<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>cybercirminalite Archives - Oneytrust</title>
	<atom:link href="https://www.oneytrust.com/nl/tag/cybercirminalite/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.oneytrust.com/nl/tag/cybercirminalite/</link>
	<description>Only Trusted Customers. Oneytrust provides fraud detection and identity validation for merchants and banks. Unique consortia data, unbeatable fraud scoring.</description>
	<lastbuilddate>Wed, 10 Dec 2025 16:39:58 +0000</lastbuilddate>
	<language>nl-NL</language>
	<sy:updateperiod>
	hourly	</sy:updateperiod>
	<sy:updatefrequency>
	1	</sy:updatefrequency>
	

<image>
	<url>https://www.oneytrust.com/wp-content/uploads/2025/06/cropped-Oneytrust_Symbol_Purple_Square-32x32.png</url>
	<title>cybercirminalite Archives - Oneytrust</title>
	<link>https://www.oneytrust.com/nl/tag/cybercirminalite/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Cookies: a marketing ally… but also a loophole for fraud</title>
		<link>https://www.oneytrust.com/nl/cookies-a-marketing-ally-but-also-a-loophole-for-fraud/</link>
		
		<dc:creator><![CDATA[Julie Breton]]></dc:creator>
		<pubdate>Wed, 10 Dec 2025 16:39:57 +0000</pubdate>
				<category><![CDATA[Expertise]]></category>
		<category><![CDATA[General]]></category>
		<category><![CDATA[cookies]]></category>
		<category><![CDATA[cybercirminalite]]></category>
		<category><![CDATA[ecommerce]]></category>
		<category><![CDATA[FRAUDE]]></category>
		<category><![CDATA[luttecontrelafraude]]></category>
		<category><![CDATA[marketing]]></category>
		<guid ispermalink="false">https://www.oneytrust.com/?p=3634</guid>

					<description><![CDATA[<p>Why are cookies such a prime target? The impact on your brand Examples of techniques used by fraudsters How to protect your digital ecosystem? ConclusionCookies are valuable tools for improving user experience and optimising marketing strategies. However, their exploitation by fraudsters poses a major risk: session theft, identity theft, advertising fraud, etc. These threats can...</p>
<p>The post <a href="https://www.oneytrust.com/nl/cookies-a-marketing-ally-but-also-a-loophole-for-fraud/">Cookies: a marketing ally… but also a loophole for fraud</a> appeared first on <a href="https://www.oneytrust.com/nl">Oneytrust</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>Why are cookies such a prime target?</strong></p>



<ul class="wp-block-list">
<li><strong>Easy to hijack</strong>: A stolen cookie can be enough to steal someone&#8217;s online identity.</li>



<li><strong>Rich in sensitive data</strong>: Usernames, sessions, preferences… all this information can be exploited for targeted attacks.</li>



<li><strong>Invisible to the user</strong>: Most internet users are unaware of the scope of the information stored, which facilitates fraud.</li>
</ul>



<p><strong>The impact on your brand</strong></p>



<ul class="wp-block-list">
<li><strong>Advertising fraud</strong>: Falsified cookies artificially inflate impressions and clicks, distorting your KPIs and increasing your costs.</li>



<li><strong>Session hijacking</strong>: Hackers can access customer accounts, generating fraudulent transactions.</li>



<li><strong>Reputational damage</strong>: A vulnerability exploited via cookies can damage your image and your GDPR compliance.</li>
</ul>



<p><strong>Examples of techniques used by fraudsters</strong></p>



<ul class="wp-block-list">
<li><strong>Session sniffing</strong>: Interception of cookies on unsecured websites.</li>



<li><strong>XSS injection</strong>: Malicious scripts to steal cookies.</li>



<li><strong>CSRF</strong>: Fraudulent actions performed without the user&#8217;s knowledge.</li>



<li><strong>Predictable credentials</strong>: Exploitation of weak algorithms to guess sessions.</li>
</ul>



<p><strong>How to protect your digital ecosystem?</strong></p>



<ul class="wp-block-list">
<li><strong>Proactive monitoring</strong>: Detecting anomalies in cookie-related behaviour.</li>



<li><strong>Advanced anti-fraud solutions</strong>: Identifying falsified or cloned cookies.</li>



<li><strong>Awareness and transparency</strong>: Informing your users and building trust.</li>
</ul>



