The money being spent online is steadily growing. With billions of dollars being spent each year online, the opportunity to make money on the internet has never been bigger. Unfortunately, with that opportunity come people who want to make money in less than honest ways. We're going to look at some concrete ways you can identify fraudulent transactions and save yourself a lot of chargeback fees, money and grief.
Get more information from prospective customers.
The more information you have to work with, the better your chances are that you will be able to positively identify fraudulent transactions. At the very least, you need to make sure you get a customer's name, credit card billing address, phone number and the IP address of the computer currently accessing the order form. You should also get a valid email address. This email address should not be one that comes from a free email service.
Fraudulent transactions occur more frequently from certain countries.
The first thing you should know is that certain countries are more prone to fraudulent transactions than others. If you get an order originating from one of the following countries, you should be suspicious and do more digging. Some of these countries include: Ukraine, Indonesia, Yugoslavia, Lithuania, Egypt, Romania, Bulgaria, Turkey, Morocco, Vietnam, Russia, Pakistan, Malaysia, Nigeria, Israel, Iran, Cameroon, Gambia, and Ghana. This doesn't mean that every transaction from any of these countries is definitely fraudulent. But you should be very suspicious.
Confirm the address of the customer.
The first thing I do when I get an online order is to check the phone number of the customer against a reverse phone number directory. The majority of my orders come from the United States and Canada. Phone numbers from these countries can usually be entered into reverse directories to find out the address that phone number belongs to. If I can't get a match for the phone number it servers as a red flag and warrants more investigation.
Lookup the customer's country and city of origin
I've already outlined a long list of countries that should be suspicous to you. How do you determine if your customer placed the order from within one of these banned countries? Simple. You cross reference their IP address with an IP lookup database that can tell you what country they are in. The city they are from and sometimes even ISP they use! If you handle only a few orders a day, you can use an excellent free service at IP2Location.com. If you do handle more volume, IP2Location.com also offers subscription packages at various prices.
Once you determine the country of origin, if it doesn't match the country the customer listed with their billing information be very careful. Yes, it is possible that your customer could be travelling away from home. It is much more likely that their credit card information has been stolen and it is being used fraudulently. A mismatch between the country reported by IP and the billing address is a big red flag.
Don't let customers use free email addresses.
A free email address is so easy to setup at most free email services. The odds of your being able to track down the person that registered that free email address are next to none. If at all possible, block all known free email services. The most common include Hotmail, Yahoo, Mail.com, and Gmail. If you can't block free email addresses in advance, consider a free email address a red flag. A utility you can use to determine if an email address is a known free email is dnsstuff.com. Look towards the bottom left of the page that comes up.
Don't ship a product until you are sure.
If two or more red flags go up, beware. If you ship a product from a fraudulent transaction, you will very likely be slapped with a chargeback from your credit card company and lose the money from the good. Be skeptical of all orders until everything checks out to your satisfaction. If in doubt, refund the purchase. Too many chargebacks will result in the cancellation of your merchant account. Who needs that?
A little diligence can go a long way to helping you prevent loses from fraudulent transactions. With a little knowledge, you can greatly reduce lost profits due to fraud.
This article was written by Joe Duchesne, president of http://www.yowling.com/, Yowling offers free ecommerce shopping carts with their web hosting plans. Copyright 2005 Yowling. Reprint Freely as long as you provide a clickable link back to my website from this resource box.
Millions of people make purchases online, but many people are... Read More
As more people are logging onto the Internet everyday, Network... Read More
Despite the current wave of identity theft and corporate security... Read More
If you use the internet, you have probably been infected... Read More
The most frustrating part of having Spyware on your computer... Read More
Some months ago, before there was much publicity regarding phishing... Read More
Since its birth, the Internet has grown and expanded to... Read More
One evening, during the graveyard shift, an AOL technical support... Read More
The Internet offers a global marketplace for consumers and businesses.... Read More
Do you know what "phishing" is?No, it doesn't mean you... Read More
NETWORK SECURITIES: IMPORTANCE OF SECURITIESComputers and securities must form a... Read More
I am in the midst of Oscar Wilde's The Picture... Read More
Beware of a New Scam Aimed at Bargain-HuntersTrying to buy... Read More
When it comes to a secure website and passwords it... Read More
Let us take the example of scrambling an egg. First,... Read More
Imagine this ? you open up your email box and... Read More
What is Phishing? In a typical Phishing attack, a criminal... Read More
In 1997, I decided after 15 years as a practicing... Read More
If you know what is the 'Fishing' then it's very... Read More
Abstract Homogeneous symmetries and congestion control have garnered limited interest... Read More
Manual Spy Bot Removal > BookedSpaceBookedSpace is an Internet Explorer... Read More
Airport Menace: The Wireless Peeping Tom As a network... Read More
If you have used a Windows machine for a while,... Read More
No longer are viruses the only threat on the internet.... Read More
The trash folder in my main inbox hit 4000 today.... Read More
The words Corporate Security may conjure up images of a... Read More
It's been with us since 1993, it's gotten more intrusive,... Read More
If you are a parent, you have probably wondered at... Read More
They're out there. Individuals trying to make a quick buck... Read More
The IFCC (Internet Fraud Complaint Center) received over 200,000 complaint... Read More
Glieder (Win32.Glieder.AK), Fantibag (Win32.Fantibag.A) and Mitglieder (Win32.Mitglieder.CT) are not names... Read More
Imagine my surprise when I received a phone call from... Read More
At this point, if you've got the whole "turning the... Read More
When we think of adware, what comes to mind are... Read More
If you know what is the 'Fishing' then it's very... Read More
What is Phishing? In a typical Phishing attack, a criminal... Read More
Over the past few years as the internet has become... Read More
What is computer security? Computer security is the process of... Read More
Do you really have to know how feeds work? Not... Read More
It's been with us since 1993, it's gotten more intrusive,... Read More
Well, if that would have been said to me by... Read More
Nobody wants to pay to remove spyware. At the very... Read More
Before you enter your name, address or any other data... Read More
In 1997, I decided after 15 years as a practicing... Read More
By browsing a web page, you could infect your computer... Read More
Security leaks can be a big problem for any site... Read More
High-tech private investigators are becoming the answer for many Internet... Read More
Manual Spy Bot Removal > BookedSpaceBookedSpace is an Internet Explorer... Read More
Spyware is the most troublesome software to appear on the... Read More
If you use emails actively in your communication, you must... Read More
After Two Security Assessments I Must Be Secure, Right? ... Read More
Computer security for most can be described in 2 words,... Read More
The average computer is packed with hidden software that can... Read More
If you constantly deal with bank or electronic accounts, it... Read More
From: "Paypal Security" Subject: New Security Requirements Date: Tue, 26... Read More
You can detect spyware online using free spyware cleaners and... Read More
Shopping for horse gifts or other gift items on the... Read More
A couple of days ago, I was searching for a... Read More
Whether we like it or not, we are all living... Read More
You've seen it in the news - 40 million credit... Read More
So you want to know who your kids are chatting... Read More
Viruses are, however, not the only malicious software programs out... Read More
Spies, spyware, internet parasites are among what they are usually... Read More
NETWORK SECURITIES: IMPORTANCE OF SECURITIESComputers and securities must form a... Read More
"Male. Obsessed with computers. Lacking a girlfriend. Aged 14 to... Read More
Phishing in its "classic" variant is relatively well-known. Actually, 43.4... Read More
Internet Security |