Anti-Fraud Project Boosts Security of African, Asian Financial Systems

A nonprofit has launched the first open source platform aimed at delivering sophisticated anti-fraud capabilities to financial systems in Africa as well as parts of Asia and the Middle East.
The Tazama open source project is real-time financial transaction monitoring software that can be deployed by digital financial services providers to detect and block fraudulent transactions and protect consumer accounts.
While large financial firms such as Visa and Mastercard have such capabilities, smaller financial institutions and government agencies in the region do not, making their financial systems prone to fraud and undermining citizens' trust in the system.
Funded by the Linux Foundation Charities and the Bill and Melinda Gates Foundation, the open source Tazama project has completed alpha pilot projects in Jordan and South Africa and plans to expand its deployments.
It's already working with the Central Bank of West African States and rural banks in the Philippines, says Greg McCormick, executive director of the Tazama Project at Linux Foundation.
Providing anti-fraud services like Tazama is critical to increasing trust and raising citizens' participation in a country's financial system, which is a key part of overall economic development.
Africa and some nations in the Middle East and Asia lag far behind in account ownership compared with the United States, Europe, and the richer economics of Asia.
Only 27% of adults in Egypt have a bank account, 47% of adults in Jordan, 45% in Kenya, 36% in Burkina Faso, and 45% in Nigeria, according to The Global Findex Database 2021, published by the World Bank.
The Gates Foundation found that delivering banking services to lower-income citizens is a key component of meeting its goal of helping deploy real-time digital payments, which can help economies grow.
In many countries, people are living on just dollars a month, which does not make it profitable for large financial firms to create their own financial networks.
Instead, homegrown systems based on open source software are needed, McCormick says.
Real-Time Fraud Detection The Tazama open source software is a server that takes in information and applies more than 270 different rules, each one of which produces a single answer.
The rules are combined into typologies, which look for particular types of fraud, according to Tazama documentation.
The information flow for a financial transaction in Tazama's anti-fraud platform.
With digital fraud growing in Africa and other parts of the world, such as a recent spate of Magecart attacks on e-commerce websites, protecting the financial system and its participants from fraud is especially timely.
The pilot project's servers are currently running 2,300 transactions per second, which results in detection of fraud in real-time, McCormick says.
Adding AI for Cybersecurity The platform is a machine-learning engine that ingests transaction data in real-time, stores the information in a database, and then uses behavioral modeling to determine whether the transaction is likely legitimate or a sign of fraud, says Justus Ortlepp, product manager for Tazama.
Job fraud, where the criminal offers work to people but then steals their money, is common in some parts of Africa, while laundering funds stolen through other criminal schemes is another common attack on financial systems, says Ortlepp.
The Tazama group plans to build more capabilities into the platform, including explainable AI and other advanced features.
Many targeted countries do not have a cybersecurity-skilled workforce or resources to deploy a complex platform, so using machine learning and AI to make the platform easier to use and manage is important, McCormick says.


This Cyber News was published on www.darkreading.com. Publication date: Mon, 11 Mar 2024 17:35:33 +0000


Cyber News related to Anti-Fraud Project Boosts Security of African, Asian Financial Systems