<p><strong>Conclusion</strong><br>Cookies are valuable tools for improving user experience and optimising marketing strategies. However, their exploitation by fraudsters poses a major risk: session theft, identity theft, advertising fraud, etc. These threats can impact customer confidence, distort your metrics and damage your image.</p>



<p><br>To remain competitive and protect your digital ecosystem, it is essential to take a proactive approach: secure your customer journeys, integrate anti-fraud solutions, and inform your users. <strong>Protecting cookies means protecting your business and your reputation.</strong></p>



<p><br><img src="https://s.w.org/images/core/emoji/15.0.3/72x72/1f449.png" alt="👉" class="wp-smiley" style="height: 1em; max-height: 1em;" /> Contact us to secure your customer journeys and build trust in your services.</p><p>The post <a href="https://www.oneytrust.com/nl/cookies-a-marketing-ally-but-also-a-loophole-for-fraud/">Cookies: a marketing ally… but also a loophole for fraud</a> appeared first on <a href="https://www.oneytrust.com/nl">Oneytrust</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>What color is your fraud ?</title>
		<link>https://www.oneytrust.com/nl/what-color-is-your-fraud/</link>
		
		<dc:creator><![CDATA[Julie Breton]]></dc:creator>
		<pubdate>Thu, 17 Jul 2025 14:53:43 +0000</pubdate>
				<category><![CDATA[Expertise]]></category>
		<category><![CDATA[General]]></category>
		<category><![CDATA[cybercirminalite]]></category>
		<category><![CDATA[ecommerce]]></category>
		<category><![CDATA[FRAUDE]]></category>
		<category><![CDATA[luttecontrelafraude]]></category>
		<guid ispermalink="false">https://www.oneytrust.com/?p=1662</guid>

					<description><![CDATA[<p>And what does the Oxford dictionary define as a process? A set of phenomena, conceived as active and organised over time&#8221;.So let&#8217;s unpack this definition for a better understanding of the subject… &#8220;Set of phenomena&#8220;Admittedly, this is a very broad definition. Chronologically, the first phenomenon to be identified and observed is the fault that is...</p>
<p>The post <a href="https://www.oneytrust.com/nl/what-color-is-your-fraud/">What color is your fraud ?</a> appeared first on <a href="https://www.oneytrust.com/nl">Oneytrust</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h3 class="wp-block-heading"></h3>



<p>And what does the Oxford dictionary define as a process? A set of phenomena, conceived as active and organised over time&#8221;.<br>So let&#8217;s unpack this definition for a better understanding of the subject…</p>



<p><br><strong>&#8220;Set of phenomena</strong>&#8220;<br>Admittedly, this is a very broad definition. Chronologically, the first phenomenon to be identified and observed is the fault that is exploited and the influence that can be exerted to mitigate it.</p>



<p><br>From the point of view of the person exploiting the flaw, the question that arises is what level of involvement they will have. This will determine whether he can be labelled a ‘fraudster’ or a ‘cheat’. Both commit fraud.</p>



<p><br>But the fraudster is a professional. He has worked on his subject and his organisation. They run a small, high-volume business. He will automate as much as possible (bots). They protect their identity. Identifying it and recovering it is a challenge.</p>



<p><br>The cheater, on the other hand, is more of an amateur. They are opportunists and count on a certain impunity. They don&#8217;t hide their identity, if at all. That&#8217;s a good thing for recovering it…</p>



<p><br>Over the years, there has been increasing overlap between fraudsters and cheats. First with the phenomenon of ‘mules’ (‘cheats’ duped and recruited by ‘fraudsters’ to redirect parcels), now with ‘fraud as a service’ (“cheats” contracting with ‘fraudsters’ to share the benefits of fraud, particularly in return fraud).</p>



<p><strong>&#8220;Conceived as an active</strong>&#8220;</p>



<p>The degree of activity is decisive. It is what betrays the ‘set of phenomena’. Observation of velocity is fundamental to the fight against fraud.</p>



<p><br>To do this, you need to know how to make everything that can be observed quantifiable. Because fraud adapts. Today, it is no longer enough to observe the number of events attached to an e-mail address. We need to be able to dissect the structure of that e-mail address and see how representative it is of the whole. Is it within the statistical norm (e.g. an e-mail address with an atypical domain and a username made up of a large number of digits)? If not, is there an over-representation of e-mail addresses with the same characteristics over a relatively recent period?</p>



<p><br>And you need to be able to do this for each piece of data. For each, you need to be able to associate as much information as possible.</p>



