SlideShare une entreprise Scribd logo
1  sur  56
E-COMMERCE FRAUD
                                            TRENDS 2013
                                                         Wednesday, Feb. 20th
                                                         9:00 AM/EST
                Limor S Kessem
                Technical Lead,                          U.S./Canada Toll-Free
                                                         1-866-289-3291 PIN: 8272
                FraudAction Knowledge Delivery
                                                         International Toll
                Richard Booth                            Dial 001-503-295-8000, then
                Senior Fraud Technology Consultant       enter 866-289-3291 and PIN:
                                                         8272

                                                         Or listen via your computer
                                                         speakers:
                                                         Under the Voice & Video tab
                                                         select “Join Audio”



© Copyright 2012 EMC Corporation. All rights reserved.                                 1
Agenda
                                                          Statistics
                                                          Where it all stems from?
                                                          How is fraud committed?
                                                          How can we protect
                                                           ourselves?




© Copyright 2012 EMC Corporation. All rights reserved.                                2
Global e-commerce 2013



                                                         Expected to
                                                         total almost
                                                          $1 trillion
                                                         worldwide in
                                                            2013.




© Copyright 2012 EMC Corporation. All rights reserved.                  3
Europeans shopping online: Top 10

90%
80%
70%
60%
50%
40%
30%
20%
10%
0%




                                                          Source: EuroStat



 © Copyright 2012 EMC Corporation. All rights reserved.                  4
Ecommerce is everywhere…
    Consumers are using their
    smartphones to bridge the gap
    between brick-and-mortar stores and
    ecommerce

                    eBay Mobile
                  13,161,000 unique
                                                               PayPal
                 shoppers in 1 month
                                                           +5m active new
                     1:04:02 hrs
                                                         accounts in 4Q2012,
                                                           Fastest rate in 8
                                                                years!



© Copyright 2012 EMC Corporation. All rights reserved.                         5
Losses to e-commerce fraud
     Cybercrime costs UK
       retailers over £200
    million a year (British Retail
                    Consortium).

                                                          Total fraud losses on UK
                                                         cards totaled £185 million
                                                         between January and June
                                                         2012 Payment fraud losses
                                                         are only 0.5% of all fraud
                                                              losses in the UK
                                                         (The UK Cards Association)



                                                                             Losses incurred on Irish-issued
                                                                             payment cards show losses of
                                                                             €25.7 million recorded in 2011



© Copyright 2012 EMC Corporation. All rights reserved.                                                         6
Intelligence
                    = Power

© Copyright 2012 EMC Corporation. All rights reserved.   7
Intelligence = Power




© Copyright 2012 EMC Corporation. All rights reserved.   8
The Underground?



                                                             The
                                                         Underground
                                                           World of
                                                            Fraud




© Copyright 2012 EMC Corporation. All rights reserved.                 9
© Copyright 2012 EMC Corporation. All rights reserved.   10
The Fraud Underground




© Copyright 2012 EMC Corporation. All rights reserved.   11
Fraudsters                 Botmasters
               Blackhats
                                                                      Hacktivists




© Copyright 2012 EMC Corporation. All rights reserved.                                           12
Malware                                Infrastructure   Data vendors
                                                           Stolen Data    Con artists and
                                                                           Con artists
 programmers                                 Services                        thieves
                                                                           and thieves
                                                             Vendors



© Copyright 2012 EMC Corporation. All rights reserved.                                      13
E-commerce fraud – The supply chain

 Con artists – devise ploys
    – Create and deploy social engineering schemes
      which include: ecommerce phishing and spam
      tactics designed to harvest credentials.
 Data trafficking
    – Buy, sell and trade in credentials, account
      information, card numbers, victim contact details,
      PII, credit reports




 © Copyright 2012 EMC Corporation. All rights reserved.    14
E-commerce fraud – The supply chain

 Mule herders
        – Recruit and command money mules
        – Recruit and command item drop mules
 Cashout services
        – Offer a variety of options to fraudsters
          looking for exchange possibilities and
          monetization schemes




© Copyright 2012 EMC Corporation. All rights reserved.   15
E-commerce fraud – The supply chain
 Forgery service providers
        – Create fake documentation – from
          statements to ID cards, driving licenses and
          passports.
        – Provide cloned cards that are a replica of the
          real plastic card
 Dark shoppers
        – Offer purchasing services
        – In-store pick-up
        – E-commerce fraud tutorials



© Copyright 2012 EMC Corporation. All rights reserved.     16
The flow of
                                  events

© Copyright 2012 EMC Corporation. All rights reserved.   17
The planning phase
 Step #1 – Plan, buy a card… or 100
    This happens in deep-web venues




© Copyright 2012 EMC Corporation. All rights reserved.   18
E-commerce fraud – Flow of events


          Buy data                                        COB          Reship            Monetize



Time

                            Verify                              Shop            Resell
                           validity




 © Copyright 2012 EMC Corporation. All rights reserved.                                             19
A market…
Deep (web) conversations

      Before… IRC                                        Today… Organized
                                                              boards




© Copyright 2012 EMC Corporation. All rights reserved.                      20
The planning phase




© Copyright 2012 EMC Corporation. All rights reserved.   21
Where are these details purchased?




© Copyright 2012 EMC Corporation. All rights reserved.   22
What feeds the stolen data supply?
           Classic phishing – aimed at
 Phishing attacks
                                          ecommerce merchants
                                             SMShing
 Trojan logs
 Hacked payment processors
                                      Trojan
 Hacked online retailers
                                    injections
 Big breaches that expose financial data for
                                   that ask
                                   victim card
 Data traffickers who have “warehouses” of
                                      details
    information
                         Trojan plugins designed to grab and parse
                                          CC data

© Copyright 2012 EMC Corporation. All rights reserved.               23
Verify card validity: CC Checking


 Check via phone merchants
 Check via online merchants
 Check via adapted checking services
 Check inside the CC shops
 Check via rogue merchant infrastructures




© Copyright 2012 EMC Corporation. All rights reserved.   24
Obtain additional details

 Get online access to the card’s account
 Attempt to guess/reset the VBV/MSC
  Password if need be
 Call the bank as needed




