Personne interviewée dans un bureau devant plusieurs écrans d’ordinateur, avec le bandeau de TF1 indiquant une enquête du journal télévisé et le nom et poste de la directrice générale affichés à l’écran. 
|

Refund fraud: when AI becomes a tool for fraudsters…

A phenomenon that TF1 recently highlighted in its 8pm news report, in which Oneytrust was able to share its expertise and shed light on these new fraudulent practices. 🚨 Fraud is evolving rapidly thanks to generative AI Fraudsters now have access to technologies that were once the preserve of experts. It takes just a few…

Illustration symbolique montrant un bouclier avec un cadenas et un maillet de justice, représentant la sécurité et la réglementation, à côté d’un cercle d’étoiles européennes entourant les lettres AI, sur fond violet.
|

AI Act and Fraud Prevention : why the market must prepare

Find out how Oneytrust is preparing to comply with this new text, which is just as crucial as the GDPR was in its day! The text defines an AI system very broadly as a ‘machine-based system, operating with varying degrees of autonomy, capable of adapting after deployment and which, for explicit or implicit purposes, deduces…

Loupe mettant en évidence une alerte numérique sur un fond d’interface et de données en tons violets.
|

Weak signals: those little-noticed details that reveal the authenticity of a digital identity

Modern fraudsters no longer break down doors; they enter with the right keys. Valid credentials, recognized devices, credible customer journeys: everything seems normal. And yet, something is wrong. That something is weak signals. What is a weak signal in digital identity? A weak signal, as its name suggests, is not a red alert. It is…

E-commerce returns: between operational challenges and the risk of fraud, how Reversys and Oneytrust are reinventing reverse logistics
|

E-commerce returns: between operational challenges and the risk of fraud, how Reversys and Oneytrust are reinventing reverse logistics

The operational challenge: managing the complexity of returns Each return involves several parties: customer service, warehouse, carrier. Too often, these systems operate in silos, leading to delays, errors and a poor customer experience. A parcel dropped off at a collection point may remain invisible to customer service, generating calls, frustration and late refunds. This is…

Cookies : alliés marketing ou faille pour la fraude ?
|

Cookies: a marketing ally… but also a loophole for fraud

Why are cookies such a prime target? The impact on your brand Examples of techniques used by fraudsters How to protect your digital ecosystem? ConclusionCookies are valuable tools for improving user experience and optimising marketing strategies. However, their exploitation by fraudsters poses a major risk: session theft, identity theft, advertising fraud, etc. These threats can…

Identité synthétique - Lavable en Machine Learning
|

Synthetic identities: the invisible fraud that costs billions

What is a synthetic identity? Unlike traditional identity theft, where the fraudster steals an entire real identity, a synthetic identity is a hybrid combination. It combines authentic data (in the United States, this is the social security number, while elsewhere it is usually the national identity document, date of birth and postal address) with invented…

GDPR and fraud prevention: a historic and strategic commitment for Oneytrust
|

GDPR and fraud prevention: a historic and strategic commitment for Oneytrust

Adopted in 2016 and effective since 25 May 2018, the GDPR has profoundly transformed the way companies collect, process and secure personal data. Its objectives: For the anti-fraud sector, the impact is significant: the detection of anomalies and suspicious behaviour relies on the analysis of many types of personal data (identity, payment methods, transaction history,…

Fraud Network on a blue background. Oneytrust
|

MERLIN Network: the comeback!

A well-oiled fraud scheme It all starts with fake advertisements on a reputable marketplace, offering an educational game (story box) called MERLIN at a slightly discounted price compared to the competition. The buyer, enticed, places an order. But behind this transaction lies a well-oiled mechanism: the fraudster uses the customer’s details and a stolen bank…

Pouce avec une empreinte digitale sur un fond noir. Sur les autres doigts il y a des pictos de : téléphone / e-mail / adresse IP / Device. Logo Oneytrust.
|

Digital identity: the new identity card for the digital age – Part 2

a) Security and protection of citizens The primary purpose of digital identity is protection. Users whose identities are stolen suffer dramatic consequences: loans taken out in their name, administrative disputes, damaged online reputations. Having a robust digital identity based on reliable technical and behavioural signals helps limit these risks. b) Trust and fluidity of exchanges…

End of content

End of content