Comprehensive Guide to Fraud Detection, Management, & Analysis - To mitigate risks, businesses can use risk management strategies, including fraud detection software, company policies, and staff ranging from risk managers and trust officers to fraud analysts. Affiliate Fraud - Affiliates in a marketing arrangement ...
10 months ago Securityboulevard.com
Anti-Fraud Project Boosts Security of African, Asian Financial Systems - A nonprofit has launched the first open source platform aimed at delivering sophisticated anti-fraud capabilities to financial systems in Africa as well as parts of Asia and the Middle East. The Tazama open source project is real-time financial ...
8 months ago Darkreading.com
Deepfake Digital Identity Fraud Surges Tenfold, Sumsub Report Finds - Threat actors undertaking identity fraud have been using deepfakes ten times more in 2023 than in 2022, according to digital identity verification solutions provider Sumsub. In its third annual Identity Fraud Report, published on November 28, 2023, ...
11 months ago Infosecurity-magazine.com
Does Less Consumer Tracking Lead to Less Fraud? - Authors Bo Bian, Michaela Pagel and Huan Tang investigated the relationship between the rollout of Apple's App Tracking Transparency and reports of consumer financial fraud. By default, Apple's ATT opted all iPhone users out of tracking, which meant ...
11 months ago Eff.org
Identity Fraud Rises as E-Commerce, Payment Firms Targeted - An analysis of global customer data has highlighted a 20% increase in overall fraud incidents compared to last year, largely attributed to the surge in impersonation fraud and the accessibility of sophisticated attack methods and tools. The gaming, ...
11 months ago Securityboulevard.com
Fighting the Next Generation of Fraud - In today's digital age, the landscape of fraud is evolving at an alarming pace. In 2022, 20-59-year-olds reported 63% of all fraud in the United States. Fraudsters have been quick to harness the potential of generative AI to perpetrate various ...
11 months ago Securityboulevard.com
5 Fraud Prevention Strategies That Help Companies Ward Off Cyber Attacks - According to PwC's 2022 survey, over half of companies experienced fraud in the past two years, the highest in 20 years of research. From cyber-attacks to wire fraud to dishonest employees, there's no shortage of threats that aim to profit off your ...
11 months ago Hackread.com
Latest Information Security and Hacking Incidents - In a recent report by FICO on Fraud, Identity, and Digital Banking, it was revealed that nearly two million Brits may have fallen victim to identity theft last year. The analytics firm found that 4.3% of respondents experienced fraudsters using their ...
9 months ago Cysecurity.news
A Comprehensive Look at the Financial Firms in European Union and Their Rules on Cloud-Based Services - Today's technology has opened up a world of possibilities for financial firms, especially with cloud-based services. Financial institutions are now able to access a great deal of information over the internet in an efficient and timely manner. ...
1 year ago Tripwire.com
DataVisor integrates SMS customer verification into its platform - DataVisor announced the expansion of its end-to-end platform capabilities with the integration of SMS customer verification for fraudulent transactions. This new offering, powered by Twilio technology, provides customers with enhanced fraud ...
11 months ago Helpnetsecurity.com
$22 Million Wake-up Call to Improve Security - A former Jacksonville Jaguars staff member is facing the possibility of a 30-year prison sentence after admitting guilt to financial crimes, including embezzling over $22 million from the NFL team. Insufficient Internal Controls: In many cases, a ...
10 months ago Securityboulevard.com
Cybersecurity jobs available right now: October 2, 2024 - Help Net Security - As an Applied Cybersecurity Engineer (Center for Securing the Homeland), you will apply interdisciplinary competencies in secure systems architecture and design, security operations, threat actor behavior, risk assessment, and network security to ...
1 month ago Helpnetsecurity.com
Tips for Combatting P2P Fraud – The Most Concerning Cyber Threat in 2023 - As cyber threats continue to evolve and evolve, one of the most concerning threats to businesses and individuals is the growing threat of P2P (peer-to-peer) fraud. This type of fraud is when cyber criminals use a third party to steal personal data or ...
1 year ago Csoonline.com
How Businesses Can Manage Cryptocurrency Fraud - With cryptocurrency payments on the rise, businesses must learn how to safeguard against potential risks. Businesses across the US are seeking innovative payment methods, with an estimated 75% of retailers looking to embrace cryptocurrency payment ...
9 months ago Cyberdefensemagazine.com
US Consumers Lose a Record $10bn+ to Fraud Last Year - US adults lost over $10bn to fraud in 2023, with investment scams the biggest earner for threat actors, according to the latest figures from the FTC. The figures represent a record high for fraud losses, having increased 14% year on year. Investment ...
9 months ago Infosecurity-magazine.com
Payment Frauds on Rise: Organizations Suffering the Most - In today's digital landscape, organizations face an ever-increasing risk of falling victim to payment fraud. Cybercriminals are becoming more sophisticated, employing a variety of tactics to deceive companies and siphon off funds. Let's delve into ...
9 months ago Cysecurity.news
Addressing Financial Organizations' Digital Demands while Avoiding Cyber Threats - The financial services industry has been at the forefront of the digital transformation age for some time. Keeping up with these requirements has caused financial organizations to rapidly overhaul their IT infrastructure, adopt multiple types of ...
4 months ago Cybersecurity-insiders.com
The Intersection of IoT and Financial Security: Expert Tips for Protection - Sophisticated Internet of Things technologies transformed the cybersecurity systems in financial services. Take credit cards as an example-commercial banks significantly cut the risk of skimming by replacing magstripe cards with chip-and-PIN cards. ...
10 months ago Securityboulevard.com
IT and OT cybersecurity: A holistic approach - In comparison, OT refers to the specialized systems that control physical processes and industrial operations. OT Technologies include industrial control systems, SCADA systems and programmable logic controllers that directly control physical ...
10 months ago Securityintelligence.com
Embracing Security as Code - Everything is smooth until it isn't because we traditionally tend to handle the security stuff at the end of the development lifecycle, which adds cost and time to fix those discovered security issues and causes delays. Over the years, software ...
10 months ago Feeds.dzone.com
Smart Home Security Essentials: Protecting What Matters Most - Smart home security systems provide homeowners with the ability to keep their personal and property safe from intruders, theft, and other potential threats. This article will discuss different types of smart home security systems, benefits, setting ...
11 months ago Securityzap.com
Thwarting Common Vulnerabilities: Financial Sector - DZone - By providing that kind of training alongside things like incentives for security champions and privilege-based initiatives where only the best, most security-aware developers who have completed their training are allowed to work with critical assets, ...
1 month ago Feeds.dzone.com
A Practitioner's Guide to Security-First Design - Instead, organizations must proactively fortify their defenses and enter the era of security-first design - an avant-garde approach that transcends traditional security measures. Security-first design is an approach that emphasizes integrating robust ...
11 months ago Feeds.dzone.com
The Embedded Systems and The Internet of Things - The Internet of Things is a quite new concept dealing with the devices being connected to each other and communicating through the web environment. This concept is gaining its popularity amongst the embedded systems that exist - let's say - 10 or ...
11 months ago Cyberdefensemagazine.com
Signature Techniques of Asian APT Groups Revealed - The Kaspersky Cyber Threat Intelligence team has unveiled crucial insights into the tactics, techniques and procedures employed by Asian Advanced Persistent Threat groups. The 370-page report, Modern Asian APT groups: Tactics, Techniques and ...
11 months ago Infosecurity-magazine.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)