© Copyright 2012 EMC Corporation. All rights reserved.   25
Get an item-drop mule (reshipping)
 The fraud underground has a number of
  options to offer thieves:
        –    Accomplices
        –    Dark shopper services
        –    In-store pick up of ordered goods
        –    Pick your own item drop mule
        –    A full-service turnkey solution: from buy to
             monetize




© Copyright 2012 EMC Corporation. All rights reserved.      26
Reshipping mules: Pick one
 The herder recruits people to work
 Each new “employee” is added to the list
 The mule can be picked out online
 Each mule is available for a number of
  shipments according to the herder’s rules




© Copyright 2012 EMC Corporation. All rights reserved.   27
E-commerce fraud – Flow of events


          Buy data                                        COB          Reship            Monetize



Time

                            Verify                              Shop            Resell
                           validity




 © Copyright 2012 EMC Corporation. All rights reserved.                                             28
The COB – Change of Billing
 Goal: change the billing address on the acct
 “Enrolls” – attempt to access the card online
 Add a shipping address/mailing address
 Look for details on the victim
 Add a mobile number and email address
 Non-native speakers contract underground
  services to help them achieve the goal



© Copyright 2012 EMC Corporation. All rights reserved.   29
What is ‘Carding’
 The fraudulent use of payment cards is
  dubbed ‘Carding’
 Fraudsters are after easy-to-card merchants
 They usually avoid secure, large merchants
 Prey on smaller shops and tell their friends
  about them
 Usually card high-value electronics and
  popular goods



© Copyright 2012 EMC Corporation. All rights reserved.   30
The action phase: Go shopping
 Step #2 – Theft
    Happens in e-commerce sites




© Copyright 2012 EMC Corporation. All rights reserved.   31
Dark shopper services




© Copyright 2012 EMC Corporation. All rights reserved.   32
E-commerce fraud – Flow of events


          Buy data                                        COB          Reship            Monetize



Time

                            Verify                              Shop            Resell
                           validity




 © Copyright 2012 EMC Corporation. All rights reserved.                                             33
Item drop and reship
 Step #3 – Ship the goods –
  Happens at item drop addresses




© Copyright 2012 EMC Corporation. All rights reserved.   34
The mule…
 The mule receives the goods at home
 The mule prints and re-tickets the item
 The mule will reship the item(s)
 The fraudster will receive it – or…
 The mule herder will receive and sell the
  item, then share the loot
 In-store pick up mules will go to the shop
  and then reship…


© Copyright 2012 EMC Corporation. All rights reserved.   35
E-commerce fraud – Flow of events


          Buy data                                        COB          Reship            Monetize



Time

                            Verify                              Shop            Resell
                           validity




 © Copyright 2012 EMC Corporation. All rights reserved.                                             36
Monetize
 Step #4 – Monetize –
    Happens between accomplices online/on the
    streets




© Copyright 2012 EMC Corporation. All rights reserved.   37
Fighting
                                                            Fraud

© Copyright 2012 EMC Corporation. All rights reserved.              38
Protecting cardholders - Prevention
 Banks can tighten security around COBs
 Fraudsters fail when VBV/MSC codes cannot
  be reset or bypassed, blacklisting BINs
 Fraudsters will steer clear of secure
  platforms that provide them no added
  information (enrollment phase security)
 Identity verification over the phone
 Card-cloning criminals fail when last 4 digits
  of the card must match their plastic

© Copyright 2012 EMC Corporation. All rights reserved.   39
Fighting back!


© Copyright 2012 EMC Corporation. All rights reserved.   40
Cardholder education is key
 Fraudsters will try to enroll cards – they can
  be stopped!
       – Encourage customers to register their cards to
         the online service and be sure to review them
         regularly.
 Fraudsters dread the premature discovery of
  a pending fraudulent delivery/transaction
       – Encourage customers to use the alerting
         services you offer (email, SMS)




© Copyright 2012 EMC Corporation. All rights reserved.    41
Informed customers help prevent fraud
 Inform customers about phishing for card
  information
 Inform customers about shopping via mobile
  devices and through apps
       – Mobile devices can be just as easily targeted by
         phishing and rogue shopping apps as the PC
       – Warn customers about downloading shopping
         and banking apps from third party websites




© Copyright 2012 EMC Corporation. All rights reserved.      42
Cardholders have the power




 … to avoid phishing scams by never divulging
  financial information online
 … to call their bank when they are unsure of
  the source of a suspicious email
 … to control the shipping process of orders
  they placed

© Copyright 2012 EMC Corporation. All rights reserved.   43
Cardholders have the power
 … to monitor their card when they hand it to
  a shop attendant
 … to only buy from well-known, reputable
  merchants
 …to choose to receive alerts when purchases
  are processed on their cards
 … to regularly review their accounts,
  especially during the holidays



© Copyright 2012 EMC Corporation. All rights reserved.   44
Deception is only deception




© Copyright 2012 EMC Corporation. All rights reserved.   45
Managing
                                               Fraud Risk

© Copyright 2012 EMC Corporation. All rights reserved.      46
Threats Occur Across the Entire User
Session
                 InfoSec
   Pre-Authentication Threats

                                                                                                    Fraud
                                                                                   Post-Authentication Threats




  Beginning of                                                         Login                                               Transaction
  Web Session                                                                                                              and Logout


                                                                                                     Account Takeover
                                                 Parameter Injection
                              Site Scraping                                    Man In The Browser
                                                                                                                     High Risk Checkout
Vulnerability Probing
                                                               Password Guessing          Unauthorized Account
                                         New Account
                  DDOS Attacks         Registration Fraud                                       Activity                 Fraudulent Money
                                                                                                                            Movement
    Phishing Attacks
                                                          Access From High Risk Country              Man In The Middle
                                  Promotion Abuse
© Copyright 2012 EMC Corporation. All rights reserved.                                                                                      47
RSA FraudAction Services
    • Anti-Phishing Service
    Detect and shut down phishing
    sites
    • Anti-Trojan Service
    Detect and shut down malware
    targeting customers
    • Anti Rogue App Service -
    Detect and shut down rogue
    mobile apps
    • FraudAction Intelligence
      Reports about fraud activities,
    trends in the underground



© Copyright 2012 EMC Corporation. All rights reserved.   48
SilverTail Web Session Intelligence
   Criminals Behave Differently Than
   Customers

