How to Mitigate Chargeback Fraud

  The mitigate chargeback process can be annoying, confusing and even stressful for merchants. But they ignore the problem at their own peril, since chargebacks – where a cardholder disputes a transaction so they can get their money back while retaining the product or services rendered – accounts for 35% of all fraud losses. Chargebacks…

Understanding PCI Compliance

Understanding PCI Compliance It’s a nightmare scenario for customers and manufacturers alike: a data breach exposing sensitive information to tech-savvy thieves. As Sears and Delta recently learned, the impact can be much worse if credit card data leaks. And despite IT teams’ best efforts, the question of another massive data breach is “when” rather than “if.” Back…

Scammers discovering ways to combat credit card chip technology

Scammers discovering ways to combat credit card chip technology. Last week’s data breach involving Zippy’s restaurants highlights the risks of using your credit card, despite all the security improvements made to help protect you from fraud. The Hawaii Better Business Bureau says scammers have discovered ways of combating credit card chip technology. In at least one…

What is transaction laundering and what is the Industry doing about it?

Transaction laundering has quickly evolved into one of the payment industry’s most prominent and most difficult problems. Transaction laundering — also previously known as “undisclosed aggregation” or “factoring” — occurs when a merchant processes unknown transactions on behalf of another business. This hidden business is often engaged in prohibited activities, and the “front” merchant may…

The new PCI DSS 3.2 standards – New authentication requirements for cardholder data

The new PCI DSS 3.2 standards – New authentication requirements for cardholder data. Poor password management – including the continued reliance on default, stolen, weak and non-unique passwords – is a key factor in more than 80% of hack-driven breaches, according to Verizon’s 2017 Data Breach Investigation Report. In response to growing waives of fraud…