Business Icon

Business

Yoti Identity Fraud Report

We’re pleased to publish the first edition of our identity fraud report, which explores the fraud trends we’ve seen over the past 24 months. We delve into the tactics fraudsters are using and how these are evolving. We also explain why using technology and a team of verification experts together provides the best defence against fraud.   Key takeaways from the report: It’s challenging to understand the exact figures and the true scale of fraud; businesses can only report on the fraud they know about Fraud is evolving; fraudsters are exploiting different tactics including deepfakes and tampered with documents The

2 min read

Yoti MyFace Match development and improvement

Yoti MyFace Match is what’s known as a 1:1 and 1:N face matching solution. The technology compares a single image with another image or set of images in real time to determine if it is the same person. Yoti licences this facial recognition technology to businesses wanting to be sure that, for example, the right person is accessing their online accounts. MyFace Match is also useful to businesses because they invite users to opt-in  to be ‘verified’ and then be required to provide consent whenever their image or content is published. In the case of live streaming, businesses can monitor

4 min read

Combatting deepfakes online

It’s concerning to see how innovative artificial intelligence (AI) is being used to create deepfakes that are spreading disingenuous information and explicit images online. Deepfakes are realistic videos or images created by generative AI. Fraudsters can now use advanced algorithms to manipulate visual and audio elements that mimic real people. This fake content shows people doing or saying things they never did. Two prominent individuals have recently been targets of deepfake scams. A video featuring Taylor Swift generated by artificial intelligence was used to promote a fraudulent cookware competition, and explicit AI-generated images of her were widely circulated online. Additionally,

6 min read

On the threat of detecting deepfakes

Learn how Yoti can help you defeat deepfakes As the threat of generative AI in identity and content integrity continues to build, Yoti has developed a comprehensive strategy focused on early detection by using tools to prevent AI-generated content or attacks at the point of source. Yoti’s strategy for detecting generative AI threats targets two attack vectors: presentation attacks (direct) and injection attacks (indirect), with a focus on early detection during the verification or authentication process.  Our proprietary and patented technology can work on: Deepfakes Illicit images Account takeovers Identity theft and fraud Content moderation Injection attacks Bot attacks

2 min read

How Claims Gate automates KYC for some of the UK's highest volume litigation cases

“With Yoti’s technology, we can offer a seamless and positive customer experience; all of this reduces friction and improves the onboarding process.”  James Jackson Managing Director at Claims Gate Claims Gate is a legal tech company that helps law firms onboard more clients for high volume group litigation cases. They allow law firms to automate the client qualification, esigning, document review, KYC and identity checks that law firms would otherwise have to do manually. We helped them: Provide automated identity verification checks on behalf of law firms. Offer the most user friendly interface and experience possible.   Solution:

2 min read

The importance of anti-spoofing for facial age estimation

It has been claimed that facial age estimation technology can be easily spoofed. The proliferation of news on generative AI and deepfakes has added to the conversation, and there is doubt and concern over the security of online safety systems. Suffice to say, we’ve thought of that. We have developed a suite of anti-spoofing tools to ensure your check is real, valid and accurate. Our experience working with organisations to implement age verification has enabled us to identify and cover risks and vulnerabilities. When we perform an age estimation check, we are actually performing a number of security checks simultaneously.

4 min read