<p><strong>&#8220;Organised in time</strong>&#8220;<br>Time management. Strike ‘fast and hard’ or ‘stay under the radar’ to exploit the loophole for as long as possible. Fraudsters do both. Cheaters tend to do the latter.</p>



<p><br>For the latter, there is often nothing like the watch list. We may not have believed in Father Christmas for a long time, but it&#8217;s clear that having a ‘naughty list’ is essential. Because cheats are often ‘small-time fraudsters’, they practice ‘stop and go’. So they can stop for a while and then come back again. Of course, everyone can benefit from the ‘right to forget’. That&#8217;s why the best practice is to create a multi-factor reputation score.</p>



<p><strong>&#8220;What now?</strong>&#8220;<br>By understanding the motivation of the ‘opposing camp’, analysing their practices and identifying their tools, we can build a response that is appropriate and sustainable.</p>



<p><br>For example, in an online environment. For fallible events, what is the number one fraud risk indicator if I am offering services or to humans? Well, the indication that I&#8217;m dealing with a ‘non-human’. So, very early on in the process, I set up a bot identification tool. Once it&#8217;s been addressed, what do I want to determine? Do I “know” the individual associated with the event I&#8217;m analysing? If so, am I in a position to have evidence that it is indeed him (risk of usurpation / account takeover)? If not, do I still have the elements to confirm that it is a reliable identity (digital identity with standard attributes)?</p>



<p><br>It is this set of questions that enables you to build a decision tree. Here&#8217;s an example : <a href="https://www.oneytrust.com/wp-content/uploads/2025/07/Arbre_decisionnel_whatcolorisyourfraud_Oneytrust.jpg">Decision Tree</a>.</p>



<p><br>So, do you have a green thumb?</p>



<p></p><p>The post <a href="https://www.oneytrust.com/nl/what-color-is-your-fraud/">What color is your fraud ?</a> appeared first on <a href="https://www.oneytrust.com/nl">Oneytrust</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>25 years of fighting fraud: retrospective, changes and the future of e-commerce</title>
		<link>https://www.oneytrust.com/nl/25-years-of-fighting-fraud-retrospective-changes-and-the-future-of-e-commerce/</link>
		
		<dc:creator><![CDATA[Julie Breton]]></dc:creator>
		<pubdate>Fri, 11 Jul 2025 14:08:35 +0000</pubdate>
				<category><![CDATA[Expertise]]></category>
		<category><![CDATA[General]]></category>
		<category><![CDATA[BNPL]]></category>
		<category><![CDATA[cybercirminalite]]></category>
		<category><![CDATA[DSP3]]></category>
		<category><![CDATA[ecommerce]]></category>
		<category><![CDATA[fevad]]></category>
		<category><![CDATA[galerieslafayette]]></category>
		<category><![CDATA[IA]]></category>
		<category><![CDATA[identitesynthetique]]></category>
		<category><![CDATA[internet]]></category>
		<category><![CDATA[luttecontrelafraude]]></category>
		<guid ispermalink="false">https://www.oneytrust.com/?p=1645</guid>

					<description><![CDATA[<p>From the rise of the Internet to the age of AI: 25 years of change E-commerce has grown by leaps and bounds since the early 2000s, and with it, fraud has continued to evolve. According to the FEVAD figures communicated at this Round Table, 72% of e-retailers are profitable or break-even, which clearly shows that...</p>
<p>The post <a href="https://www.oneytrust.com/nl/25-years-of-fighting-fraud-retrospective-changes-and-the-future-of-e-commerce/">25 years of fighting fraud: retrospective, changes and the future of e-commerce</a> appeared first on <a href="https://www.oneytrust.com/nl">Oneytrust</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h3 class="wp-block-heading"><strong>From the rise of the Internet to the age of AI: 25 years of change</strong></h3>



<p>E-commerce has grown by leaps and bounds since the early 2000s, and with it, fraud has continued to evolve. According to the FEVAD figures communicated at this Round Table, 72% of e-retailers are profitable or break-even, which clearly shows that e-commerce is a profitable business. And e-commerce is also a job creator, with 41% of e-retailers having created jobs by 2024.</p>



<figure class="wp-block-video"><video controls src="https://www.oneytrust.com/wp-content/uploads/2025/07/table-ronde_v3-360p.mp4"></video><figcaption class="wp-element-caption">Table Ronde Oneytrust du 19 juin 2025, retrospective et perspective du e-commerce ces 25 dernières années</figcaption></figure>