           Velocity
           Page Sequence
           Origin
           Contextual Information




 © Copyright 2012 EMC Corporation. All rights reserved.
                                                          Anomalous Behavior Detection   49
RSA Adaptive Authentication
 Transparent real-time fraud detection
  and authentication without sacrificing
  user experience
 Monitor and authenticate both login
  and post login activities
 Risk based self-learning engine which
  rapidly adjusts policies and controls to
  predict and protect against future
  attacks
 Collaborative real-time cross-
  institution fraud intelligence sharing




© Copyright 2012 EMC Corporation. All rights reserved.   50
RSA Adaptive
               Behavior                Device               Fraud
                                                                                          Authentication

                                                    937
                                                    271
                                                                     Policy
                                                                      Mgr.                   Authenticate                  Continue
                                   Risk Engine

 Activity details




                                                                                                      Knowledge
                                                                                          Challenge
                                                                                Out-of-




                                                                                                                  Others
                                                                                 band
                                                         Feedback
                                                                                  Step-up Authentication



                                               Feedback
                                                                    Case Mgmt




© Copyright 2012 EMC Corporation. All rights reserved.                                                                                51
RSA Adaptive Authentication for eCommerce
• Balance risk, cost and convenience with no
  enrollment
• Transparent real-time fraud detection with minimal
  impact to card holders user experience
• Risk based system that learns from past behavior and
  rapidly adjusts to predict and protect against future
  attacks
• Collaborative real-time cross-institution sharing of
  fraud-connected data via RSA eFraudNetwork
• Worldwide availability to issuing banks as centrally
  hosted service




 © Copyright 2012 EMC Corporation. All rights reserved.   52
RSA Adaptive Authentication for eCommerce




      Transparent                             • Low risk transparently authenticated - no cardholder engagement
         Auth
       Mandatory                              • Risky transactions challenged via KBA, OTP SMS, Data Elements
         Auth
            Decline                           • Highest risk transactions are declined



© Copyright 2012 EMC Corporation. All rights reserved.                                                            53
RSA’s Layered Protection for Fraud Prevention




© Copyright 2012 EMC Corporation. All rights reserved.   54
Q&A


© Copyright 2012 EMC Corporation. All rights reserved.   55
RSA E-Commerce Fraud Trends 2013

Contenu connexe

Tendances

The Internet of Cars: Spawning New Business Models
The Internet of Cars: Spawning New Business ModelsThe Internet of Cars: Spawning New Business Models
The Internet of Cars: Spawning New Business ModelsAndreas Mai
 
NEW BUSINESS DEVELOPMENT
NEW BUSINESS DEVELOPMENTNEW BUSINESS DEVELOPMENT
NEW BUSINESS DEVELOPMENTJonty Mohta
 
IMI Group Presentation
IMI Group PresentationIMI Group Presentation
IMI Group Presentationyjeliazkov
 
E*Pro CEM Presentation
E*Pro CEM PresentationE*Pro CEM Presentation
E*Pro CEM Presentationeprotech
 
American Banker Conference Presentation June 2012: Harnessing mobile banking
American Banker Conference Presentation June 2012: Harnessing mobile bankingAmerican Banker Conference Presentation June 2012: Harnessing mobile banking
American Banker Conference Presentation June 2012: Harnessing mobile bankingKony, Inc.
 
Informa presentation for tc3
Informa presentation for tc3Informa presentation for tc3
Informa presentation for tc3Joshua Goldbard
 
Enabling the Smart Grid
Enabling the Smart GridEnabling the Smart Grid
Enabling the Smart GridCybera Inc.
 
Sgcp12 russell haggar-xsilon-for pd-fing for cir website
Sgcp12 russell haggar-xsilon-for pd-fing for cir websiteSgcp12 russell haggar-xsilon-for pd-fing for cir website
Sgcp12 russell haggar-xsilon-for pd-fing for cir websiteJustin Hayward
 
Dongbu of the Future - Cutting Edge Technologies of Dongbu
Dongbu of the Future - Cutting Edge Technologies of DongbuDongbu of the Future - Cutting Edge Technologies of Dongbu
Dongbu of the Future - Cutting Edge Technologies of Dongbu(KIM JI HO) 김지호
 
BTel Green Initiatives
BTel Green InitiativesBTel Green Initiatives
BTel Green InitiativesRiky Kurniawan
 
General Overview Igc
General Overview IgcGeneral Overview Igc
General Overview IgcBTritle
 
Daytona Sessions vol.1 - Johan Ragnevad - Five years - an Internet eternity, ...
Daytona Sessions vol.1 - Johan Ragnevad - Five years - an Internet eternity, ...Daytona Sessions vol.1 - Johan Ragnevad - Five years - an Internet eternity, ...
Daytona Sessions vol.1 - Johan Ragnevad - Five years - an Internet eternity, ...Daytona
 
WiTech LTE Report - Review Pack
WiTech LTE Report - Review PackWiTech LTE Report - Review Pack
WiTech LTE Report - Review PackWiTech
 
Market status report of IMS Issue 1
Market status report of IMS Issue 1Market status report of IMS Issue 1
Market status report of IMS Issue 1Alan Quayle
 
SB'12 - David Schatsky - Green Research, Daniel Aronson - Deloitte, Sheila Bo...
SB'12 - David Schatsky - Green Research, Daniel Aronson - Deloitte, Sheila Bo...SB'12 - David Schatsky - Green Research, Daniel Aronson - Deloitte, Sheila Bo...
SB'12 - David Schatsky - Green Research, Daniel Aronson - Deloitte, Sheila Bo...Sustainable Brands
 

Tendances (18)

The Internet of Cars: Spawning New Business Models
The Internet of Cars: Spawning New Business ModelsThe Internet of Cars: Spawning New Business Models
The Internet of Cars: Spawning New Business Models
 
NEW BUSINESS DEVELOPMENT
NEW BUSINESS DEVELOPMENTNEW BUSINESS DEVELOPMENT
NEW BUSINESS DEVELOPMENT
 
IMI Group Presentation
IMI Group PresentationIMI Group Presentation
IMI Group Presentation
 
E*Pro CEM Presentation
E*Pro CEM PresentationE*Pro CEM Presentation
E*Pro CEM Presentation
 
