Connect with us

Business

Swish Introduces Joint Blocking Feature to Strengthen Fraud Protection Across Banks

Published

on

Offshore accounts have long been associated with financial privacy, tax optimization, and international diversification.

Swish is a Swedish electronic payment solution. It has now introduced a joint blocking feature to limit and prevent fraud.

The most popular electronic payment service in Sweden, Swish, has now been granted the right to introduce a joint blocking feature. The aim of the joint blocking function is to prevent fraud, and it will allow banks to block users from the entire Swish system. This makes it much more difficult for fraudsters to exploit the service and provides quicker responses when red flags occur regarding these criminals.

Joint Blocking Feature

Those misusing the service will not just be blocked from using their own bank. It will spread out across the entire Swish system. This can occur when those operating the system believe it is being used for criminal purposes or in a way that poses security risks to other customers, banks or Swish itself.

Swish continues to dominate Sweden’s mobile payment landscape, and is used by millions for everyday transactions across businesses and e-commerce. Its new joint blocking feature further strengthens protection against fraud, giving banks a coordinated tool to prevent misuse and reinforce trust in the cashless economy. Experts, including those at bedrageri.info, note that this robust system also benefits licensed Swedish online casinos, where secure and fast Swish payments ensure consumer safety and confidence in digital transactions.

Urban Höglund, the CEO of Swish, stated that the “misuse of Swish in criminal contexts is something we take very seriously. With a joint blocking function, we can act more quickly and in a more coordinated way to exclude those who abuse the service, while at the same time making Swish even safer for millions of users.”

Advertisement

What is Swish?

Those outside of Sweden may not be familiar with Swish. Launched in 2012, it was created by a consortium of six major banks and the Central Bank of Sweden. Its aim was to provide a real-time money transfer solution through an application. Those using it need a Swedish bank account number and a national ID.

Its original purpose had been for the transfer of funds between individuals. However, it soon proved so popular that it was used by small organisations, mainly micro traders and religious organisations, in lieu of a card reader. Companies must now pay a small fee for using it, though for individuals, it is free. It is a member of the European Mobile Payment Systems Association. The company behind it is Getswish.

Clearing Operations Authorisation Also Granted

The Finansinspektionen, Sweden’s Financial Supervisory Authority, has also recently granted Swish the ability to conduct clearing activities under the Payments Clearing and Settlement Act.

Payments and clearing are the processes by which a payment initiation, such as the swipe of a card or hitting send on an app, is processed to the final settlement. In between this, there are numerous steps. They can involve validating transactions, exchanging information, recording transfers and risk mitigation.

Advertisement

This is a complex process, and as a result, it must now come under the supervision of the Finansinspektionen. This relates specifically to the obligations of clearing companies. It has previously been designated by the Riksbank as a company of importance in the payment system infrastructure.

The Swedish Payments Market

Sweden is unique in that most of its payment market is entirely digital. The use of cash is continuing to fall according to the Riksbank, with card payments being the most used method of payment and mobile payments quickly catching up. Many small businesses have even stopped accepting cash, with many forgoing it over the last five years due to security issues. However, around two-thirds of small businesses asked in a recent survey by the bank do accept cash.

The same survey said that seven out of ten companies accept both Swish and cash. Many of these prefer payment methods by Swish or card, as it minimises the administrative work they have to do and provides a quicker and smoother transfer. However, there is a current Cash Inquiry which proposes that companies which sell essential goods should be expected to take cash.

Global Payment Preferences

There is now a wide range of payment methods available across the globe. These range from old-fashioned but still popular cash, all the way to digital wallets and cryptocurrencies. While this has provided even more choice for consumers, it can be hard work for businesses that need to choose the right ones for their customers.

Advertisement

Across the globe, around 70% of all transactions are now made by bank transfers, digital wallets, and cash payment vouchers. This is a huge change from the days of handing over coins and notes. Of these, digital wallets are the most used at 53% share of transactions. Credit cards come second at 20%, with debit and prepaid cards reaching to 12%. All of this shows just how important these changes have been.

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Business

Uber ordered to pay $8.5m over claim driver raped passenger

Published

on

Uber ordered to pay $8.5m over claim driver raped passenger

The verdict is expected to influence the outcome of thousands of other cases against the ride hailing firm.

