The money being spent online is steadily growing. With billions of dollars being spent each year online, the opportunity to make money on the internet has never been bigger. Unfortunately, with that opportunity come people who want to make money in less than honest ways. We're going to look at some concrete ways you can identify fraudulent transactions and save yourself a lot of chargeback fees, money and grief.
Get more information from prospective customers.
The more information you have to work with, the better your chances are that you will be able to positively identify fraudulent transactions. At the very least, you need to make sure you get a customer's name, credit card billing address, phone number and the IP address of the computer currently accessing the order form. You should also get a valid email address. This email address should not be one that comes from a free email service.
Fraudulent transactions occur more frequently from certain countries.
The first thing you should know is that certain countries are more prone to fraudulent transactions than others. If you get an order originating from one of the following countries, you should be suspicious and do more digging. Some of these countries include: Ukraine, Indonesia, Yugoslavia, Lithuania, Egypt, Romania, Bulgaria, Turkey, Morocco, Vietnam, Russia, Pakistan, Malaysia, Nigeria, Israel, Iran, Cameroon, Gambia, and Ghana. This doesn't mean that every transaction from any of these countries is definitely fraudulent. But you should be very suspicious.
Confirm the address of the customer.
The first thing I do when I get an online order is to check the phone number of the customer against a reverse phone number directory. The majority of my orders come from the United States and Canada. Phone numbers from these countries can usually be entered into reverse directories to find out the address that phone number belongs to. If I can't get a match for the phone number it servers as a red flag and warrants more investigation.
Lookup the customer's country and city of origin
I've already outlined a long list of countries that should be suspicous to you. How do you determine if your customer placed the order from within one of these banned countries? Simple. You cross reference their IP address with an IP lookup database that can tell you what country they are in. The city they are from and sometimes even ISP they use! If you handle only a few orders a day, you can use an excellent free service at IP2Location.com. If you do handle more volume, IP2Location.com also offers subscription packages at various prices.
Once you determine the country of origin, if it doesn't match the country the customer listed with their billing information be very careful. Yes, it is possible that your customer could be travelling away from home. It is much more likely that their credit card information has been stolen and it is being used fraudulently. A mismatch between the country reported by IP and the billing address is a big red flag.
Don't let customers use free email addresses.
A free email address is so easy to setup at most free email services. The odds of your being able to track down the person that registered that free email address are next to none. If at all possible, block all known free email services. The most common include Hotmail, Yahoo, Mail.com, and Gmail. If you can't block free email addresses in advance, consider a free email address a red flag. A utility you can use to determine if an email address is a known free email is dnsstuff.com. Look towards the bottom left of the page that comes up.
Don't ship a product until you are sure.
If two or more red flags go up, beware. If you ship a product from a fraudulent transaction, you will very likely be slapped with a chargeback from your credit card company and lose the money from the good. Be skeptical of all orders until everything checks out to your satisfaction. If in doubt, refund the purchase. Too many chargebacks will result in the cancellation of your merchant account. Who needs that?
A little diligence can go a long way to helping you prevent loses from fraudulent transactions. With a little knowledge, you can greatly reduce lost profits due to fraud.
This article was written by Joe Duchesne, president of http://www.yowling.com/, Yowling offers free ecommerce shopping carts with their web hosting plans. Copyright 2005 Yowling. Reprint Freely as long as you provide a clickable link back to my website from this resource box.
It's late. You've been scouring the web for that perfect... Read More
"Male. Obsessed with computers. Lacking a girlfriend. Aged 14 to... Read More
Watching how the traditional media covers the latest virus or... Read More
There are ways to insure security though. You can get... Read More
From the "Ask Booster" column in the June 17, 2005... Read More
The first thing people think about when defending their computers... Read More
Viruses, Trojans and Spyware: Protecting yourself.No user on the internet... Read More
When you signed up for that ultra-fast DSL or Cable... Read More
A firewall is a system or gateway that prevents unauthorized... Read More
Your computer is as slow as molasses. Your mouse freezes... Read More
Spyware is software that runs on a personal computer without... Read More
1)Spyware is on your system. Like it or not, statistically... Read More
Chris Simpson, head of Scotland Yard's computer crime unit was... Read More
So called phishers try to catch the information about the... Read More
Ok, ok, I know you've seen them. All those pop... Read More
You'd better learn news from media, not from emails, security... Read More
Identity theft rates one of the fastest growing crimes in... Read More
Every now and then you can read about a new... Read More
Business on the internet is getting down right shameless. This... Read More
Identity theft is one of the most common criminal acts... Read More
The trash folder in my main inbox hit 4000 today.... Read More
Can you protect your computer from all possible viruses and... Read More
The internet is undoubtedly a fantastic resource for families and... Read More
A couple of days ago, I was searching for a... Read More
What is Phishing? In a typical Phishing attack, a criminal... Read More
The words Corporate Security may conjure up images of a... Read More
Many of us have run into an annoying and time-consuming... Read More
Saturday, MasterCard blamed a vendor of ALL credit card providers... Read More
Today's Internet or World Wide Web is being over regulated.But,... Read More
You are at your computer, checking out software on EBay.... Read More
If you are wondering how to fight spyware for safe... Read More
The top five online scams on the Internet hit nearly... Read More
Huge number of spyware software applications are available in the... Read More
Identity Theft is one of the most serious problems facing... Read More
WHAT IS HACKING?Hacking, sometimes known as "computer crime" has only... Read More
When you signed up for that ultra-fast DSL or Cable... Read More
When it comes to reporting Internet scams most of us... Read More
The IFCC (Internet Fraud Complaint Center) received over 200,000 complaint... Read More
This is not some new fangled techno-speak, it is a... Read More
They're out there. Individuals trying to make a quick buck... Read More
May. 16th 2005 - MicroWorld has reported the discovery of... Read More
Only the top spyware removers are successful at detecting and... Read More
Ok, ok, I know you've seen them. All those pop... Read More
The E-Mail Identity Theft Scam is running Rampant. These E-Mail... Read More
Huge number of spyware software applications are available in the... Read More
Shopping for horse gifts or other gift items on the... Read More
Virus damage estimated at $55 billion in 2003. "SINGAPORE -... Read More
If you are wondering how to fight spyware for safe... Read More
There are several basic concepts to keep in mind when... Read More
Glieder (Win32.Glieder.AK), Fantibag (Win32.Fantibag.A) and Mitglieder (Win32.Mitglieder.CT) are not names... Read More
I Challenge You To Crack The Code ------------------------------------- I had... Read More
With the advent of the World Wide Web, a whole... Read More
A firewall is a system or gateway that prevents unauthorized... Read More
For many, the daily walk to the mailbox evokes mixed... Read More
We all get the odd virus now and then, but... Read More
Have you ever got an email asking you to confirm... Read More
Can you protect your computer from all possible viruses and... Read More
A week or so ago, I received an inquiry from... Read More
Internet is the ocean of knowledge. In this ocean you... Read More
If you use emails actively in your communication, you must... Read More
Ok, you've got a computer, and you get online. You... Read More
I am in the midst of Oscar Wilde's The Picture... Read More
Ebay is a great site and is used by many... Read More
If you know what is the 'Fishing' then it's very... Read More
Millions of people make purchases online, but many people are... Read More
First I would like to stress I am condoning the... Read More
Internet Security |