Mega Events- מכון היצוא
Mega Events- מכון היצוא Mega Events- מכון היצוא
Mega Events- מכון היצוא
 
Ireland great for business
Ireland   great for businessIreland   great for business
Ireland great for business
 
American Banker Conference Presentation June 2012: Harnessing mobile banking
American Banker Conference Presentation June 2012: Harnessing mobile bankingAmerican Banker Conference Presentation June 2012: Harnessing mobile banking
American Banker Conference Presentation June 2012: Harnessing mobile banking
 
Informa presentation for tc3
Informa presentation for tc3Informa presentation for tc3
Informa presentation for tc3
 
Enabling the Smart Grid
Enabling the Smart GridEnabling the Smart Grid
Enabling the Smart Grid
 
Sgcp12 russell haggar-xsilon-for pd-fing for cir website
Sgcp12 russell haggar-xsilon-for pd-fing for cir websiteSgcp12 russell haggar-xsilon-for pd-fing for cir website
Sgcp12 russell haggar-xsilon-for pd-fing for cir website
 
Dongbu of the Future - Cutting Edge Technologies of Dongbu
Dongbu of the Future - Cutting Edge Technologies of DongbuDongbu of the Future - Cutting Edge Technologies of Dongbu
Dongbu of the Future - Cutting Edge Technologies of Dongbu
 
Velstar Company Overview 06.2011
Velstar Company Overview 06.2011Velstar Company Overview 06.2011
Velstar Company Overview 06.2011
 
BTel Green Initiatives
BTel Green InitiativesBTel Green Initiatives
BTel Green Initiatives
 
General Overview Igc
General Overview IgcGeneral Overview Igc
General Overview Igc
 
Daytona Sessions vol.1 - Johan Ragnevad - Five years - an Internet eternity, ...
Daytona Sessions vol.1 - Johan Ragnevad - Five years - an Internet eternity, ...Daytona Sessions vol.1 - Johan Ragnevad - Five years - an Internet eternity, ...
Daytona Sessions vol.1 - Johan Ragnevad - Five years - an Internet eternity, ...
 
WiTech LTE Report - Review Pack
WiTech LTE Report - Review PackWiTech LTE Report - Review Pack
WiTech LTE Report - Review Pack
 
Market status report of IMS Issue 1
Market status report of IMS Issue 1Market status report of IMS Issue 1
Market status report of IMS Issue 1
 
SB'12 - David Schatsky - Green Research, Daniel Aronson - Deloitte, Sheila Bo...
SB'12 - David Schatsky - Green Research, Daniel Aronson - Deloitte, Sheila Bo...SB'12 - David Schatsky - Green Research, Daniel Aronson - Deloitte, Sheila Bo...
SB'12 - David Schatsky - Green Research, Daniel Aronson - Deloitte, Sheila Bo...
 

En vedette

E-commerce and fraud
E-commerce and fraudE-commerce and fraud
E-commerce and fraudblogzilla
 
Chapter 17 a fraud in e commerce Jen
Chapter 17 a  fraud in e commerce JenChapter 17 a  fraud in e commerce Jen
Chapter 17 a fraud in e commerce JenVidaB
 
Mobile commerce
Mobile commerceMobile commerce
Mobile commercetumetr1
 
e commerce security and fraud protection
e commerce security and fraud protectione commerce security and fraud protection
e commerce security and fraud protectiontumetr1
 
The Year in Phishing - RSA Fraud Report: January 2013
The Year in Phishing - RSA Fraud Report: January 2013The Year in Phishing - RSA Fraud Report: January 2013
The Year in Phishing - RSA Fraud Report: January 2013EMC
 
Presentation1
Presentation1Presentation1
Presentation1梅 梅
 
White paper: EMC Performance Optimization for Microsoft FAST Search Server 20...
White paper: EMC Performance Optimization for Microsoft FAST Search Server 20...White paper: EMC Performance Optimization for Microsoft FAST Search Server 20...
White paper: EMC Performance Optimization for Microsoft FAST Search Server 20...EMC
 
Math powerpoint
Math powerpointMath powerpoint
Math powerpointwhiteman22
 
The Current State of Cybercrime 2013
The Current State of Cybercrime 2013The Current State of Cybercrime 2013
The Current State of Cybercrime 2013EMC
 
Shared Interests as a Bridge Toward a Muslim Marriage
Shared Interests as a Bridge Toward a Muslim MarriageShared Interests as a Bridge Toward a Muslim Marriage
Shared Interests as a Bridge Toward a Muslim MarriageMuslims4Marriage
 
Csw2012
Csw2012Csw2012
Csw2012htisnj
 
Painting development
Painting developmentPainting development
Painting developmentmariaricha
 
Fenice display system
Fenice display systemFenice display system
Fenice display systemgruppofallani
 
Evaluation Question Two
Evaluation Question TwoEvaluation Question Two
Evaluation Question Twoloousmith
 
Minimum wage mon042514
Minimum wage mon042514Minimum wage mon042514
Minimum wage mon042514Travis Klein
 
RSA Monthly Online Fraud Report -- February 2013
RSA Monthly Online Fraud Report -- February 2013RSA Monthly Online Fraud Report -- February 2013
RSA Monthly Online Fraud Report -- February 2013EMC
 
IG2 Assignment Brief
IG2 Assignment BriefIG2 Assignment Brief
IG2 Assignment Briefsophiemcavoy1
 

En vedette (19)

E-commerce and fraud
E-commerce and fraudE-commerce and fraud
E-commerce and fraud
 
Chapter 17 a fraud in e commerce Jen
Chapter 17 a  fraud in e commerce JenChapter 17 a  fraud in e commerce Jen
Chapter 17 a fraud in e commerce Jen
 
Mobile commerce
Mobile commerceMobile commerce
Mobile commerce
 
e commerce security and fraud protection
e commerce security and fraud protectione commerce security and fraud protection
e commerce security and fraud protection
 
The Year in Phishing - RSA Fraud Report: January 2013
The Year in Phishing - RSA Fraud Report: January 2013The Year in Phishing - RSA Fraud Report: January 2013
The Year in Phishing - RSA Fraud Report: January 2013
 
Presentation1
Presentation1Presentation1
Presentation1
 
White paper: EMC Performance Optimization for Microsoft FAST Search Server 20...
White paper: EMC Performance Optimization for Microsoft FAST Search Server 20...White paper: EMC Performance Optimization for Microsoft FAST Search Server 20...
White paper: EMC Performance Optimization for Microsoft FAST Search Server 20...
 
