article thumbnail

Visa Targets Bot-Driven Financial Fraud with New AI Feature

Fintech News

Enumerated transactions impact the entire ecosystem, and with the VAAI Score, we’re giving our clients a sophisticated tool that can help prevent cardholder accounts from being compromised and stop fraudulent transactions before they happen.” said Michael Jabbara, SVP Global Head of Fraud Services, at Visa.

Bots 111
article thumbnail

Account opening fraud must be stopped before the breach

Payments Source

There are a number of tactics and solutions organizations can employ to shut down the favored methods of fraudsters, including the use of bots and device compromise, writes Michael Lynch, chief strategy officer at InAuth.

Bots 70
article thumbnail

European Regulators Expand Scrutiny On Data Practices – And Bots

PYMNTS

For example, firms are banned from using bots in a way that allows them to buy thousands of tickets for events and then resell them for highly marked-up prices. In an example of fines tied to data breaches and compromises, the Information Commissioner’s Office (ICO) is fining Dixons Carphone £500,000 (about $650,000).

Bots 52
article thumbnail

Why Mobile Rewards Programs Attract Fraud

PYMNTS

Chipotle attributed the April attack to credential stuffing, in which a hacker uses a bot to automatically enter usernames and passwords stolen from other websites to try to find matches. In Japan, convenience store chain 7-Eleven fell victim to a data breach last month that compromised approximately 900 customers’ accounts.

article thumbnail

Deep Dive: Reducing The Security Risks Of Open Banking

PYMNTS

The most popular technique, credential abuse, involves fraudsters using compromised passwords and other login information to gain access to sensitive systems. Any data breach that exposes one of their accounts potentially compromises every account that shares the same password. There were 85.42 There were 85.42

MFA 96
article thumbnail

BullGuard Debuts Dojo, Cybersecurity Device That Detects Threats from At-Home IOT

PYMNTS

This is largely because IoT devices offer easily accessible bandwidth and CPU at no cost to the attacker, with much less effort to compromise than a modern PC or laptop,” Jose Nazario, director of security research at Fastly, told Forbes.

article thumbnail

Deep Dive: Why Leveraging Biometrics Can Ease FIs’ $4B ATO Problem

PYMNTS

A popular brute force method used to accomplish this is credential cracking , which involves fraudsters using bots to automatically plug potential usernames and passwords into login screens in the hopes of stumbling across the correct credentials.