<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>identite Archives - Oneytrust</title>
	<atom:link href="https://www.oneytrust.com/es/tag/identite/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.oneytrust.com/es/tag/identite/</link>
	<description>Only Trusted Customers. Oneytrust provides fraud detection and identity validation for merchants and banks. Unique consortia data, unbeatable fraud scoring.</description>
	<lastbuilddate>Sat, 19 Jul 2025 19:56:05 +0000</lastbuilddate>
	<language>es</language>
	<sy:updateperiod>
	hourly	</sy:updateperiod>
	<sy:updatefrequency>
	1	</sy:updatefrequency>
	

<image>
	<url>https://www.oneytrust.com/wp-content/uploads/2025/06/cropped-Oneytrust_Symbol_Purple_Square-32x32.png</url>
	<title>identite Archives - Oneytrust</title>
	<link>https://www.oneytrust.com/es/tag/identite/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>What is synthetic identity fraud?</title>
		<link>https://www.oneytrust.com/es/what-is-synthetic-identity-fraud/</link>
		
		<dc:creator><![CDATA[Julie Breton]]></dc:creator>
		<pubdate>Sat, 19 Jul 2025 19:56:05 +0000</pubdate>
				<category><![CDATA[Expertise]]></category>
		<category><![CDATA[General]]></category>
		<category><![CDATA[ecommerce]]></category>
		<category><![CDATA[FRAUDE]]></category>
		<category><![CDATA[identite]]></category>
		<category><![CDATA[luttecontrelafraude]]></category>
		<category><![CDATA[synthetique]]></category>
		<guid ispermalink="false">https://www.oneytrust.com/?p=1674</guid>

					<description><![CDATA[<p>What remains to be agreed is what is ‘false’ information and what is ‘true’. It all depends on the context and the vertical being “attacked”.On the vertical side, in the context of banking onboarding, what is generally true are the supporting documents that are in fact usurped (identity document, proof of address, etc.). What is...</p>
<p>The post <a href="https://www.oneytrust.com/es/what-is-synthetic-identity-fraud/">What is synthetic identity fraud?</a> appeared first on <a href="https://www.oneytrust.com/es">Oneytrust</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h3 class="wp-block-heading"></h3>



<p>What remains to be agreed is what is ‘false’ information and what is ‘true’.</p>



<p><br>It all depends on the context and the vertical being “attacked”.<br>On the vertical side, in the context of banking onboarding, what is generally true are the supporting documents that are in fact usurped (identity document, proof of address, etc.). What is ‘false’ (or rather ‘created for the occasion’) are the contact details (e-mail address and telephone number).<br></p>



<p>In the field of e-commerce, what is true is the delivery address (inevitably… the product must arrive safely) and the means of payment (usurped most of the time). What&#8217;s not true is the same as for banking onboarding. And this has always been the case. Hence our preamble.<br></p>



<p>As far as the context is concerned, everything will depend on the level of control in place regarding contact data. For example, if onboarding does not include a check that the Internet user has access to the declared e-mail address, for example by sending a welcome message with a link to click for confirmation/creation of the account, the professional runs the risk of the fraudster using a usurped e-mail address (that of the usurped identity or an address with a homonym in the username).</p>



<p><strong>How do you fall for it (without the right equipment)?</strong><br>Without data lookup, it&#8217;s easy to confuse a synthetic identity with a well-crafted digital identity.<br></p>



<p>For the record, a data lookup is the ability to access ‘history markers’. A newly created e-mail address and a recently activated telephone number do not have the attributes of those who have ‘had a life’.<br>What&#8217;s more, the fraudster will generally have taken care to create an e-mail address with a username that reflects the identity declared or assumed. For example, they will avoid using numbers randomly suggested by the webmail selected, such as dupont.jean12349@……. Instead, if a username without numbers is not suggested, they will opt for numbers that reflect the identity they have assumed, such as the department, the postcode of the delivery address, the year or even the date of birth.<br></p>



<p>As for the telephone number, the well-informed fraudster will have realised that it&#8217;s best to avoid using MVNOs (Mobile Virtual Network Operators) specialising in prepaid or ‘disposable number’ services, which are easy to spot. They will be more likely to opt for prepaid offers… but from an MNO (Mobile Network Operator).</p>



<p><strong>How can we protect ourselves?</strong><br>It&#8217;s hard to do without ‘customer knowledge’. Either by having access to Consortium Data (a pooled database), or by benefiting from a data lookup that can pinpoint risk indicators.<br>And here… you can&#8217;t see it, but we&#8217;re ‘pointing the finger’ at ourselves with our best smile…<br></p>



<p>To find out more about our solutions, <a href="https://www.oneytrust.com/fr/digital-identity/">click here</a>!</p><p>The post <a href="https://www.oneytrust.com/es/what-is-synthetic-identity-fraud/">What is synthetic identity fraud?</a> appeared first on <a href="https://www.oneytrust.com/es">Oneytrust</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>