Math powerpoint
Math powerpointMath powerpoint
Math powerpoint
 
The Current State of Cybercrime 2013
The Current State of Cybercrime 2013The Current State of Cybercrime 2013
The Current State of Cybercrime 2013
 
Shared Interests as a Bridge Toward a Muslim Marriage
Shared Interests as a Bridge Toward a Muslim MarriageShared Interests as a Bridge Toward a Muslim Marriage
Shared Interests as a Bridge Toward a Muslim Marriage
 
Csw2012
Csw2012Csw2012
Csw2012
 
Painting development
Painting developmentPainting development
Painting development
 
Fenice display system
Fenice display systemFenice display system
Fenice display system
 
Evaluation Question Two
Evaluation Question TwoEvaluation Question Two
Evaluation Question Two
 
Minimum wage mon042514
Minimum wage mon042514Minimum wage mon042514
Minimum wage mon042514
 
RSA Monthly Online Fraud Report -- February 2013
RSA Monthly Online Fraud Report -- February 2013RSA Monthly Online Fraud Report -- February 2013
RSA Monthly Online Fraud Report -- February 2013
 
Dario
DarioDario
Dario
 
2015 day 5
2015 day 52015 day 5
2015 day 5
 
IG2 Assignment Brief
IG2 Assignment BriefIG2 Assignment Brief
IG2 Assignment Brief
 

Similaire à RSA E-Commerce Fraud Trends 2013

Partner facing vspex deck[1]
Partner facing vspex deck[1]Partner facing vspex deck[1]
Partner facing vspex deck[1]Arrow ECS UK
 
Face to Face with Big Data
Face to Face with Big Data Face to Face with Big Data
Face to Face with Big Data EMC
 
Sanjay Mirchandani’s KeyNote – EMC Forum India – Mumbai November 17, 2011
Sanjay Mirchandani’s KeyNote – EMC Forum India – Mumbai November 17, 2011Sanjay Mirchandani’s KeyNote – EMC Forum India – Mumbai November 17, 2011
Sanjay Mirchandani’s KeyNote – EMC Forum India – Mumbai November 17, 2011EMC Forum India
 
EMC Forum 2013 - Lagos /Nigeria
EMC Forum 2013 - Lagos /NigeriaEMC Forum 2013 - Lagos /Nigeria
EMC Forum 2013 - Lagos /NigeriaDieter Hovorka
 
Emc - Cloud Vision and Strategy
Emc - Cloud Vision and StrategyEmc - Cloud Vision and Strategy
Emc - Cloud Vision and StrategyCenk Ersoy
 
Information Wars - Starring Symmetrix VMAX
Information Wars - Starring Symmetrix VMAXInformation Wars - Starring Symmetrix VMAX
Information Wars - Starring Symmetrix VMAXMagnus Backman
 
Partnership for the Private Cloud
Partnership for the Private CloudPartnership for the Private Cloud
Partnership for the Private CloudCisco Canada
 
EMC Cloud Computing Casee Studies for Zimbabwe breakfast briefing by Grant Mu...
EMC Cloud Computing Casee Studies for Zimbabwe breakfast briefing by Grant Mu...EMC Cloud Computing Casee Studies for Zimbabwe breakfast briefing by Grant Mu...
EMC Cloud Computing Casee Studies for Zimbabwe breakfast briefing by Grant Mu...TechZim
 
Your Data Center Boundaries Don’t Exist Anymore!
Your Data Center Boundaries Don’t Exist Anymore! Your Data Center Boundaries Don’t Exist Anymore!
Your Data Center Boundaries Don’t Exist Anymore! EMC
 
EMC's IT's Cloud Transformation, Thomas Becker, EMC
EMC's IT's Cloud Transformation, Thomas Becker, EMCEMC's IT's Cloud Transformation, Thomas Becker, EMC
EMC's IT's Cloud Transformation, Thomas Becker, EMCCloudOps Summit
 
Juniper Provision - 13martie2012
Juniper Provision - 13martie2012Juniper Provision - 13martie2012
Juniper Provision - 13martie2012Agora Group
 
The Marriage Between Cloud and ITSM
The Marriage Between Cloud and ITSMThe Marriage Between Cloud and ITSM
The Marriage Between Cloud and ITSMRyeTerseGramp
 
Opportunities for students in the New World of Cloud and Big Data
Opportunities for students in the New World of Cloud and Big DataOpportunities for students in the New World of Cloud and Big Data
Opportunities for students in the New World of Cloud and Big DataEMC
 
Tucci emc world 2011 fina lb
Tucci emc world 2011 fina lbTucci emc world 2011 fina lb
Tucci emc world 2011 fina lbTina Jiang
 
Supelec M2M, IoT - course - conclusions - 2012
Supelec   M2M, IoT - course - conclusions - 2012Supelec   M2M, IoT - course - conclusions - 2012
Supelec M2M, IoT - course - conclusions - 2012Thierry Lestable
 
The marriage between Cloud and ITSM
The marriage between Cloud and ITSMThe marriage between Cloud and ITSM
The marriage between Cloud and ITSMITpreneurs
 

Similaire à RSA E-Commerce Fraud Trends 2013 (20)

Partner facing vspex deck[1]
Partner facing vspex deck[1]Partner facing vspex deck[1]
Partner facing vspex deck[1]
 
Face to Face with Big Data
Face to Face with Big Data Face to Face with Big Data
Face to Face with Big Data
 
Sanjay Mirchandani’s KeyNote – EMC Forum India – Mumbai November 17, 2011
Sanjay Mirchandani’s KeyNote – EMC Forum India – Mumbai November 17, 2011Sanjay Mirchandani’s KeyNote – EMC Forum India – Mumbai November 17, 2011
Sanjay Mirchandani’s KeyNote – EMC Forum India – Mumbai November 17, 2011
 
