Online Credit Card Fraud In Australia Surges

Cyber criminals are becoming increasingly sophisticated about credit card fraud as more consumer payments move online, according to a new report.

The Australian Payments Network, the industry's self-regulatory body, has revealed a significant increase in card fraud, with stolen card details accounting for 78 per cent of fraudulent card transactions.

In its annual fraud data report, the network found "card not present" fraud increased in 2016, netting criminals $417.6 million as fraudsters keep pace with consumers moving online. "Card not present" fraud occurs when a customer's valid card details are stolen and then used to make purchases without the physical card, typically online.

Ghost Terminals

Criminals are also continuing to target unwitting consumers with "ghost terminals" where fake terminals, which are not connected to a payments network, "skim" card details. The report found a 13 per cent increase in card skimming through ghost terminals, and that banks and retailers are constantly exposed to new criminal techniques.

The network's chief executive Leila Fourie told the ABC's AM program that businesses and consumers need to be vigilant, given that online spending is growing faster than traditional "bricks and mortar" retail spending.
"These ghost terminals are a function of globally syndicated fraud units and they're highly sophisticated and able to interact across the internet and online," Ms. Fourie said.

The threat from cyber criminals follows a study by the Australian Reserve Bank released last week showing that card payments have overtaken cash payments for the first time. Ms. Fourie said, while Australia is less exposed because of the adoption of chip and pin technology, banks are in a constant race to counter the criminal use of tools such as algorithms to rip off consumers. "Banks and retailers are certainly keeping up with the criminals," she said. But, unfortunately, crime and fraud is as old as bank robbery and it will always be with us. "It's now about pre-empting and identifying new areas of vulnerability in new technologies."

The report found that in 2016, Australians used cards to spend a record $714.5 billion online, with fraud accounting for $534 million or 0.74 per cent of card transactions.

It found that for every $1,000 spent online with cards fraud swallowed 74.7 cents (up from 66.9 cents in 2015). 
The network concluded that Australia is well advanced in fraud detection, with major investment by the industry in chip, token and customer authentication tools.

ABC

You Might Also Read: 

Six Seconds To Hack A Credit Card:

US Credit Card Fraud Props Up The  Russian Black Market:

Australia Implements Mandatory Data Breach Reporting:

 
« Cloud Portability Is Still Science Fiction
Terrorism, A Sea Change In Tactics »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Ahope

Ahope

Ahope is a mobile security solution provider in Korea with a long history of security solution development.

London Office for Rapid Cybersecurity Advancement (LORCA)

London Office for Rapid Cybersecurity Advancement (LORCA)

LORCA's mission is to support the most promising cyber security innovators in growing solutions to meet the most pressing industry challenges and build the UK’s international cyber security profile.

Excellium Services

Excellium Services

Excellium’s Professional Services team combines expertise and experience that complements your in-house security resources.

Portuguese Institute for Accreditation (IPAC)

Portuguese Institute for Accreditation (IPAC)

IPAC is the national accreditation body for Portugal. The directory of members provides details of organisations offering certification services for ISO 27001.

Consortium for Information & Software Quality (CISQ)

Consortium for Information & Software Quality (CISQ)

The mission of CISQ is to develop international standards for software quality and to promote the development and sustainment of secure, reliable, and trustworthy software.

GreenWorld Technologies

GreenWorld Technologies

GreenWorld has a proven track record in industry leading IT asset management, secure data destruction and remarketing.

Fend

Fend

Fend secures smart infrastructure. We provide a robust, highly secure way to have situational awareness of IoT enabled assets.

AngelList

AngelList

AngelList champion startups and the people who empower them. Search tech & startup jobs, find new tech products, and invest in startups.

SimSpace

SimSpace

SimSpace is the visionary yet practical platform for measuring how your security system responds under actual, sustained attack.

MVP Tech

MVP Tech

MVP Tech designs and deploys next generation infrastructures where Security and Technology converge.

Thistle Technologies

Thistle Technologies

Thistle Technologies is building tools that help connected device manufacturers build security resiliency into devices.

Enea

Enea

Enea is one of the world’s leading specialists in software for telecommunications and cybersecurity. Our products are used to enable services for mobile subscribers, enterprise customers and IoT.

Quantropi

Quantropi

Quantropi is bound to be the standard for quantum-secure data communications – forever unbreakable, no matter what.

Scholarly Networks Security Initiative (SNSI)

Scholarly Networks Security Initiative (SNSI)

SNSI brings together publishers and institutions to solve cyber-challenges threatening the integrity of the scientific record, scholarly systems and the safety of personal data.

Silent Push

Silent Push

Silent Push maps all internet-facing infrastructure with searchable, advanced attributes, generating early indicators of potential threats that are tailored to your environment.

Dev Information Technology (Dev IT)

Dev Information Technology (Dev IT)

Dev IT delivers digital transformation and end-to-end information technology services.