Anti-Fraud Command Center
Transcription
Anti-Fraud Command Center
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’IDENTITE DANS LEQUEL UN FRAUDEUR UTILISE UN E-MAIL SEMBLANT AUTHENTIQUE POUR INDUIRE SON DESTINATAIRE A COMMUNIQUER DES # 1 ' INFORMATIONS PERSONNELLES 1 " " ' -3H # 1 ' "$ $ =" *6 " " 1' 8 5 I0H 36 ,6 " ) "$ $ 5 1 SENSIBLES (NUMERO DE CARTE DE CREDIT, DE COMPTE ? 1 # BANCAIRE , DE SECURITE SOCIALE, ETC.) ,. ' - - # 1 1 ' " ' 6 ' 1 $ 1 " 1 " 1 ' " 7 " " 1 5 "6 < ' " " 1 # " " $ C 1 ' # 3, $- - $ $ ' 067 8 91 / 92 // .8 1 .9:: . 1 : 9.8 . .8). 7921 ;) / 76 1 77 .8 88 .87 977 8 7 : 71 :1 81 9. 9) 7 8 ) 81 9. 1 771 1 8 # ? 7 " *1 1 9.. $ * " 1 5 5 4 5 IJ H K 1 ' " 1 4,/ , ) D " " # $' $ $ # ' H " 2JJ 8 * IJ H $ # " ( L % #M + "J & K N "7 " ' $1 5 "6 1 -, 6 2 *6 * "7 ' # 5 ' "