Tag Archives: online fraud detection

MaxMind’s Paladin Report Is Now Available

Deciding on the right fraud prevention and IP intelligence provider can be a daunting task. With worldwide internet usage projected to grow every year, your choice matters now more than ever. So, make an informed, educated one with MaxMind’s Paladin Report.

Continue reading

Using Custom Inputs to Refine Your Response to Fraud

Online fraud is a complex, hard to detect, and constantly evolving type of crime with serious business consequences. While many e-commerce merchants are looking for new ways to engage with customers, fraudsters are also looking for new ways to exploit them. In a way, every touchpoint you create – from buy online/pick up in store options to social click-to-buy ads, mobile shopping to loyalty rewards programs – is another opportunity for cybercriminals to bypass your fraud screening.

Continue reading

Case Study: Reducing Chargebacks Using the minFraud Service

Thexyz, a Canadian company, provides a secure email service. This paid platform gives customers an email address that is secure and private while keeping the user experience ad-free.

Introducing the minFraud service had a dramatic effect on their chargeback rate. Here’s their story.

Continue reading

Behind the Scenes: High Risk Shipping Addresses

Just like good customers, fraudsters must provide a shipping address in order to receive merchandise. But fraudsters, who need to evade detection and efficiently resell stolen goods, leave traces in the shipping addresses they use. The minFraud Network collects data on shipping addresses and uses it to identify any high risk shipping addresses associated with the transactions you submit for review.

This blog post investigates some high risk shipping addresses known to MaxMind, as well as provides some general fraud review tips for identifying them.

Continue reading

How to recognize legitimate proxy use
and reduce false positives during order review

As a merchant, you’ll frequently see cases where multiple orders with different billing addresses and payment methods are placed from the same IP address, and it’s not clear whether or not this indicates fraud.

Such activity could be a sign of fraud, with a fraudster testing multiple compromised credit cards. It could also be a sign that a fraudster is using a proxy to obscure his identity. There are times though when such activity is expected and flagging such transactions as fraudulent would mean denying good orders and frustrating customers. Continue reading

Manual Review Best Practices:
Get More Data for a More Informed Decision

Thus far, our Best Practices Series has discussed how you can use the data provided by the minFraud service for better decision making during manual review.

But actionable data from minFraud starts with the inputs you include with each query.

The minFraud service requires that each query include the IP address associated with the transaction at a minimum; as best practices, MaxMind recommends you send as many data points as possible.

The more data points you provide, the better the riskScore and the more information you make available to your fraud analysts as part of the manual review process. Continue reading

Manual Review Best Practices: What’s the Value of Assessing IP Address Risk?

In this blog post, we continue our discussion of best practices for manual review. Today’s topic is assessing IP address risk.

A fraudster (or indeed, anyone) placing an order on a website uses a device (computer, mobile phone or tablet) and this device is associated with an IP address.

In our last blog post, we discussed how the physical location of the IP address can be matched against other location information to see if anything looks suspicious. For example, it’s best to closely scrutinize orders where the location of an IP address is in one country and the billing address in another.

Fraudsters recognize the power of geolocation in identifying fraud, so they act to hide their actual IP address and, by extension, their geographic location. The best way for them to take cover is to connect to the Internet using a proxy server. Popular hiding places include open proxies, hosting providers and VPNs. Continue reading