Fraud Network on a blue background. Oneytrust
|

MERLIN Network: the comeback!

A well-oiled fraud scheme It all starts with fake advertisements on a reputable marketplace, offering an educational game (story box) called MERLIN at a slightly discounted price compared to the competition. The buyer, enticed, places an order. But behind this transaction lies a well-oiled mechanism: the fraudster uses the customer’s details and a stolen bank…

Pouce avec une empreinte digitale sur un fond noir. Sur les autres doigts il y a des pictos de : téléphone / e-mail / adresse IP / Device. Logo Oneytrust.
|

Digital identity: the new identity card for the digital age – Part 2

a) Security and protection of citizens The primary purpose of digital identity is protection. Users whose identities are stolen suffer dramatic consequences: loans taken out in their name, administrative disputes, damaged online reputations. Having a robust digital identity based on reliable technical and behavioural signals helps limit these risks. b) Trust and fluidity of exchanges…

Empreinte numérique d'un doigt sur un fond digital foncé.
|

Digital identity: the new identity card for the digital age – Part 1

Digital identity is therefore becoming the backbone of the connected world. It condenses our personal data, our ‘technical’ fingerprints (device fingerprinting), our behaviours and our interactions. It is at once a recognition tool, a shield against fraud and a key to accessing services. 1 . Defining digital identity: Unlike civil identity, which is established and…

MERLIN network: anatomy of a triangular fraud
|

MERLIN network: anatomy of a triangular fraud

What is triangular fraud? Triangular fraud is a complex and ingenious method of fraud that combines elements of real and synthetic identities to create a network of fraudulent transactions. This type of fraud relies on the interaction between three parties: the fraudster, the legitimate seller and the unwitting consumer, in order to divert resources discreetly…

Cerveau divisé en deux avec un cerveau humain et un cerveau digital relié à des données. Avec écrit : L'IA détecte. L'Humain comprend. Ensemble, ils sécurisent.
|

AI at Oneytrust: technology at the heart of our DNA!

1) Why AI has become essential in the fight against fraud The boom in language models and content generation tools has lowered the barriers to fraud: flawless phishing emails, carefully crafted fake profiles, synthetic identities that are more difficult to detect, industrialisation of fraud scenarios, reusable attack scripts. Static controls are no longer sufficient. We…

Sécurité et expérience client : trouvez le bon équilibre
|

Security and Customer Experience: Finding the Perfect Balance

So how do you strike this delicate balance? At Oneytrust, we have made this complex equation our mission. Security: an imperative that must not sacrifice fluidity In an environment where cyberattacks are becoming more professional, we can no longer afford to turn a blind eye. Traditional KYC (Know Your Customer) checks are no longer enough….

Image d'une main humaine avec un doigt qui rejoint une main robotique. Avec au mileu le logo Oneytrust.
|

AI a strategic asset in the fight against e-Commerce fraud!

At Oneytrust, a long-standing player in the sector for over 25 years, we have turned this dual reality into an opportunity to innovate, by placing AI at the heart of our anti-fraud strategy. How does Oneytrust use Artificial Intelligence to detect fraudulent behaviour?Online fraud is evolving rapidly. Fraudsters are now using tools such as Chat…

Table Ronde Oneytrust du 19 juin 2025, 25 ans de ecommerce et de lutte contre la fraude : rétrospectives et perspectives
|

25 years of fighting fraud: retrospective, changes and the future of e-commerce

From the rise of the Internet to the age of AI: 25 years of change E-commerce has grown by leaps and bounds since the early 2000s, and with it, fraud has continued to evolve. According to the FEVAD figures communicated at this Round Table, 72% of e-retailers are profitable or break-even, which clearly shows that…

End of content

End of content