Fraud with bank cards and the fight against it.

Plastic bank cards is a universal means of payment.It provides non-stop access to the money contained in your account.Debit cards may be debit and credit.The article focuses on how to protect themselves from fraud.

details on maps

plastic card itself does not contain funds.All of them are at the owner's expense.A piece of plastic - only means of access to the money.

On the outer side of the card are shown details of the owner, are needed to identify the bank and the decision to perform the requested operation.To use the card, not necessarily her physical presence.Suffice it to specify details.

Today invented lots of ways to leave a respectable holder bank debit or credit card with no funds.Written by various malware.Stealing personal data of the cardholder.To hack the servers of enterprises and banks.By sending different messages to the mobile phone and therefore gullible citizens criminals gain access to accounts, etc.Fraud with bank cards - a profitable and low-risk business.And this is because to catch the attacker, and to prove his guilt is not so simple.Cyber ​​crime in modern society through the use of information technologies for criminal purposes is massive.It makes cardholders become hostages of the situation and and thus be vulnerable to scams.

way to access maps

plastic card fraud can happen in one of two ways.

1. According stolen or counterfeit cards to purchase goods for resale.

2. Using various tricks attackers gain access to the ATM, account details and PIN code.

ATM or an ATM (automated telling (teller) machine) designed to simplify transactions for issuing, receiving, transfer cash, payment services and other financial transactions, without the participation of an employee of a credit institution.This use these services at any time of the day.Simplicity, convenience and direct access to cash ATMs in demand and made popular among the population, and, consequently, among criminals.

fraud with bank cards occurs by hacker attacks aimed at the ATM.Also, it may be done by copying the information from the magnetic stripe card, for setting denominations of traps, which leads to the disappearance of money or not issuing the entire requested amount of ATM.

lost or stolen plastic card into the hands of fraudsters could face its owner writing off all funds held in the account.The same goes for the fake credit card, which is made in the name of a specific person, on account of which funds are available.

Types of card fraud

Today, with this information, it is desirable to get acquainted to each citizen.Fraud plastic card includes many different kinds of tricks and deception.

Forgery - manufacture of plastic with identical details of this card is the real owner.This trick allows you to perform any operations.To save yourself from fraud, the bank establishes protection from selection details.Development of methods of stealing money from the card has made this method less profitable.Now simpler option is stealing details.

Phishing - the method of theft by which the fraudsters through various means of communication (phone, email, etc.) associated with the cardholder on behalf of the bank.Their goal is to find out confidential data owner.Phone phishing - a very common way to steal.Since the card holder receives a call, usually a message informing that the account payment is made, it is necessary to repay the debt, the card is blocked, etc.The call is carried out automatically and voiced electronic voice with alarming information, without specifying the data about the financial institution from which the message is sent.Then for more information will need to contact the operator.The same point in the text of SMS messages and e-mail.During the call to the specified number of the operator tries to find out confidential information, which subsequently allowed criminals to empty cards.Fraud by skimming allows copying the data using a special device mounted on the ATM.

Steal card details from the servers of online stores that are not required to keep records of their respective owners.But it is often not observed.The fraudsters are successful.

Sometimes unscrupulous bank employees themselves provide criminals card data.Or due to staff negligence that information become the property of the intruders.

With the help of special equipment fraudsters hack into the card along with the PIN when using an ATM using special devices (Micro, false keyboard, card readers).Such equipment reads the details and a password.

use fake ATM also allows you to empty cards.Fraud made way "Lebanese loop".This option allows criminals to take over someone else's card.To do this, scammers placed in the slot reader a piece of film that does not map to get out of the hole after the operation.Near the attackers are offering to enter a PIN code, saying that after this action will map.After unsuccessful attempts to contact the scammers convince the owner the next day the bank will work when collectors and engineers, and until then nothing will happen.The card can be safely leave.When the owner leaves the ATM fraudsters film is removed, the card.They remove all the facilities.

fraud with bank cards and going through CNP-transaction, that is, an operation performed in the Internet network on the basis of these details.The owner and his bank plastic is not involved.

Operations on lost or stolen cards, what happens in the interval of time between these events and locking plastic.Also, many people are oblivious write your PIN number on the card itself, on any piece of paper or in a notebook.In case of theft or loss of the bag with a purse fraudsters become holders of not only the entire contents, but also money from a personal account.

Acquiring - the way in which the repetition of the slip.It may also make changes to its content.For this is done on an electronic terminal prints a few slips or cards imprinter.This is necessary in order to be able to change the amount of the transaction or the creation of new payment documents after signing the customer slip.

Return buying threaten cardholder go into minus.For this crook, or a member of the hacker trade company, where the customer makes a purchase, the refund carries out the operation, which increases the card balance.Then the attacker uses enrolled agent.The trading company is recalling refund.The client remains in the red.

What to do when it detects the first signs of fraud?

fraud using payment cards - a very common phenomenon.His victim could be anyone with a plastic device.Therefore, when the first suspicions must immediately block the card.A bank can write a statement of disagreement with the operation, stating the reason, if it happened without your knowledge.

card fraud Sberbank

Plastic adaptation of the institution often subjected to various attacks by fraudsters.The most common methods of theft - SMS message with the text that the card is locked, and for the resumption of the operation is necessary to call the number indicated.Such notification text may get thousands of cardholders Sberbank.Do not forget that all messages sent by Sberbank, come from the same number.If the notification from the other recipient - are criminals.

Savings Bank card fraud most often occurs with plastic devices «Master Card Standard» and «Visa Classic».Therefore, to make purchases with them, especially on the Internet, it is necessary in the audited stores, which you can read the reviews.