EMC Forum 2013 - Lagos /Nigeria
EMC Forum 2013 - Lagos /NigeriaEMC Forum 2013 - Lagos /Nigeria
EMC Forum 2013 - Lagos /Nigeria
 
Emc - Cloud Vision and Strategy
Emc - Cloud Vision and StrategyEmc - Cloud Vision and Strategy
Emc - Cloud Vision and Strategy
 
Information Wars - Starring Symmetrix VMAX
Information Wars - Starring Symmetrix VMAXInformation Wars - Starring Symmetrix VMAX
Information Wars - Starring Symmetrix VMAX
 
Partnership for the Private Cloud
Partnership for the Private CloudPartnership for the Private Cloud
Partnership for the Private Cloud
 
EMC Cloud Computing Casee Studies for Zimbabwe breakfast briefing by Grant Mu...
EMC Cloud Computing Casee Studies for Zimbabwe breakfast briefing by Grant Mu...EMC Cloud Computing Casee Studies for Zimbabwe breakfast briefing by Grant Mu...
EMC Cloud Computing Casee Studies for Zimbabwe breakfast briefing by Grant Mu...
 
101 ab 1445-1515
101 ab 1445-1515101 ab 1445-1515
101 ab 1445-1515
 
101 ab 1445-1515
101 ab 1445-1515101 ab 1445-1515
101 ab 1445-1515
 
Your Data Center Boundaries Don’t Exist Anymore!
Your Data Center Boundaries Don’t Exist Anymore! Your Data Center Boundaries Don’t Exist Anymore!
Your Data Center Boundaries Don’t Exist Anymore!
 
EMC's IT's Cloud Transformation, Thomas Becker, EMC
EMC's IT's Cloud Transformation, Thomas Becker, EMCEMC's IT's Cloud Transformation, Thomas Becker, EMC
EMC's IT's Cloud Transformation, Thomas Becker, EMC
 
Juniper Provision - 13martie2012
Juniper Provision - 13martie2012Juniper Provision - 13martie2012
Juniper Provision - 13martie2012
 
The Marriage Between Cloud and ITSM
The Marriage Between Cloud and ITSMThe Marriage Between Cloud and ITSM
The Marriage Between Cloud and ITSM
 
Weather report 2014
Weather report 2014Weather report 2014
Weather report 2014
 
Opportunities for students in the New World of Cloud and Big Data
Opportunities for students in the New World of Cloud and Big DataOpportunities for students in the New World of Cloud and Big Data
Opportunities for students in the New World of Cloud and Big Data
 
Tucci emc world 2011 fina lb
Tucci emc world 2011 fina lbTucci emc world 2011 fina lb
Tucci emc world 2011 fina lb
 
Supelec M2M, IoT - course - conclusions - 2012
Supelec   M2M, IoT - course - conclusions - 2012Supelec   M2M, IoT - course - conclusions - 2012
Supelec M2M, IoT - course - conclusions - 2012
 
Emc keynote 1030 1130
Emc keynote 1030 1130Emc keynote 1030 1130
Emc keynote 1030 1130
 
The marriage between Cloud and ITSM
The marriage between Cloud and ITSMThe marriage between Cloud and ITSM
The marriage between Cloud and ITSM
 

Plus de EMC

INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDINDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDEMC
 
Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote EMC
 
EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC
 
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOTransforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOEMC
 
Citrix ready-webinar-xtremio
Citrix ready-webinar-xtremioCitrix ready-webinar-xtremio
Citrix ready-webinar-xtremioEMC
 
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC
 
EMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC
 
Modern infrastructure for business data lake
Modern infrastructure for business data lakeModern infrastructure for business data lake
Modern infrastructure for business data lakeEMC
 
Force Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereForce Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereEMC
 
Pivotal : Moments in Container History
Pivotal : Moments in Container History Pivotal : Moments in Container History
Pivotal : Moments in Container History EMC
 
Data Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewData Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewEMC
 
Mobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeMobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeEMC
 
Virtualization Myths Infographic
Virtualization Myths Infographic Virtualization Myths Infographic
Virtualization Myths Infographic EMC
 
Intelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityIntelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityEMC
 
The Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeThe Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeEMC
 
EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC
 
EMC Academic Summit 2015
EMC Academic Summit 2015EMC Academic Summit 2015
EMC Academic Summit 2015EMC
 
Data Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesData Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesEMC
 
Using EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsUsing EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsEMC
 
Using EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookUsing EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookEMC
 

Plus de EMC (20)

INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDINDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
 
Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote
 
EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX
 
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOTransforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
 
Citrix ready-webinar-xtremio
Citrix ready-webinar-xtremioCitrix ready-webinar-xtremio
Citrix ready-webinar-xtremio
 
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
 
EMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC with Mirantis Openstack
EMC with Mirantis Openstack
 
Modern infrastructure for business data lake
Modern infrastructure for business data lakeModern infrastructure for business data lake
Modern infrastructure for business data lake
 
Force Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereForce Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop Elsewhere
 
Pivotal : Moments in Container History
Pivotal : Moments in Container History Pivotal : Moments in Container History
Pivotal : Moments in Container History
 
Data Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewData Lake Protection - A Technical Review
Data Lake Protection - A Technical Review
 
Mobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeMobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or Foe
 
Virtualization Myths Infographic
Virtualization Myths Infographic Virtualization Myths Infographic
Virtualization Myths Infographic
 
Intelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityIntelligence-Driven GRC for Security
Intelligence-Driven GRC for Security
 
The Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeThe Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure Age
 
EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015
 
EMC Academic Summit 2015
EMC Academic Summit 2015EMC Academic Summit 2015
EMC Academic Summit 2015
 
Data Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesData Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education Services
 
Using EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsUsing EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere Environments
 
Using EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookUsing EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBook
 

Dernier

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 

Dernier (20)

