Loading...

Full Block Accessibility Test

Published: August 11, 2025 by joseph.rodriguez@experian.com

At A Glance

It was popularised in the 1960s with the release of Letraset sheets containing Lorem Ipsum passages, and more recently with desktop publishing software like Aldus PageMaker including versions of Lorem Ipsum.

Paragraph Block- is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry’s standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It has survived not only five centuries, but also the leap into electronic typesetting, remaining essentially unchanged. It was popularised in the 1960s with the release of Letraset sheets containing Lorem Ipsum passages, and more recently with desktop publishing software like Aldus PageMaker including versions of Lorem Ipsum.

my alt text
This is an image caption
This is my alt text. Sample
This image is linked to google

Heading 2

Heading 3

Heading 4

Heading 5

  • This is a list
  • Item 1
  • Item 2
    • Sub list
    • Sub list 2
    • Sub list 3
      • More list
      • More list 2
      • More list 3
        • More more

This is the pull quote block Lorem Ipsumis simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry’s standard dummy text ever since the 1500s,

ExperianThis is the citation

This is the pull quote block Lorem Ipsumis simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry’s standard dummy text ever since the 1500s,

ExperianThis is the citation
Table elementTable elementTable element
my tablemy tablemy table
Table element Table elementTable element
Test alt

Media Text Block

of the printing and typesetting industry. Lorem Ipsum has been the industry’s standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It has survived not only five centuries, but also the leap into electronic typesetting, remaining essentially unchanged. It was popularised in the 1960s with the release of Letraset sheets containing Lorem Ipsum passages, and more recently with desktop publishing software like Aldus PageMaker including versions of Lorem Ipsum

My Small H5 Title

unmasking romance blogs

My first column title

Many desktop publishing packages and web page editors now use Lorem Ipsum as their default model text, and a search for ‘lorem ipsum’ will uncover many web sites still in their infancy.

This is alt text

My second column title

Many desktop publishing packages and web page editors now use Lorem Ipsum as their default model text, and a search for ‘lorem ipsum’ will uncover many web sites still in their infancy.

