Online Credit Card Fraud In Australia Surges

Cyber criminals are becoming increasingly sophisticated about credit card fraud as more consumer payments move online, according to a new report.

The Australian Payments Network, the industry's self-regulatory body, has revealed a significant increase in card fraud, with stolen card details accounting for 78 per cent of fraudulent card transactions.

In its annual fraud data report, the network found "card not present" fraud increased in 2016, netting criminals $417.6 million as fraudsters keep pace with consumers moving online. "Card not present" fraud occurs when a customer's valid card details are stolen and then used to make purchases without the physical card, typically online.

Ghost Terminals

Criminals are also continuing to target unwitting consumers with "ghost terminals" where fake terminals, which are not connected to a payments network, "skim" card details. The report found a 13 per cent increase in card skimming through ghost terminals, and that banks and retailers are constantly exposed to new criminal techniques.

The network's chief executive Leila Fourie told the ABC's AM program that businesses and consumers need to be vigilant, given that online spending is growing faster than traditional "bricks and mortar" retail spending.
"These ghost terminals are a function of globally syndicated fraud units and they're highly sophisticated and able to interact across the internet and online," Ms. Fourie said.

The threat from cyber criminals follows a study by the Australian Reserve Bank released last week showing that card payments have overtaken cash payments for the first time. Ms. Fourie said, while Australia is less exposed because of the adoption of chip and pin technology, banks are in a constant race to counter the criminal use of tools such as algorithms to rip off consumers. "Banks and retailers are certainly keeping up with the criminals," she said. But, unfortunately, crime and fraud is as old as bank robbery and it will always be with us. "It's now about pre-empting and identifying new areas of vulnerability in new technologies."

The report found that in 2016, Australians used cards to spend a record $714.5 billion online, with fraud accounting for $534 million or 0.74 per cent of card transactions.

It found that for every $1,000 spent online with cards fraud swallowed 74.7 cents (up from 66.9 cents in 2015). 
The network concluded that Australia is well advanced in fraud detection, with major investment by the industry in chip, token and customer authentication tools.

ABC

You Might Also Read: 

Six Seconds To Hack A Credit Card:

US Credit Card Fraud Props Up The  Russian Black Market:

Australia Implements Mandatory Data Breach Reporting:

 
« Cloud Portability Is Still Science Fiction
Terrorism, A Sea Change In Tactics »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

SureCloud

SureCloud

SureCloud is a Governance, Risk and Compliance (GRC) and Cybersecurity Solutions provider.

A10 Networks

A10 Networks

A10 Networks is a leader in application networking, helping organizations of all sizes to accelerate, optimize and secure their applications.

CERT.BY

CERT.BY

The National Computer Emergency Response Team of the Republic of Belarus.

CERT Bulgaria (CERT.BG)

CERT Bulgaria (CERT.BG)

CERT Bulfaria is the National Computer Security Incidents Response Team for Bulgaria.

ID Agent

ID Agent

ID Agent provides a comprehensive set of threat intelligence and identity monitoring solutions.

Perseus Cyber Security

Perseus Cyber Security

Perseus provides all-around digital protection for small and medium-sized businesses through state-of-the-art software solutions, flexible online training and emergency response.

TROOPERS

TROOPERS

TROOPERS InfoSec event consists of two days of high-end training, followed by a two-day, three-track conference, culminating in Roundtables on the final day.

Innosphere Ventures

Innosphere Ventures

Innosphere Ventures is Colorado’s leading science and technology incubator, accelerating the success of high-impact startup and scaleup companies.

Reed

Reed

reed.co.uk is a leading job site in the UK, providing a full online service for anyone looking for a new job.

InGuardians

InGuardians

InGuardians is an independent information security consulting firm specializing in penetration testing, threat hunting, and hardware hacking.

HADESS

HADESS

We are "Hadess", a group of cyber security experts and white hat hackers.

Willyama Services

Willyama Services

Willyama Services is a certified Information Technology and Cybersecurity professional services business providing services to government and private sector clients.

All About Cookies

All About Cookies

All About Cookies is an informational website that provides tips, advice, and recommendations to help you with Online Privacy, Identity Theft Prevention, Antivirus Protection, and Digital Security.

Myrror Security

Myrror Security

Myrror Security is a software supply chain security solution that aids lean security teams in safeguarding their software against breaches.

DataProof Communications

DataProof Communications

DataProof Communications is Cybersecurity Company specialising in cybersecurity operations, incident management and response best practices and technologies.

Linx Security

Linx Security

The Linx Identity Security platform enables identity, security, and IT ops teams to finally control the whole identity lifecycle.