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 

RSA E-Commerce Fraud Trends 2013

  • 1. E-COMMERCE FRAUD TRENDS 2013 Wednesday, Feb. 20th 9:00 AM/EST Limor S Kessem Technical Lead, U.S./Canada Toll-Free 1-866-289-3291 PIN: 8272 FraudAction Knowledge Delivery International Toll Richard Booth Dial 001-503-295-8000, then Senior Fraud Technology Consultant enter 866-289-3291 and PIN: 8272 Or listen via your computer speakers: Under the Voice & Video tab select “Join Audio” © Copyright 2012 EMC Corporation. All rights reserved. 1
  • 2. Agenda  Statistics  Where it all stems from?  How is fraud committed?  How can we protect ourselves? © Copyright 2012 EMC Corporation. All rights reserved. 2
  • 3. Global e-commerce 2013 Expected to total almost $1 trillion worldwide in 2013. © Copyright 2012 EMC Corporation. All rights reserved. 3
  • 4. Europeans shopping online: Top 10 90% 80% 70% 60% 50% 40% 30% 20% 10% 0% Source: EuroStat © Copyright 2012 EMC Corporation. All rights reserved. 4
  • 5. Ecommerce is everywhere… Consumers are using their smartphones to bridge the gap between brick-and-mortar stores and ecommerce eBay Mobile 13,161,000 unique PayPal shoppers in 1 month +5m active new 1:04:02 hrs accounts in 4Q2012, Fastest rate in 8 years! © Copyright 2012 EMC Corporation. All rights reserved. 5
  • 6. Losses to e-commerce fraud Cybercrime costs UK retailers over £200 million a year (British Retail Consortium). Total fraud losses on UK cards totaled £185 million between January and June 2012 Payment fraud losses are only 0.5% of all fraud losses in the UK (The UK Cards Association) Losses incurred on Irish-issued payment cards show losses of €25.7 million recorded in 2011 © Copyright 2012 EMC Corporation. All rights reserved. 6
  • 7. Intelligence = Power © Copyright 2012 EMC Corporation. All rights reserved. 7
  • 8. Intelligence = Power © Copyright 2012 EMC Corporation. All rights reserved. 8
  • 9. The Underground? The Underground World of Fraud © Copyright 2012 EMC Corporation. All rights reserved. 9
  • 10. © Copyright 2012 EMC Corporation. All rights reserved. 10
  • 11. The Fraud Underground © Copyright 2012 EMC Corporation. All rights reserved. 11
  • 12. Fraudsters Botmasters Blackhats Hacktivists © Copyright 2012 EMC Corporation. All rights reserved. 12
  • 13. Malware Infrastructure Data vendors Stolen Data Con artists and Con artists programmers Services thieves and thieves Vendors © Copyright 2012 EMC Corporation. All rights reserved. 13
  • 14. E-commerce fraud – The supply chain  Con artists – devise ploys – Create and deploy social engineering schemes which include: ecommerce phishing and spam tactics designed to harvest credentials.  Data trafficking – Buy, sell and trade in credentials, account information, card numbers, victim contact details, PII, credit reports © Copyright 2012 EMC Corporation. All rights reserved. 14
  • 15. E-commerce fraud – The supply chain  Mule herders – Recruit and command money mules – Recruit and command item drop mules  Cashout services – Offer a variety of options to fraudsters looking for exchange possibilities and monetization schemes © Copyright 2012 EMC Corporation. All rights reserved. 15
  • 16. E-commerce fraud – The supply chain  Forgery service providers – Create fake documentation – from statements to ID cards, driving licenses and passports. – Provide cloned cards that are a replica of the real plastic card  Dark shoppers – Offer purchasing services – In-store pick-up – E-commerce fraud tutorials © Copyright 2012 EMC Corporation. All rights reserved. 16
  • 17. The flow of events © Copyright 2012 EMC Corporation. All rights reserved. 17
  • 18. The planning phase  Step #1 – Plan, buy a card… or 100 This happens in deep-web venues © Copyright 2012 EMC Corporation. All rights reserved. 18
  • 19. E-commerce fraud – Flow of events Buy data COB Reship Monetize Time Verify Shop Resell validity © Copyright 2012 EMC Corporation. All rights reserved. 19
  • 20. A market… Deep (web) conversations Before… IRC Today… Organized boards © Copyright 2012 EMC Corporation. All rights reserved. 20
  • 21. The planning phase © Copyright 2012 EMC Corporation. All rights reserved. 21
  • 22. Where are these details purchased? © Copyright 2012 EMC Corporation. All rights reserved. 22
  • 23. What feeds the stolen data supply? Classic phishing – aimed at  Phishing attacks ecommerce merchants SMShing  Trojan logs  Hacked payment processors Trojan  Hacked online retailers injections  Big breaches that expose financial data for that ask victim card  Data traffickers who have “warehouses” of details information Trojan plugins designed to grab and parse CC data © Copyright 2012 EMC Corporation. All rights reserved. 23
  • 24. Verify card validity: CC Checking  Check via phone merchants  Check via online merchants  Check via adapted checking services  Check inside the CC shops  Check via rogue merchant infrastructures © Copyright 2012 EMC Corporation. All rights reserved. 24
  • 25. Obtain additional details  Get online access to the card’s account  Attempt to guess/reset the VBV/MSC Password if need be  Call the bank as needed © Copyright 2012 EMC Corporation. All rights reserved. 25
  • 26. Get an item-drop mule (reshipping)  The fraud underground has a number of options to offer thieves: – Accomplices – Dark shopper services – In-store pick up of ordered goods – Pick your own item drop mule – A full-service turnkey solution: from buy to monetize © Copyright 2012 EMC Corporation. All rights reserved. 26
  • 27. Reshipping mules: Pick one  The herder recruits people to work  Each new “employee” is added to the list  The mule can be picked out online  Each mule is available for a number of shipments according to the herder’s rules © Copyright 2012 EMC Corporation. All rights reserved. 27
  • 28. E-commerce fraud – Flow of events Buy data COB Reship Monetize Time Verify Shop Resell validity © Copyright 2012 EMC Corporation. All rights reserved. 28
  • 29. The COB – Change of Billing  Goal: change the billing address on the acct  “Enrolls” – attempt to access the card online  Add a shipping address/mailing address  Look for details on the victim  Add a mobile number and email address  Non-native speakers contract underground services to help them achieve the goal © Copyright 2012 EMC Corporation. All rights reserved. 29
  • 30. What is ‘Carding’  The fraudulent use of payment cards is dubbed ‘Carding’  Fraudsters are after easy-to-card merchants  They usually avoid secure, large merchants  Prey on smaller shops and tell their friends about them  Usually card high-value electronics and popular goods © Copyright 2012 EMC Corporation. All rights reserved. 30