<p><strong>2000-2005: the beginnings of e-commerce</strong></p>



<p>The arrival of the Internet in homes marked the start of a new consumer channel. The first e-commerce sites appeared, often with little security. Fraudulent behaviour remained small-scale, but was already a cause for concern.</p>



<p><strong>2005-2010: the boom in e-commerce… and fraud</strong></p>



<p>E-commerce becomes more democratic with the rise of marketplaces and the first major peaks in online consumption. At the same time, fraud is becoming more structured, targeting payments and technical flaws.</p>



<p><strong>2010-2015: the social networking effect and the expansion of fraud profiles</strong></p>



<p>Facebook, Instagram and other platforms are giving rise to new uses… but also new vectors for fraud. Content linked to fraudulent methods is becoming accessible to everyone. The profile of fraudsters is changing, from organised networks to everyday opportunists.</p>



<p><strong>2015-2020: regulation, PSD2 and increasingly complex payment transactions</strong></p>



<p>The entry into force of PSD2 in Europe (Payment Services Directive) requires strong authentication. The aim is to make payments more secure. As a result, fraudsters are moving to other areas (PayPal disputes, neo-banks, refunds, etc.). Human error is becoming a major target.</p>



<p><strong>2020-2025: industrialisation, cybercrime and AI</strong></p>



<p>The boundaries between fraud and cybercrime are becoming blurred. Attacks are becoming more professional, and fraudsters&#8217; tools are becoming ultra-technical, sometimes doped with AI.</p>



<p>At the same time, merchants are having to cope with tighter regulation (BNPL, consumer credit framework), ever more demanding customer journeys, and increasing pressure on security… without compromising the user experience.</p>



<p><img src="https://s.w.org/images/core/emoji/15.0.3/72x72/1f9e0.png" alt="🧠" class="wp-smiley" style="height: 1em; max-height: 1em;" /> <strong>The next 25 years: human intelligence at the heart of the battle</strong></p>



<p>The next few years promise to be just as decisive. Deepfake, synthetic identities, behavioural fraud and offensive AI are shaking things up.</p>



<p>But one thing remains certain: it is human intelligence that will make the difference. Where automated models can be fooled by a synthetic identity, the human expertise built into our approach can detect anomalies.</p>



<p><img src="https://s.w.org/images/core/emoji/15.0.3/72x72/1f680.png" alt="🚀" class="wp-smiley" style="height: 1em; max-height: 1em;" /> <strong>Why merchants need to (re)think their anti-fraud strategy</strong></p>



<p>With fraudsters becoming ever more equipped, merchants&#8217; anti-fraud strategy can no longer rely solely on technology or compliance.</p>



<p>The keys to effective fraud prevention today :</p>



<ul class="wp-block-list">
<li>Combine technical and behavioural approaches</li>



<li>Work with partners who are familiar with emerging patterns</li>



<li>Anticipating regulatory changes (DSP3, IA Act, consumer credit, etc.)</li>



<li>Combining business performance and security</li>
</ul>



<p>It is with this in mind that Oneytrust has been working with the biggest e-commerce players for 25 years. </p>



<p><strong>Our mission: to create trust, without friction.</strong></p>



<p><img src="https://s.w.org/images/core/emoji/15.0.3/72x72/1f449.png" alt="👉" class="wp-smiley" style="height: 1em; max-height: 1em;" /> <strong>Would you like to find out more about our anti-fraud solutions?</strong></p>



<p>Please contact us.</p>



<p><a href="https://www.oneytrust.com/fr/contact/">Meet our fraud experts</a> and find out how Oneytrust can turn your security into a competitive advantage.</p>



<p>The future of e-commerce is being built today. Together, let&#8217;s build it on trust.</p>



<p></p><p>The post <a href="https://www.oneytrust.com/nl/25-years-of-fighting-fraud-retrospective-changes-and-the-future-of-e-commerce/">25 years of fighting fraud: retrospective, changes and the future of e-commerce</a> appeared first on <a href="https://www.oneytrust.com/nl">Oneytrust</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.oneytrust.com/wp-content/uploads/2025/07/table-ronde_v3-360p.mp4" length="122168083" type="video/mp4" />
<enclosure url="https://www.oneytrust.com/wp-content/uploads/2025/07/table-ronde_v3-360p.mp4" length="122168083" type="video/mp4" />

			</item>
	</channel>
</rss>