Jump to content
Main menu
Main menu
move to sidebar
hide
Navigation
Main page
Recent changes
Random page
Help about MediaWiki
MediaWiki
Search
Search
Appearance
Create account
Log in
Personal tools
Create account
Log in
Pages for logged out editors
learn more
Contributions
Talk
Editing
Visa s 24 7 War Room Takes On Global Cybercriminals
Page
Discussion
English
Read
Edit
View history
Tools
Tools
move to sidebar
hide
Actions
Read
Edit
View history
General
What links here
Related changes
Special pages
Page information
Appearance
move to sidebar
hide
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
<br>VISA is investing billions to use AI as a tool for detecting cyber fraud<br><br>In the heart of Data Center Alley -- a patch of suburban Washington where much of the world's internet traffic flows -- Visa operates its global fraud command center.<br><br>The numbers that the payments giant grapples with are enormous. Every year, $15 trillion flows through Visa's networks, representing roughly 15 percent of the world's economy. And bad actors constantly try to syphon off some of that money.<br><br>Modern fraudsters vary dramatically in sophistication.<br><br>To stay ahead, Visa has [https://www.accountingweb.co.uk/search?search_api_views_fulltext=invested invested] $12 billion over the past five years building AI-powered cyber fraud detection capabilities, knowing that criminals are also spending big.<br><br>"You have everybody from a single individual threat actor looking to make a quick buck all the way to really corporatized criminal organizations that generate tens or hundreds of millions of dollars annually from fraud and scam activities," Michael Jabbara, Visa's global head of fraud solutions, told AFP during a tour of the company's security campus.<br><br>"These organizations are very structured in how they operate."<br><br>The best-resourced criminal syndicates now focus on scams that directly target consumers, enticing them into purchases or transactions by manipulating their emotions.<br><br>"Consumers are continuously vulnerable. They can be exploited, and that's where we've seen a much higher incidence of attacks recently," Jabbara said.<br><br>- Scam centers -<br><br>The warning signs are clear: anything that seems too good to be true online is suspicious, and romance opportunities with strangers from distant countries are especially dangerous.<br><br>"What you don't realize is that the person you're chatting with is more likely than not in a place like Myanmar," Jabbara warned.<br><br>He said human-trafficking victims are forced to work in multi-billion-dollar cyber scam centers built by Asian crime networks in Myanmar's lawless border regions.<br><br>The most up-to-date fraud techniques are systematic and quietly devastating.<br><br>Once criminals obtain your card information, [https://togel125.com/ fuck] they automatically distribute it across numerous merchant websites that generate small recurring charges -- amounts low enough that victims may not notice for months.<br><br>Some of these operations increasingly resemble legitimate tech companies, offering services and digital products to fraudsters much like Google or Microsoft cater to businesses.<br><br>On the dark web, criminals can purchase comprehensive fraud toolkits.<br><br>"You can buy the software. You can buy a tutorial on how to use the software. You can get access to a mule network on the ground or you can get access to a bot network" to carry out denial-of-service attacks that overwhelm servers with traffic, effectively shutting them down.<br><br>Just as cloud computing lowered barriers for startups by eliminating the need to build servers, "the same type of trend has happened in the cyber crime and fraud space," Jabbara explained.<br><br>These off-the-shelf services can also enable bad actors to launch brute force attacks on an industrial scale -- using repeated payment attempts to crack a card's number, expiry date, and security code.<br><br>The sophistication extends to corporate-style management, Jabbara said.<br><br>Some criminal organizations now employ chief risk officers who determine operational risk appetite.<br><br>They might decide that targeting government infrastructure and hospitals generates an excessive amount of attention from law enforcement and is too risky to pursue.<br><br>- 'Millions of attacks' -<br><br>To combat these unprecedented threats, Jabbara leads a payment scam [https://www.answers.com/search?q=disruption disruption] team focused on understanding criminal methodologies.<br><br>From a small room called the Risk Operations Center in Virginia, employees analyze data streams on multiple screens, searching for patterns that distinguish fraudulent activity from legitimate credit card use.<br><br>In the larger Cyber Fusion Center, staff monitor potential cyberattacks targeting Visa's own infrastructure around the clock.<br><br>"We deal with millions of attacks across different parts of our network," Jabbara noted, emphasizing that most are handled automatically without human intervention.<br><br>Visa maintains identical facilities in London and Singapore, ensuring 24-hour global vigilance.<br><br>
Summary:
Please note that all contributions to MediaWiki may be edited, altered, or removed by other contributors. If you do not want your writing to be edited mercilessly, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource (see
MediaWiki:Copyrights
for details).
Do not submit copyrighted work without permission!
Cancel
Editing help
(opens in new window)