PrivatBank

card fraud Privatbank most often carried out using a skimmer.To the introduction of pin-code the attackers did not see through the numbers preset camera, it is necessary to close a dialed hand combination.

Another way - "extra money", which allows fraudsters to come learn the code in a text message to the card holder, which they bill the owner (not suspecting a trick) dictates by telephone.It is often the case when you buy from online stores.

card fraud "Corn»

Criminals often use one more interesting way of theft of funds in which the card is used, "Corn."Fraud occurs by creating an online store, allegedly by "Euroset" in which you can make the purchase much cheaper than in the salon.Plus bonuses.To make a purchase, the counselor needs to dictate their full name, date of birth, barcode cards, a secret word, which came in a text message, that is, information that in any case we can not speak.After this card is debited from the account of the money, and the owner of the account is left without buying.

Who will return the stolen money?

refund stolen by fraudsters, occurs after the investigation, which should establish some facts.

1. Is it not the owner has spent their life savings, and then decided to return them?

2. Error ATM or bank?

3. Or is it the tricks of swindlers?

If it is determined that the write-off of money was not the fault of the card holder, he compensated the stolen amount.The issuer is obliged to return it, which is usually not in a hurry to do it.The burden of compensation is assigned to the point of sale or the acquirer.While participants understand about who should return loss, and who is to blame, the card holder can expect their money for a long time.In order not to delay the consideration by the regulator performs the payment system, forming uniform rules for all participants, timing and behavior of the algorithm.

process of investigation of theft from an account

Credit card fraud, as well as debit and plastic devices, comes the same methods.This means that the investigation to identify those responsible for what happened theft occurs by a single scheme.

First acquirer (the owner of the ATM) is debited with the amount that the holder disputes.The issuer (bank) requires the acquirer to provide documents.They must confirm debits.It is given thirty days.The deadline for acquiring offered claimed documents and familiarize them with the account holder.If the client agrees and confirms the fact of the transaction, the issue is considered resolved and terminated the investigation.If the acquirer has provided documents prepared with impaired or neglected terms, the amount debited from his account in favor of the bank (the issuer), and then remove the fact argued and states the reason for legality.At this stage, the money is not returned to the owner.After the cancellation, within forty-five days, if not followed by any action on the part of the acquirer, the stolen amount is credited to the account of the owner of a payment card.

There are situations when the owner of the ATM did not properly respond to the demand of the issuer to provide the documents, as it believes that neither he nor the retail outlet are not guilty of theft, therefore, are not required to be responsible for it.In this case, the investigation is carried out otherwise.

amount similar to the stolen funds debited from the issuer acquirer.This is documented.After that, the issuer has to prove his innocence before the acquirer.If this is not possible, the owner of the ATM returns the stolen amount to the cardholder.

There are cases where the arguments are unconvincing acquirer or not fully prove him right.In such cases, the responsibility for the theft rests on several aspects of the process and the investigation done by predarbitrazhnogo settlement.For this purpose, the issuer shall be filed within sixty days of a request for examination of the case since the chargeback.During the act, the issuer and the acquirer, which prove his innocence by bringing arguments and evidence.If the parties reach agreement, payment of losses occur equally, if not, the case is referred to an arbitration committee.It is a Commission of the payment system.The Committee shall consider all the arguments and evidence of the parties, and then concludes.The decision of the arbitration committee shall be binding.If the parties to the decision not to agree appealing, but the amount of theft in this case should be no less than five thousand dollars.

fraud investigation process with ATMs

payment card fraud-related operations carried out through ATMs, passes certain stages of the investigation.If the ATM does not give out money, the issuer acquirer forwards the request, which must verify the possibility of technical failures in the service of a particular bill or having improper distribution of banknotes.Such a situation is not a fraud.

If using an ATM conducted fraudulent transactions such as cash withdrawals, in an investigation undertaken by one issuer or with the acquirer.Held clarify the guilt card holder and points of compromise.For most of these cases, the responsibility of the issuer, so he anticipates these risks to reimburse the cardholder theft compensation from the insurance company.

Fight bank fraud

fraud with bank cards has meant that many institutions have to struggle with criminals.But this they can not always successfully cope.

example, to combat skimming most commonly used protection technology from the company IBS + «TMD Security».The firm is a leader among the founders of the protection of ATM skimming.The success of technology due to the fact that special protection is installed inside, suitable for all types of ATMs and easy to assemble.

transition ATMs operating system «Microsoft Windows», elemental base «Intel» using the protocols TCP / IP, on the other hand, significantly increases the risk of attacks.For this purpose, the fraudsters spend target (Targeted) attacks.

Now criminals are increasingly resorting to the help of various programs to gain access to payment cards.They are entered in the ATMs.After that, the program will be to gather all the necessary information about the operations.This ATM is no different from the normal ATM.Therefore, the common man it is impossible to recognize.

bank card fraud can be prevented by the installation of special security features on the ATM.They are signaling to the doors of the service area and a program that provides information security.

How to protect yourself from fraud?

Credit card fraud or debit plastic appliances - is now very common.It is therefore necessary to take measures to minimize the risk of theft of funds.To do this, you must observe the following rules.

1. Do not give your PIN, not to write it on the card in a notebook, etc.

2. Do not pass your card to any other person.

3. Make purchases in the audited stores.

4. Cover your hand keyboard while entering a personal code.

5. Do not report imaginary employees of the bank card details.

6. Do not tell your password, which came in a message on the phone.

7. In the case of loss or loss of the card must have a mobile phone number by which it can be blocked immediately.