Leveraging Two Models to Help Fight Fraud and Scams
The Federal Reserve’s video tutorial explains the connection points between the FraudClassifier(SM) and ScamClassifier(SM) models and how to use them together to analyze incidents.
The Federal Reserve’s video tutorial explains the connection points between the FraudClassifier(SM) and ScamClassifier(SM) models and how to use them together to analyze incidents.
Federal Reserve Financial Services is preparing to engage with the payments industry at upcoming fall conferences and events. Learn more about opportunities to connect on timely and innovative payments topics.
A new recommendations report encourages the industry to consider creating a solution or establishing an independent information exchange framework for a holistic view of scam intelligence from existing sources across payment rails.
A Federal Reserve-led industry work group developed the ScamClassifier(SM) model, a voluntary scam classification structure to categorize different scam types more consistently.
Representatives from Federal Reserve Financial Services engaged with payments professionals during industry events this spring. Explore highlights and key takeaways.
Learn how one technology service provider has integrated the FraudClassifier(SM) model within a new product offering to support financial institutions in better understanding and addressing fraud and anti-money laundering trends.
Representatives from across the Federal Reserve will be in Miami May 6-9 for the annual Nacha Smarter Faster Payments conference. Explore the many opportunities to connect on timely and innovative payments topics.
Each spring, the industry comes together at conferences and events to explore the latest trends, share knowledge and discuss the exciting future of payments. Read more about where you can connect with Federal Reserve Financial Services this year.
Authentication practices, tools and processes are designed to prevent unauthorized users from gaining access to accounts or devices. This third article in a series on authentication’s critical role in payments highlights current and evolving methods to provide even stronger authentication.
The second article in a series on authentication’s critical role in payments examines the ways criminals can take advantage of complexities in authentication requirements to find vulnerabilities and gain access and control of systems.