Loupe mettant en évidence une alerte numérique sur un fond d’interface et de données en tons violets.
|

Les signaux faibles : ces détails peu observés qui révèlent la véracité d’une identité digitale

Modern fraudsters no longer break down doors; they enter with the right keys. Valid credentials, recognized devices, credible customer journeys: everything seems normal. And yet, something is wrong. That something is weak signals. What is a weak signal in digital identity? A weak signal, as its name suggests, is not a red alert. It is…

Robot d’intelligence artificielle analysant des interfaces numériques holographiques, symbolisant l’Agentic AI et l’automatisation des processus dans la lutte contre la fraude en ligne.
|

IA agentique – ce que vous devez savoir en 2026 

Agentic AI – autonomous systems that can observe, decide and act across multiple tools – is about to collide hard with European fraud and payments – on both sides of the fraud fight. For merchants and banks, the real story in 2026 won’t be “magic AI agents that make fraud disappear”, but a messy mix…

Retour e-commerce : entre défi opérationnel et risque de fraude, comment Reversys et Oneytrust réinventent la logistique inverse
|

Retour e-commerce : entre défi opérationnel et risque de fraude, comment Reversys et Oneytrust réinventent la logistique inverse

The operational challenge: managing the complexity of returns Each return involves several parties: customer service, warehouse, carrier. Too often, these systems operate in silos, leading to delays, errors and a poor customer experience. A parcel dropped off at a collection point may remain invisible to customer service, generating calls, frustration and late refunds. This is…

Cookies : alliés marketing ou faille pour la fraude ?
|

Cookies : un allié marketing… mais aussi une faille pour la fraude

Why are cookies such a prime target? The impact on your brand Examples of techniques used by fraudsters How to protect your digital ecosystem? ConclusionCookies are valuable tools for improving user experience and optimising marketing strategies. However, their exploitation by fraudsters poses a major risk: session theft, identity theft, advertising fraud, etc. These threats can…

Identité synthétique - Lavable en Machine Learning
|

Identités synthétiques : la fraude invisible qui coûte des milliards

What is a synthetic identity? Unlike traditional identity theft, where the fraudster steals an entire real identity, a synthetic identity is a hybrid combination. It combines authentic data (in the United States, this is the social security number, while elsewhere it is usually the national identity document, date of birth and postal address) with invented…

RGPD et lutte contre la fraude : un engagement historique et stratégique pour Oneytrust
|

RGPD et lutte contre la fraude : un engagement historique et stratégique pour Oneytrust

Adopted in 2016 and effective since 25 May 2018, the GDPR has profoundly transformed the way companies collect, process and secure personal data. Its objectives: For the anti-fraud sector, the impact is significant: the detection of anomalies and suspicious behaviour relies on the analysis of many types of personal data (identity, payment methods, transaction history,…

Fraud Network on a blue background. Oneytrust
|

Le réseau MERLIN : le retour !

A well-oiled fraud scheme It all starts with fake advertisements on a reputable marketplace, offering an educational game (story box) called MERLIN at a slightly discounted price compared to the competition. The buyer, enticed, places an order. But behind this transaction lies a well-oiled mechanism: the fraudster uses the customer’s details and a stolen bank…

Pouce avec une empreinte digitale sur un fond noir. Sur les autres doigts il y a des pictos de : téléphone / e-mail / adresse IP / Device. Logo Oneytrust.
|

L’identité digitale : la nouvelle carte d’identité de l’ère numérique - Partie 2

a) Security and protection of citizens The primary purpose of digital identity is protection. Users whose identities are stolen suffer dramatic consequences: loans taken out in their name, administrative disputes, damaged online reputations. Having a robust digital identity based on reliable technical and behavioural signals helps limit these risks. b) Trust and fluidity of exchanges…

Empreinte numérique d'un doigt sur un fond digital foncé.
|

L’identité digitale : la nouvelle carte d’identité de l’ère numérique - Partie 1

Digital identity is therefore becoming the backbone of the connected world. It condenses our personal data, our ‘technical’ fingerprints (device fingerprinting), our behaviours and our interactions. It is at once a recognition tool, a shield against fraud and a key to accessing services. 1 . Defining digital identity: Unlike civil identity, which is established and…

Réseau MERLIN : anatomie d'une fraude triangulaire
|

Réseau MERLIN : anatomie d'une fraude triangulaire

What is triangular fraud? Triangular fraud is a complex and ingenious method of fraud that combines elements of real and synthetic identities to create a network of fraudulent transactions. This type of fraud relies on the interaction between three parties: the fraudster, the legitimate seller and the unwitting consumer, in order to divert resources discreetly…

End of content

End of content