ΔΙΕΘΝΗΣ ΕΛΛΗΝΙΚΗ ΗΛΕΚΤΡΟΝΙΚΗ ΕΦΗΜΕΡΙΔΑ ΠΟΙΚΙΛΗΣ ΥΛΗΣ - ΕΔΡΑ: ΑΘΗΝΑ

Ει βούλει καλώς ακούειν, μάθε καλώς λέγειν, μαθών δε καλώς λέγειν, πειρώ καλώς πράττειν, και ούτω καρπώση το καλώς ακούειν. (Επίκτητος)

(Αν θέλεις να σε επαινούν, μάθε πρώτα να λες καλά λόγια, και αφού μάθεις να λες καλά λόγια, να κάνεις καλές πράξεις, και τότε θα ακούς καλά λόγια για εσένα).

Πέμπτη 14 Δεκεμβρίου 2017

Nethone presents 4 common, yet not so well-known, facts about the behaviour of fraudsters in travel business





Αποτέλεσμα εικόνας για Nethone   in travel business




Fraud detection and prevention in the travel industry, owing to its very nature, poses a great challenge to every company within this sector, especially OTAs (Online Travel Agencies) and airlines. Fighting fraud while simultaneously avoiding false positives has become quite a daunting task given both today’s global complexity and the technological advancements that are now at fraudsters’ disposal.
Today, an in-depth, real-time analysis of all transactions is a must as it allows to differentiate criminals from legitimate customers. Nethone – a leading provider of AI-driven Anti-fraud and Business Intelligence solutions – has used their cutting-edge profiling tool and advanced Machine Learning models to investigate the behaviour of fraudsters by analysing data related to travel products. As a result, the company’s data science team has selected 4 most interesting facts on fraudulent behaviour that the traditional, statistics-based approach to gaining insight fails to reveal.
Here are the key findings:
1. Incognito mode might seem suspicious, but in reality it is more common among legitimate customers than fraudsters.
2. 3% fraudsters use Incognito mode in their browsers
4.1% legitimate customers use Incognito mode in their browsers
2. While it is rare among typical users to spoof user-agent, fraudsters often do that to avoid being correctly identified. User-Agent is a label with information about the operating system, the browser and sometimes even about the device model. It is used by a browser to introduce itself to web applications.
6.8% fraudsters spoof user-agent
0.29% legitimate customers spoof user-agent
3. Fraudsters copy & paste the payment card information into the payment form more than twice as often as legitimate customers 
28.8% fraudsters use clipboard 
12.2% legitimate customers use clipboard
4. Virtual Machines are rarely used by genuine customers, they are however regularly employed by fraudsters to carry out their attacks. Virtual machines allow you to run an operating system in an app window on your desktop that behaves just like a separate computer.
4.2% fraudsters use Virtual Machines
0.05% legitimate customers use Virtual Machines



Tags: NETHONE