Credit Card Fraud

The Problem

The typical story goes like this: A cyber criminal uses a stolen credit card number to buy goods or services online. After a month or so, the online merchant receives a letter from the bank asking for documents proving the transaction. Since on internet all credit card payments are considered as “Card No Present” transactions (CNP), the merchant is fully liable and has to refund the money back (charge-back). It is such a common story that results one out of four dollars made online to be lost as fraud.

The typical merchant reaction includes:

Manual monitor of each transaction - labor inefficient
Market exposure limitation - killing growth
Hard-coded rules - punishing good customers

The impact to the business depending on the dimensions of the problem can start as focus distraction from the core business and can lead to significant loss of revenue or business disruption as credit card association might trigger severe fines including the potential for being disbarred.

Any online industry that take credit cards online is exposed to CNP fraud - online retailers, online travel agents and airlines, gaming, gambling, social networks etc. presents a holistic approach which can help any business to successfully combat online fraud

How it works?

Unlike first generation anti-fraud services that rely on personally identifiable information (PII) and credit card validations, Fraudpointer offers a three dimensional approach:

A sophisticated rules engine: Expose fraudsters by spotting specific characteristics in their behaviour. Use our predefined industry specific templates or create a new one based on your experience and achieve a quick win on identifying real-time with precision high risk transactions without harassing your good customers.

Device identification technology: Our technology assigns a unique fingerprint to each device (computer or mobile) visiting your website. Going beyond personally identifiable information, ip address, proxies or bank identification number, you can connect a series of events/transactions to a specific device and protect your business from multiple attacks where cyber criminals appear as different customers.

A multi-million strong reputation database:  Take advantage of the power of the shared history and experience from a wide network of online businesses and fraud professionals to immediately identify suspicious devices. Compare transaction anomalies, velocities and geolocation to the shared intelligence on a multi-million database of devices and their attributes.


Immediately reduce charge-backs with instant and real-time assessment of your transactions Reduce manual review costs and improve assessment accuracy using a rich set of data and automation
Take advantage of a multi-million strong, cross-industry wide reputation database and improve your intelligence
Utilise data from your transactions to prevent account take overs and origination of new fraudulent accounts
Quickly integrate and build on top of your existing investment in fraud management tools