Главная
Study mode:
on
1
Introduction
2
Example
3
Impact
4
Credit Card Processing
5
Bank Identification Number
6
Payment Processors
7
Standard Fraud Detection
8
Undercover Operation
9
Blacklisting
10
Insurance Pool
11
Conclusion
Description:
Explore the intricate world of online counterfeit websites and their bullet-proof credit card processing services in this 21-minute conference talk from USENIX Enigma 2016. Delve into the ecosystem of rogue payment facilitators who enable trademark-infringing merchants to continue operations despite increased efforts to disrupt their activities. Learn about the process of identifying and disrupting counterfeit credit card processing, including the use of test purchases and subsequent complaints to card holder associations. Discover the sophisticated systems employed by rogue payment processors to filter out test purchases while allowing genuine customer orders. Gain insights from Damon McCoy, Assistant Professor at New York University, as he shares his expertise on security and privacy measurements in deployed systems, with a focus on online payment systems, cybercrime economics, and related technologies.

Bullet-Proof Credit Card Processing - Damon McCoy - USENIX Enigma - 2016

USENIX Enigma Conference
Add to list