Blog Posts Tagged with "Device Reputation"
August 20, 2012 Added by:Robert Siciliano
While less money was ultimately siphoned from banks and customers than in past years, there are new attack strategies on the horizon, which may push these numbers up in 2012. Threats, defenses, and vulnerabilities continually emerge, so stay tuned as we track the shifts in our evolving security landscape...
July 09, 2012 Added by:Robert Siciliano
It’s no longer possible to deny that your life in the physical world and your digital life are one and the same. While you are present here on the ground, you also exist online, whether you know it or like it or not. Coming to terms with this reality will help you make better decisions in many aspects of your life...
June 12, 2012 Added by:Robert Siciliano
EFTPOS skimming — which stands for “electronic funds transfers at the point of sale” — involves either replacing the self-swipe point of sale terminals at cash registers with devices that record credit and debit card data, or remotely hacking a retailer’s POS server...
November 30, 2011 Added by:Robert Siciliano
As far back as I can remember, police have been warning of thieves who target cars in parking lots, smashing windows to steal shopping bags left in plain sight. Now the warnings are different: no longer so focused on crime in the physical world, but instead, on threats in the virtual world...
November 01, 2011 Added by:Robert Siciliano
Not a week goes by when we don’t hear of another major breach affecting thousands or even millions of customer accounts. Criminal hackers are getting smarter and savvier all the time, and they often have better technology than the banks and retailers tasked with protecting your data...
October 27, 2011 Added by:Robert Siciliano
When merchants moved from catalogs to websites, IP addresses were used to track transactions. But bad guys figured out how to spoof them. Now we have a number of new technologies designed to fight credit card fraud. The most effective and widely implemented is device reputation...
August 07, 2011 Added by:Robert Siciliano
“Complex device identification” is more sophisticated. This security technique relies on disposable, one-time cookies, and creates a complex digital fingerprint based on characteristics including PC configuration, Internet protocol addresses, and geolocation...
June 28, 2011 Added by:Robert Siciliano
Device fingerprinting coupled with the device’s reputation and risk profile helps identify the bad guys in the acquisition channel, so you don’t have to rely on other fraud detection tools that drive up the cost to decision an application...
May 21, 2011 Added by:Robert Siciliano
Device reputation, an effective online fraud prevention method, helps protect retailers from fraudulent CNP transactions by examining the computer or other device for a history of unwanted behavior plus any suspicious activity at the time of transaction...
April 08, 2011 Added by:Robert Siciliano
Friendly fraud accounted for twenty percent of fraud affecting merchants. Friendly fraud is when a consumer purchases an item online, receives it, but claims they did not, then requests a refund or chargeback from the merchant or delivery of a duplicate item...
March 09, 2011 Added by:Robert Siciliano
Rather than looking at the information provided by the user, go deeper to identify the computer being used so that negative behaviors are exposed early and access to threatening accounts are denied before your business reputation is damaged and your users abused...
February 16, 2011 Added by:Robert Siciliano
Device reputation spots online evildoers by examining the computer, smartphone, or tablet they are using to connect to any website. If a device is recognized as having previously committed some type of unwanted behavior, the website has the opportunity to reject the transaction...
Mobile Security Processes Could Be Applied t... Johnnie Nix on 05-21-2013
ATM Security (And Really Learning from the P... Johnnie Nix on 05-21-2013
New Study Published on Mobile Malware... Caitlin Rachel on 05-21-2013