  • 31. The action phase: Go shopping  Step #2 – Theft Happens in e-commerce sites © Copyright 2012 EMC Corporation. All rights reserved. 31
  • 32. Dark shopper services © Copyright 2012 EMC Corporation. All rights reserved. 32
  • 33. E-commerce fraud – Flow of events Buy data COB Reship Monetize Time Verify Shop Resell validity © Copyright 2012 EMC Corporation. All rights reserved. 33
  • 34. Item drop and reship  Step #3 – Ship the goods – Happens at item drop addresses © Copyright 2012 EMC Corporation. All rights reserved. 34
  • 35. The mule…  The mule receives the goods at home  The mule prints and re-tickets the item  The mule will reship the item(s)  The fraudster will receive it – or…  The mule herder will receive and sell the item, then share the loot  In-store pick up mules will go to the shop and then reship… © Copyright 2012 EMC Corporation. All rights reserved. 35
  • 36. E-commerce fraud – Flow of events Buy data COB Reship Monetize Time Verify Shop Resell validity © Copyright 2012 EMC Corporation. All rights reserved. 36
  • 37. Monetize  Step #4 – Monetize – Happens between accomplices online/on the streets © Copyright 2012 EMC Corporation. All rights reserved. 37
  • 38. Fighting Fraud © Copyright 2012 EMC Corporation. All rights reserved. 38
  • 39. Protecting cardholders - Prevention  Banks can tighten security around COBs  Fraudsters fail when VBV/MSC codes cannot be reset or bypassed, blacklisting BINs  Fraudsters will steer clear of secure platforms that provide them no added information (enrollment phase security)  Identity verification over the phone  Card-cloning criminals fail when last 4 digits of the card must match their plastic © Copyright 2012 EMC Corporation. All rights reserved. 39
  • 40. Fighting back! © Copyright 2012 EMC Corporation. All rights reserved. 40
  • 41. Cardholder education is key  Fraudsters will try to enroll cards – they can be stopped! – Encourage customers to register their cards to the online service and be sure to review them regularly.  Fraudsters dread the premature discovery of a pending fraudulent delivery/transaction – Encourage customers to use the alerting services you offer (email, SMS) © Copyright 2012 EMC Corporation. All rights reserved. 41
  • 42. Informed customers help prevent fraud  Inform customers about phishing for card information  Inform customers about shopping via mobile devices and through apps – Mobile devices can be just as easily targeted by phishing and rogue shopping apps as the PC – Warn customers about downloading shopping and banking apps from third party websites © Copyright 2012 EMC Corporation. All rights reserved. 42
  • 43. Cardholders have the power  … to avoid phishing scams by never divulging financial information online  … to call their bank when they are unsure of the source of a suspicious email  … to control the shipping process of orders they placed © Copyright 2012 EMC Corporation. All rights reserved. 43
  • 44. Cardholders have the power  … to monitor their card when they hand it to a shop attendant  … to only buy from well-known, reputable merchants  …to choose to receive alerts when purchases are processed on their cards  … to regularly review their accounts, especially during the holidays © Copyright 2012 EMC Corporation. All rights reserved. 44
  • 45. Deception is only deception © Copyright 2012 EMC Corporation. All rights reserved. 45
  • 46. Managing Fraud Risk © Copyright 2012 EMC Corporation. All rights reserved. 46
  • 47. Threats Occur Across the Entire User Session InfoSec Pre-Authentication Threats Fraud Post-Authentication Threats Beginning of Login Transaction Web Session and Logout Account Takeover Parameter Injection Site Scraping Man In The Browser High Risk Checkout Vulnerability Probing Password Guessing Unauthorized Account New Account DDOS Attacks Registration Fraud Activity Fraudulent Money Movement Phishing Attacks Access From High Risk Country Man In The Middle Promotion Abuse © Copyright 2012 EMC Corporation. All rights reserved. 47
  • 48. RSA FraudAction Services • Anti-Phishing Service Detect and shut down phishing sites • Anti-Trojan Service Detect and shut down malware targeting customers • Anti Rogue App Service - Detect and shut down rogue mobile apps • FraudAction Intelligence Reports about fraud activities, trends in the underground © Copyright 2012 EMC Corporation. All rights reserved. 48
  • 49. SilverTail Web Session Intelligence Criminals Behave Differently Than Customers Velocity Page Sequence Origin Contextual Information © Copyright 2012 EMC Corporation. All rights reserved. Anomalous Behavior Detection 49
  • 50. RSA Adaptive Authentication  Transparent real-time fraud detection and authentication without sacrificing user experience  Monitor and authenticate both login and post login activities  Risk based self-learning engine which rapidly adjusts policies and controls to predict and protect against future attacks  Collaborative real-time cross- institution fraud intelligence sharing © Copyright 2012 EMC Corporation. All rights reserved. 50
  • 51. RSA Adaptive Behavior Device Fraud Authentication 937 271 Policy Mgr. Authenticate Continue Risk Engine Activity details Knowledge Challenge Out-of- Others band Feedback Step-up Authentication Feedback Case Mgmt © Copyright 2012 EMC Corporation. All rights reserved. 51
  • 52. RSA Adaptive Authentication for eCommerce • Balance risk, cost and convenience with no enrollment • Transparent real-time fraud detection with minimal impact to card holders user experience • Risk based system that learns from past behavior and rapidly adjusts to predict and protect against future attacks • Collaborative real-time cross-institution sharing of fraud-connected data via RSA eFraudNetwork • Worldwide availability to issuing banks as centrally hosted service © Copyright 2012 EMC Corporation. All rights reserved. 52
  • 53. RSA Adaptive Authentication for eCommerce Transparent • Low risk transparently authenticated - no cardholder engagement Auth Mandatory • Risky transactions challenged via KBA, OTP SMS, Data Elements Auth Decline • Highest risk transactions are declined © Copyright 2012 EMC Corporation. All rights reserved. 53
  • 54. RSA’s Layered Protection for Fraud Prevention © Copyright 2012 EMC Corporation. All rights reserved. 54
  • 55. Q&A © Copyright 2012 EMC Corporation. All rights reserved. 55