Credit Card & Transaction Fraud Schemes

Zalud, Bill
June 2008
Security: Solutions for Enterprise Security Leaders;Jun2008, Vol. 45 Issue 6, p94
Trade Publication
The article offers information about several factors which can be used for credit card fraud against merchants in the U.S. These include mail and Internet order, account takeover which involves a criminal trying to take over another person's account, and skimming as the theft of credit card information. The article also offers the core requirements for the Payment Card Industry (PCI) Data Security Standard.


Related Articles

  • Payments Security: As Stron as the Weakest Link. Windh, Jennifer C. // EconSouth;2011, Vol. 13 Issue 3, p18 

    The article offers the insights of several economists on the risk of the U.S. payments industry to data breach, as well as provides protective measures. Economist Will Roberds mentions the vulnerability of banks and related payments entities to theft as they gather more and more data of their...

  • Agents face charges for non-compliance. Robertson, Edward // Travel Weekly (UK);9/25/2009, p7 

    The article reports that several travel agents in Great Britain were forced to pay additional bank charges for failing to comply with credit-card security checks. It is stated that banks have made it compulsory for agents to meet the Payment Card Industry Data Security Standard (PCI DSS), an...

  • Rest assured. Lorinc, John // CA Magazine;Jan/Feb98, Vol. 131 Issue 1, p16 

    Presents information on how credit card numbers can find their way into general circulation while focusing on KPMG Peat Marwick principal John van Ruth an accountant. Reference to several examples; Information on a service to provide privacy on the Web by CA WebTrust; Where the service was...

  • Keeping your credit report clean. Cox, Charles // Overdrive;Nov97, Vol. 37 Issue 11, p29 

    Gives advice on avoiding credit card fraud. Security in keeping credit card and account information private; Comparison of receipts with statement; Inspection of file once a year.

  • Preventing credit card forgery.  // USA Today Magazine;Apr94, Vol. 122 Issue 2587, p7 

    Focuses on the development of a technique that could eliminate majority of credit card fraud in the United States. Discovery of magnetic signature identifiable electronically by Ronald S. Indeck and Marcel W. Muller; Mechanism of identification of electronic fingerprints of objects carrying...

  • Rip-offs rise with growing credit-card usage. Redmond, Jack // Inside Tucson Business;07/28/97, Vol. 7 Issue 18, p24 

    Advises businesses on how to prevent rip-offs from credit card swindlers and scam artists. Includes training employees to key in on anything suspicious in the caller's tone of voice; Asking for the cardholder's billing address and day and evening phone numbers; Double checking post office box...

  • Avoiding credit card fraud. Anthony, J. // Consumers' Research Magazine;May88, Vol. 71 Issue 5, p23 

    Several ways to be victimized by credit card fraud; Lost or stolen cards; How your credit card is misused by using a discarded carbon or by charging on your credit card by phone; Double imprinting; Counterfeit cards; Limited liability of owner; Bank machines; Preventive measures to avoid...

  • A magnetic `fingerprint' will put credit card forgers out of business...  // Consumers' Research Magazine;Feb94, Vol. 77 Issue 2, p41 

    Highlights the work of researchers who have invented a new technique to identify any device carrying magnetic information. Possible impact of this technique on credit card forgeries; The magnetic signature on a card's magnetic stripe; Telephone number for more information.

  • Preventing credit card crime. Ballard, Michael // Canadian Banker;Mar/Apr92, Vol. 99 Issue 2, p34 

    Presents tips from the Canadian Bankers Association on how to avoid credit card fraud. Includes warning against leaving the card unattended at work and in other places; Need to report stolen or lost card immediately; Importance of writing down a list of one's credit cards and their numbers.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics