What tools are merchants using to ferret out fraudulent orders? Below, highlights from a recent survey:75% Address verification service. Checks that billing address listed by customer matches billing address on file with credit card company.66% Card verification number. Asks customer for an extra security code, often printed on the back of a credit card above the signature lines.32% Address point verification. Confirms a valid shipping address. 29% Payer authentication services. Prompts users who have signed up for Verified by Visa or MasterCard’s SecureCode for an additional password.28% Company-specific fraud screens. Checks order against company-specific data, such as typical order quantities. 27% Negative lists. Checks mailing address against a database of addresses associated with past chargebacks or fraudulent activity.25% Automated decision/order screening. Uses a system that filters inbound orders based on business rules, automatically marking each order “accept,” “reject” or “review.”25% IP geolocation information. Checks whether the IP address of the computer used to place the order is physically near either the shipping or billing address.24% General industry model fraud screens. Checks for anomalous behavior that’s not specific to the merchant.23% Velocity monitoring. Looks for patterns such as multiple orders going to one address or multiple customers with the same IP address or e-mail address. Related content news analysis Attackers breach US government agencies through ColdFusion flaw Both incidents targeted outdated and unpatched ColdFusion servers and exploited a known vulnerability. By Lucian Constantin Dec 06, 2023 5 mins Advanced Persistent Threats Advanced Persistent Threats Advanced Persistent Threats news BSIMM 14 finds rapid growth in automated security technology Embrace of a "shift everywhere" philosophy is driving a demand for automated, event-driven software security testing. By John P. Mello Jr. Dec 06, 2023 4 mins Application Security Network Security news Almost 50% of organizations plan to reduce cybersecurity headcounts: Survey While organizations are realizing the need for knowledgeable teams to address unknown threats, they are also looking to reduce their security headcount and infrastructure spending. By Gagandeep Kaur Dec 06, 2023 4 mins IT Jobs Security Practices feature 20 years of Patch Tuesday: it’s time to look outside the Windows when fixing vulnerabilities After two decades of regular and indispensable updates, it’s clear that security teams need take a more holistic approach to applying fixes far beyond the Microsoft ecosystem. By Susan Bradley Dec 06, 2023 6 mins Patch Management Software Threat and Vulnerability Management Windows Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe