February 27, 2018 By Shane Schick 2 min read

Credit card fraud protection has been a challenge in the financial services industry for years. But according recent research, increased adoption of chip-and-PIN technology is already keeping more transactions safe from fraudsters.

The “Visa Chip Card Update” revealed a 70 percent drop in counterfeit dollars over a two-year period among U.S. merchants who have completed the chip upgrade. Sometimes referred to as Europay, MasterCard and Visa (EMV) technology, the chip-and-PIN design was first suggested about seven years ago as a way to improve credit card fraud protection.

Security Gaps Remain Despite Increased EMV Adoption

While the statistics from Visa are encouraging, they don’t mean that threats to financial systems and consumers have gone away. Forter’s “Fraud Attack Index” found that account takeover attacks against online payment accounts increased by 131 percent between 2015 and 2016.

But even if EMV adoption boosts credit card fraud protection, 85 percent of merchants are still concerned about card-not-present (CNP) attacks, according to Vesta’s “2017 Financial Impact of Fraud Study.”

The FBI has issued public advisories suggesting that moving to EMV alone will not keep consumers safe. Besides the potential for counterfeit chip-and-PIN cards, it is often far too easy for cybercriminals to find payment details stored in the profiles of e-commerce sites, Bleeping Computer noted. If malicious software can get into the back end of various online shopping services and steal that kind of information, credit card fraud protection becomes far more difficult.

Shoring Up Credit Card Fraud Protection

Gizmodo suggested that merchants who haven’t moved to EMV will likely do so based on Visa’s data. Additionally, the rules established three years ago may hold these organizations responsible for credit card fraud protection if the technology is not in place.

Following major data breaches at well-known retailers, there might be an understandable wariness among customers to hand over their card data in stores where only a magnetic stripe reader is still in use. Online theft may continue to loom in the shadows, but this is an area where organizations can make a significant IT security improvement today.

More from

2024 roundup: Top data breach stories and industry trends

3 min read - With 2025 on the horizon, it’s important to reflect on the developments and various setbacks that happened in cybersecurity this past year. While there have been many improvements in security technologies and growing awareness of emerging cybersecurity threats, 2024 was also a hard reminder that the ongoing fight against cyber criminals is far from over.We've summarized this past year's top five data breach stories and industry trends, with key takeaways from each that organizations should note going into the following…

Black Friday chaos: The return of Gozi malware

4 min read - On November 29th, 2024, Black Friday, shoppers flooded online stores to grab the best deals of the year. But while consumers were busy filling their carts, cyber criminals were also seizing the opportunity to exploit the shopping frenzy. Our system detected a significant surge in Gozi malware activity, targeting financial institutions across North America. The Black Friday connection Black Friday creates an ideal environment for cyber criminals to thrive. The combination of skyrocketing transaction volumes, a surge in online activity…

Cloud Threat Landscape Report: AI-generated attacks low for the cloud

2 min read - For the last couple of years, a lot of attention has been placed on the evolutionary state of artificial intelligence (AI) technology and its impact on cybersecurity. In many industries, the risks associated with AI-generated attacks are still present and concerning, especially with the global average of data breach costs increasing by 10% from last year.However, according to the most recent Cloud Threat Landscape Report released by IBM’s X-Force team, the near-term threat of an AI-generated attack targeting cloud computing…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today