Continue Reading

Business

Cigna Revenue Lifted by Growth in its Evernorth Unit

Published

on

Cigna Revenue Lifted by Growth in its Evernorth Unit

Cigna CI 3.09%increase; green up pointing triangle Group logged higher revenue in its latest quarter as its pharmacy-benefit business Evernorth continues to grow.

The healthcare company on Thursday posted a profit of $1.2 billion, or $4.64 a share, compared with $1.4 billion, or $5.13 a share, a year earlier.

Copyright ©2026 Dow Jones & Company, Inc. All Rights Reserved. 87990cbe856818d5eddac44c7b1cdeb8

Continue Reading

Business

Form 13G FIRST TRUST EXCHANGE-TRADED FUND III For: 6 February

Published

on


Form 13G FIRST TRUST EXCHANGE-TRADED FUND III For: 6 February

Continue Reading

Business

More baby formula products recalled over toxin fears

Published

on

More baby formula products recalled over toxin fears

Danone and Nestle have given assurances to the FSA that recalled batches were produced some time ago and are unlikely still to be on UK shop shelves. However, they may be in cupboards at home, which is why parents and caregivers are being asked to check their supplies.

Continue Reading

Business

Best Tech Stocks To Buy On The Earnings Week Dip

Published

on

Best Tech Stocks To Buy On The Earnings Week Dip

This article was written by

Steven Cress is VP of Quantitative Strategy and Market Data at Seeking Alpha. Steve is also the creator of the platform’s quantitative stock rating system and many of the analytical tools on Seeking Alpha. His contributions form the cornerstone of the Seeking Alpha Quant Rating system, designed to interpret data for investors and offer insights on investment directions, thereby saving valuable time for users. He is also the Founder and Co-Manager of Alpha Picks, a systematic stock recommendation tool designed to help long-term investors create a best-in-class portfolio.Steve is passionate and dedicated to removing emotional biases from investment decisions. Utilizing a data-driven approach, he leverages sophisticated algorithms and technologies to simplify complex, laborious investment research, creating an easy-to-follow, daily updated grading system for stock trading recommendations.Steve was previously the Founder and CEO of CressCap Investment Research until its acquisition by Seeking Alpha in 2018 for its unparalleled quant analysis and market data capabilities. Prior to that, he had also founded the quant hedge fund Cress Capital Management, after spending most of his career running a proprietary trading desk at Morgan Stanley and leading international business development at Northern Trust.With over 30 years of experience in equity research, quantitative strategies, and portfolio management, Steve is well-positioned to speak on a wide range of investment topics.

Analyst’s Disclosure: I/we have no stock, option or similar derivative position in any of the companies mentioned, and no plans to initiate any such positions within the next 72 hours. I wrote this article myself, and it expresses my own opinions. I am not receiving compensation for it. I have no business relationship with any company whose stock is mentioned in this article.

Seeking Alpha’s Disclosure: Past performance is no guarantee of future results. No recommendation or advice is being given that any particular security, portfolio, transaction or investment strategy is suitable for any specific person. The author is not advising you personally concerning the nature, potential, value or suitability of any particular security or other matter. You alone are solely responsible for determining whether any investment, security or strategy, or any product or service, is appropriate or suitable for you based on your investment objectives and personal and financial situation. Steven Cress is the Head of Quantitative Strategy at Seeking Alpha. Any views or opinions expressed herein may not reflect those of Seeking Alpha as a whole. Seeking Alpha is not a licensed securities dealer, broker or US investment adviser or investment bank.

Advertisement
Continue Reading

Business

What Threat Detection Looks Like in a Large Organisation

Published

on

What Threat Detection Looks Like in a Large Organisation

Bobby Acri is a cybersecurity analyst based in Winnetka, Illinois, who focuses on threat detection, incident response, risk mitigation, and secure systems design.

His work centres on protecting large, complex systems in environments where small weaknesses can create outsized risk.

Born on 17 May 1991 at Evanston Hospital, Bobby grew up on Chicago’s North Shore. He attended Hubbard Woods Elementary, Washburne Middle School, and New Trier Township High School. Early on, he gravitated towards how systems behave under pressure, not just how they look when everything is running smoothly. He built that mindset through computer science coursework, networking classes, and hands-on tech support for school events.

Bobby earned a B.S. in Computer Science from the University of Illinois Chicago in 2013, with a practical focus on operating systems, networking, and applied cryptography-type work. A 2012 internship with NorthShore University HealthSystem gave him early exposure to enterprise controls in a healthcare setting, where access and process matter.

