-19 Impact on E-commerce and Payments: Newsflash April 9-15, 2020 by ySt...
 
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docxRunning head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE  1 .docx
Running head HOW TO AVOID INTERNET SCAMS AT THE WORKPLACE 1 .docx
 
Visa report 02.04.16
Visa report 02.04.16Visa report 02.04.16
Visa report 02.04.16
 
RSA Monthly Online Fraud Report -- May 2013
RSA Monthly Online Fraud Report -- May 2013RSA Monthly Online Fraud Report -- May 2013
RSA Monthly Online Fraud Report -- May 2013
 
Ali AlMeshal - The need for a secure & trusted payment - ArmIGF 2015
Ali AlMeshal - The need for a secure & trusted payment - ArmIGF 2015Ali AlMeshal - The need for a secure & trusted payment - ArmIGF 2015
Ali AlMeshal - The need for a secure & trusted payment - ArmIGF 2015
 
Product Brochure: Fraud And Security In Global Online Payments 2019
Product Brochure: Fraud And Security In Global Online Payments 2019Product Brochure: Fraud And Security In Global Online Payments 2019
Product Brochure: Fraud And Security In Global Online Payments 2019
 

Plus de EMC

Modern infrastructure for business data lake
Modern infrastructure for business data lakeModern infrastructure for business data lake
Modern infrastructure for business data lake
EMC
 
Virtualization Myths Infographic
Virtualization Myths Infographic Virtualization Myths Infographic
Virtualization Myths Infographic
EMC
 
Data Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesData Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education Services
EMC
 

Plus de EMC (20)

INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDINDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
 
Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote
 
EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX
 
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOTransforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
 
Citrix ready-webinar-xtremio
Citrix ready-webinar-xtremioCitrix ready-webinar-xtremio
Citrix ready-webinar-xtremio
 
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
 
EMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC with Mirantis Openstack
EMC with Mirantis Openstack
 
Modern infrastructure for business data lake
Modern infrastructure for business data lakeModern infrastructure for business data lake
Modern infrastructure for business data lake
 
Force Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereForce Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop Elsewhere
 
Pivotal : Moments in Container History
Pivotal : Moments in Container History Pivotal : Moments in Container History
Pivotal : Moments in Container History
 
Data Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewData Lake Protection - A Technical Review
Data Lake Protection - A Technical Review
 
Mobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeMobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or Foe
 
Virtualization Myths Infographic
Virtualization Myths Infographic Virtualization Myths Infographic
Virtualization Myths Infographic
 
The Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeThe Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure Age
 
EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015
 
EMC Academic Summit 2015
EMC Academic Summit 2015EMC Academic Summit 2015
EMC Academic Summit 2015
 
Data Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesData Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education Services
 
Using EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsUsing EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere Environments
 
Using EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookUsing EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBook
 
EMC Isilon Best Practices for Hadoop Data Storage
EMC Isilon Best Practices for Hadoop Data StorageEMC Isilon Best Practices for Hadoop Data Storage
EMC Isilon Best Practices for Hadoop Data Storage
 

Dernier

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Dernier (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 

