Card fraud stats 2016

June 2017 Editor's Choice, Information Security, News & Events, Security Services & Risk Management

The South African Banking Risk Information Centre (SABRIC), on behalf of the banking industry, has released its Card Fraud Stats for 2016, which reflects an overall increase in card fraud for 2016. Credit card fraud increased by 13% from R331.4m in 2015 to R374.4m in 2016, with debit card fraud increasing by 3.1% for the same period.

SABRIC CEO, Kalyani Pillay explains that while any increase is of concern to the industry, the ever-evolving sophistication of tactics used by criminals is also of great concern. “Criminals will always be on the lookout for gaps and weaknesses in order to defraud victims. Fortunately, SABRIC’s collaborative model, as well as the robust risk mitigation measures deployed by its members, position the industry well to tackle card fraud.”

Card fraud is a global phenomenon, but locally, the most affected provinces were Gauteng, the Western Cape and KwaZulu-Natal. These were followed by the Eastern Cape, Mpumalanga and the North-West.

Industry statistics indicate that credit card related Card Not Present (CNP) fraud increased by 18, 9% from the previous year and accounts for 66.8% of the losses relating to SA issued credit cards. CNP debit card fraud increased by 4.6% which can be attributed to a wider acceptance of debit cards by online vendors.

EMV compliance, or ‘Chip and PIN’ technology has proved hugely successful, and is the reason for the significant drop in counterfeit card fraud. Counterfeit debit card fraud saw a big decrease of 35%, while counterfeit credit card fraud remained stable, accounting for 26.4% of losses. Criminals, however, circumvented this mitigation strategy by changing their behaviour to card jamming and swapping at ATMs to steal cards, accompanied by shoulder surfing for PIN numbers.

This is the reason we have seen a 39.1% increase in lost and/or stolen debit card fraud which accounted for 56.2% of losses in 2016. Pillay continues to caution bank clients to be vigilant when transacting at ATMs. “Be cautious of strangers offering to help as they could be trying to distract you in order to get your card or PIN.”

SABRIC urges the public to take the following protective measures to protect themselves:

• If you are not familiar with the screen layout of the ATM or if it appears that the machine has been tampered with, do not insert your card.

• Do not allow anyone to swipe your card on a small black device unknown to you.

• Never send emails that contain card numbers and expiry dates, or disclose this information over the phone.

• Ensure that your bankcards are registered for 3D Secure – contact your bank for more information about 3D Secure registration.

For more information go to www.sabric.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Who are you?
Access Control & Identity Management Information Security
Who are you? This question may seem strange, but it can only be answered accurately by implementing an Identity and Access Management (IAM) system, a crucial component of any company’s security strategy.

Read more...
Check Point launches African Perspectives on Cybersecurity report
News & Events Information Security
Check Point Software Technologies released its African Perspectives on Cybersecurity Report 2025, revealing a sharp rise in attacks across the continent and a major shift in attacker tactics driven by artificial intelligence

Read more...
What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...
IQ and AI
Leaderware Editor's Choice Surveillance AI & Data Analytics
Following his presentation at the Estate Security Conference in October, Craig Donald delves into the challenge of balancing human operator ‘IQ’ and AI system detection within CCTV control rooms.

Read more...
Onsite AI avoids cloud challenges
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure AI & Data Analytics
Most AI programs today depend on constant cloud connections, which can be a liability for companies operating in secure or high-risk environments. That reliance exposes sensitive data to external networks, but also creates a single point of failure if connectivity drops.

Read more...
Toxic combinations
Editor's Choice
According to Panaseer’s latest research, 70% of major breaches are caused by toxic combinations: overlapping risks that compound and amplify each other, forming a critical vulnerability to be exploited.

Read more...
Kaspersky finds security flaws that threaten vehicle safety.
News & Events Information Security Transport (Industry)
At its Security Analyst Summit 2025, Kaspersky presented the results of a security audit that exposed a significant security flaw enabling unauthorised access to all connected vehicles of one automotive manufacturer.

Read more...
Syndicates exploit insider vulnerabilities in SA
Information Security Security Services & Risk Management
Today’s cyber criminals do not just exploit vulnerabilities in your systems; they exploit your people, turning trusted team members into unwitting accomplices or deliberate collaborators in their schemes.

Read more...
GenAI fraud forcing banks to shift from identity to intent
AI & Data Analytics Information Security Financial (Industry)
The complexity and velocity of modern fraud schemes, from deepfakes to fraud and scams involving social engineering, demand more than just investment in new tools; they need adaptability and expanding the security net.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.