He began his career in enterprise IT at CDW, then moved into systems administration at Aon, working closely with identity and endpoint workflows. In 2018, he transitioned into security operations at CME Group as a SOC analyst, investigating SIEM alerts, triaging phishing reports, and producing clean incident timelines. Since 2021, he has worked at United Airlines as a cybersecurity analyst, partnering across teams to improve detections, reduce alert fatigue, and strengthen controls before incidents escalate. Known for calm, methodical execution and strong documentation, Bobby leads through clarity, repeatable processes, and continuous improvement.

Advertisement

Where did your interest in cybersecurity begin?

It started with problem solving and systems thinking. Even early on, I cared less about surface level functionality and more about what happens when something breaks or gets stressed. That way of thinking stayed with me through school and into work.

How did your education shape your approach?

I studied Computer Science at the University of Illinois Chicago and finished in 2013. I focused on practical, systems-oriented classes like operating systems and networking, plus applied cryptography-type work. That foundation still shows up in how I investigate issues. I want to understand what the system is doing, not just what a tool says.

What did you learn from your first real enterprise experience?

In 2012, I interned with NorthShore University HealthSystem in IT support. I worked ticket queues, device imaging, and account and password issues. It was also my first close look at a setting where policy and access controls are taken seriously. You learn quickly that process is not optional when sensitive systems are involved.

How did your early career roles prepare you for security work?

I started at CDW as a service desk analyst supporting business clients. The work taught me how enterprise environments fail in everyday ways, and how users experience risk. I also built a habit of writing things down. If a fix works once, it should be repeatable. From 2015 to 2018 at Aon, I worked in systems administration with identity and endpoint support. That role put me close to account provisioning, group policy, patch coordination, and security-adjacent issues like phishing and compromised accounts. It was a clear view of how security, compliance, and business urgency collide.

Advertisement

What changed when you moved into a SOC role at CME Group?

The pace and the signal-to-noise problem got real. From 2018 to 2021, I monitored SIEM alerts, investigated endpoint and network anomalies, and triaged phishing reports. A big part of the job is working out what is just noisy and what is actually dangerous. I focused on clean timelines and clear incident notes. If the timeline is messy, the response is messy. I also started writing runbooks and checklists that other analysts used. That helped the team move faster and more consistently.

What does your role at United Airlines look like today?

Since 2021, I have worked as a cybersecurity analyst focused on threat detection and incident response. I investigate anomalies and support response work, but I also spend time on improvements that prevent repeat issues. That includes partnering with IT and engineering on hardening controls and reducing alert fatigue. If you do not address fatigue, you miss real problems because everything starts to look the same.

How would you describe your working style?

Methodical. Calm under pressure. I use precise language and I separate confirmed findings from suspected ones. I document as I go. I treat near misses as valuable because they show you where the gaps are, without the cost of a full incident.

What do you pay attention to as the field keeps changing?

Evolving attack vectors, cloud security trends, and the regulatory frameworks that shape large enterprises. Cybersecurity demands constant education. I do not treat learning as a side project. It is part of the job.

Advertisement

What keeps you grounded outside of work?

Endurance running along Lake Michigan, strategy board games, and reading history and behavioural science. Those interests connect back to the work in a quiet way. They reinforce patience, pattern recognition, and an understanding of the human side of risk.

Advertisement
Continue Reading

Business

Ethereum Climbs 11% In Bullish Trade

Published

on


Ethereum Climbs 11% In Bullish Trade

Continue Reading

Business

Epstein emails: So-called 'shady financier' was Andrew's 'trusted money man'

Published

on

Epstein emails: So-called 'shady financier' was Andrew's 'trusted money man'

Andrew seemed keen for Epstein to do business with David Rowland, but Epstein was wary, emails suggest.

Continue Reading

Business

Viterra merger ‘already delivering results,’ Bunge CEO says

Published

on

Viterra merger ‘already delivering results,’ Bunge CEO says

Sales climb 32% in fiscal 2025.

Continue Reading

Business

Barrick Mining: Meet The New Boss, Not The Same As The Old Boss

Published

on

Barrick Mining: Meet The New Boss, Not The Same As The Old Boss

Barrick Mining: Meet The New Boss, Not The Same As The Old Boss

Continue Reading

Trending

Copyright © 2025