RSA Online Fraud Report - July 2014

  • 1. page 1R S A M O N T H LY F R A U D R E P O R T F R A U D R E P O R T E-COMMERCE FRAUD TRENDS 2014: SECURING THE ONLINE SHOPPING CART July 2014 The U.S payment card industry is undergoing a transformation. With the looming upgrade to the EMV standard, it is expected that the U.S. will experience a significant increase in card-not-present (CNP) fraud as have most other countries that have embraced it. According to leading research firm Aite Group, CNP fraud will account for about $2.9 billion in fraud losses to U.S. issuers this year. However, by 2018 when about 98% of payment cards in the U.S. will be enabled with the EMV capability, that number is expected to more than double to $6.4 billion in losses1 . That’s in the future. But what are we seeing today? RSA has gathered insight from the billions of e-commerce transactions we secure each year, and here are some of the trends we are seeing in 20142 . TOP MERCHANT CATEGORIES FOR E-COMMERCE TRANSACTIONS Following are the top ten merchant categories for e-commerce transactions: Airlines (39%) General Retail (15%) Computers/Electronics (12%) Ticketing (10%) Telecom (mobile phones, apps, etc) (5%) Money transfer (4%) Automotive (3%) Toys (3%) Clothing (3%) Restaurants and dining (1%) 1 Aite Group, “Card Not Present Fraud in a Post-EMV Environment: Combating the Fraud Spike,” June 2014. 2 RSA Adaptive Authentication for eCommerce, Jan – June 2014, U.S. only
  • 2. page 2R S A M O N T H LY F R A U D R E P O R T AVERAGE VALUE OF FRAUD TRANSACTIONS While there are over 100 parameters that RSA’s risk-based authentication system looks at in determining whether an e-commerce transaction is genuine or suspected fraud, one of the leading indicators is the average value of a transaction. The chart below shows the average value of legitimate transactions vs. fraudulent transactions, with the fraudulent transactions most always bearing a significantly higher value than an average legitimate transaction. For example, an average jewelry purchase online is $307 while an average fraudulent purchase in the same category is $1,300, more than four times that value. 0 500 1000 1500 2000 2500 TOP MERCHANT CATEGORIES AFFECTED BY FRAUD As consumers, we like to indulge once in a while with a random getaway, new electronic gadget, or the latest fashion trend as seen by the average value of e-commerce transactions. But cybercriminals find it even more enjoyable to use stolen payment cards to indulge themselves with vacations, cash, and computers – and even to pay their monthly household bills. The following chart represents the top merchants affected by fraud transactions. Source:RSAAnti-FraudCommandCenter AirlinesPharmacy MoneytransferAirlines Computers/Electronics Automotive GeneralRetail Jewelry Clothing Billpayments Travel Appliances Gaming Clothing Toys Travel Jewelry Insurance Billpayments Charity Utilities Average value of transaction Average value of fraud 0 10 20 30 40 50 46% 264 1830 659 1480 331 1320 307 1300 931 1180 674 1140 495 1040 897 1000 585 702 104 581 467 552 16% 13% 9% 5% 1% 1% 1% 1% 1%
  • 3. page 3R S A M O N T H LY F R A U D R E P O R T CONCLUSION In 2013, one out of every seven payment cards in the U.S. was exposed in a data breach3 . With hundreds of millions of payment cards in use and circulation in the U.S., this is quite noteworthy. Rapid changes are taking place beyond embracing the EMV standard. In October, 2015, changes will go into effect modifying the liability rules concerning card purchases for both issuers and merchants. Long overdue in the U.S., EMV adoption is going to invoke rapid changes in the payment card landscape, and financial institutions and retailers must be prepared to make the investments in technology to manage fraud risk in e-commerce. 3 Discover Financial Services’ Pulse ATM Network
  • 4. page 4R S A M O N T H LY F R A U D R E P O R T Phishing Attacks per Month RSA identified 55,813 phishing attacks in June, marking a 43% increase from May. Based on this figure, RSA estimates phishing cost global organizations $476 million in losses in June. US Bank Types Attacked U.S. regional banks have consistently been hit with 30 – 35% of phishing volume over the last few months, targeted by about one out of every three attacks. Top Countries by Attack Volume While the U.S. saw a 16% decline in attacks, it still remained the most targeted country in June with 57% of phishing volume. Other top targeted countries include the Netherlands, UK, Malaysia and South Africa. 55,813 Attacks Credit Unions Regional National 57% 7% 6% 5% UK Malaysia Netherlands U.S. JULY 2014 Source: RSA Anti-Fraud Command Center
  • 5. page 5R S A M O N T H LY F R A U D R E P O R T Top Countries by Attacked Brands U.S. and U.K brands were the most affected by phishing in June, targeted by 40% of attacks. Brands in India, the Netherlands, and Canada were collectively targeted by 16% of phishing attacks. Top Hosting Countries The number of phishing attacks hosted in the U.S. remained relatively the same at 43% in June. Germany continues to be the second top hosting country. Top Merchant Categories Affected by Fraud In the first half of 2014, the merchant category most affected by e-commerce fraud, with 46% of fraudulent transactions, was airlines and travel. The second most affected merchant category, with 16% of fraudulent transactions, was money payment processors. 11% U.S. UK 28% 5% 4%7% 43% GLOBAL PHISHING LOSSES JUNE 2014 46%Airlines 13%Computers/Electronics 16%Money transfer
  • 6. www.emc.com/rsa CONTACT US To learn more about how RSA products, services, and solutions help solve your business and IT challenges contact your local representative or authorized reseller – or visit us at www.emc.com/rsa ©2014 EMC Corporation. EMC, RSA, the RSA logo, and FraudAction are trademarks or registered trademarks of EMC Corporation in the U.S. and/or other countries. All other trademarks mentioned are the property of their respective holders. JULY RPT 0714