Test alt

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Heading 1

This is Icon List

Heading 2

This is more info

Heading 3

Last info

Heading 1

This is Icon List

Heading 2

This is more info

Heading 3

This last icon

Loading…
Apple in Payments: Bluetooth Edition

Apple held its annual developers conference last week to showcase its new features within iOS8. One area that still needs clarification is Apple’s intent for mobile payments. Cherian Abraham, Experian Decision Analytics mobile payments analyst, shares what he thinks Apple might look to do in the mobile payment space going forward. In my first post, I touched upon Apple’s program for third party hardware attachment market as being significant and likely to be a key aspect of its payments approach. In this post I discuss these three things: 1. How Apple’s new security paves the way for mobile payments 2. Bluetooth being secured enough where Payments is a use-case 3. Why the iPhone 6 will not have NFC Last week, 9to5mac reported that Apple has introduced a new specification for manufacturers in its MFi program (Made for iPad, iPhone and iPod) that allows them to create headphones that connect to iOS devices using a lightning connector instead of relying on the 3.5mm audio jack. Why is it important? Because as Apple looks to rid itself of any such remaining legacy vestiges, it’s also shedding any ambiguity around who is in control of the iOS hardware ecosystem and what it means to be a third party accessory maker – once reliant on open standards supported by all devices and now serving at Apple’s pleasure. It is a strategy that fits against the backdrop of an iOS ecosystem that is made up of software that is increasingly becoming more open, and hardware that is slowly being walled off – primarily in the name of security. The former is evident in how Apple has opened up third-party access to core authentication services like TouchID. What about the latter? Apple’s new security blanket Well, first let’s look at what Apple has publicly acknowledged about the MFi program. Every iOS device will initiate communication with a third-party accessory by asking it to prove sufficient authorization by Apple — to respond with an Apple-provided certificate, which iOS subsequently verifies. Further, the iOS device then issues a challenge, which is then answered by the third-party accessory by a signed response. These two steps require that a third-party accessory must have: • An Apple certificate • Requisite cryptographic capabilities — preferably in hardware to comply. That is precisely what Apple does by encapsulating all this in an Integrated Circuit that it controls – where the entire handshake is transparent to the accessory. With this – Apple’s role in the third-party accessory market becomes non-negotiable. You think you have a cool accessory that requires a trusted connection and intends to share data with an iOS device? Unless you inherit Apple’s controls you are relegated to speaking analog and conducting a limited set of user-driven operations — Start, Pause, Rewind (standard Serial UART audio playback controls) — usable only to headphones using the audio jack. Now, how about them apples? It’s important to note that these steps to validate whether an accessory is authorized to communicate with an iOS device can happen over the lightning connector, Bluetooth or WiFi. The advantage here is that this repels man-in-the-middle attacks because a malicious interceptor will not have the Apple IC to pass authorization, and subsequently will not have the negotiated key that encrypts all subsequent communication. The whole key negotiation occurs over Bluetooth. It is important because this approach can solve man-in-the-middle attacks for Bluetooth in scenarios including payments. A cynical view of the MFi program would be to consider it a toll that Apple is eager to extract from the third-party accessory makers building accessories authorized to communicate with an iOS device. A more pragmatic view would be to recognize Apple’s efforts as an ecosystem owner, whose primary intent is authenticating any and all devices within and in the periphery of the iOS ecosystem and secure all inbound and outbound data transfers. With more iOS device types, and a heterogeneous accessory market Apple is entirely justified in its role as the ecosystem owner to be at the front of the curve, to ensure security is not an afterthought – and instead to – mandate that data in transit or at rest is fully secured at all end-points. In fact, interest in Wearables, Home automation, Healthcare and Telematics are completely rewiring the rules of what it means to be an accessory anymore I believe this approach to security will be the mainstay of how Apple visualizes its role in enabling payments — regardless of channel. Anything it does to reduce payments friction will be counterbalanced by serious cryptographic measures that secure devices that have a need to communicate in payments — to authenticate, to encrypt and to subsequently transfer a payment token. With TouchID today it does so by verifying the fingerprint before authorizing the transmission of an authentication token from the Secure Enclave to an Apple server in the cloud. I don’t doubt that the authentication token being sent to the Apple server in the cloud is itself signed by the device’s unique ID – which is verified, before the server completes the purchase with a card on file. Thus, crypto pervades everything the iPhone does, touches or trusts. So how do the MFi program, Bluetooth, iOS Security fit in within Apple’s plan to tackle retail payments? For that, let’s start with NFC. With NFC anointed as the only way forward by networks and other stakeholders — every other approach was regarded as being less secure without much thought given to that classification by way of actual risk of fraud. You could build the best payments “whatchamacallit” and throw everything and the kitchen sink at it — and be still branded as ‘Card Not Present’ and inherit a higher cost. Understandably — merchants passed on it as they couldn’t scale with the costs that it confronted. No self-respecting merchant could afford to scale — unless they owned all of the risk (via decoupled debit, ACH or private label). All they could do was reject contactless and prevent themselves from being burdened by the network’s definition of a payments future. Thus the current NFC impasse was born. Now with merchants rolling out EMV-compliant terminals, many of which have contactless built in, they are desperately looking to Apple for clarity. If Apple does NFC then they have the entirety of a terminal refresh cycle (approximately 10 years) within which they hope that common sense may prevail (for example, debit as an acceptable payments choice via contactless) and correspondingly toggle the switch to begin accepting contactless payments. If Apple goes in a different direction, a merchant who has chosen an EMV-compliant terminal with or without contactless is locked out until the end of the current refresh cycle. But what if Apple went with Bluetooth? Two factors stand in the way: Bluetooth is not secure enough for payments today and terminal makers need to comply. Yet, with EMVCo publishing draft standards around tokenization one can argue that non-NFC modalities now are being given fair share, where proximity is not the only guarantee for security and other options such as Bluetooth can begin to address the challenge creatively. Where is the opportunity among all this for Bluetooth? Let’s tackle Bluetooth Range and Device Pairing that limit its utility in payments today. Range is as much a curse as it is a blessing for Bluetooth. If security via proximity was NFC’s raison d’être, then in contrast Bluetooth had to worry about man-in-the-middle attacks due to its range. Though Bluetooth communication is invariably always encrypted, the method in which two devices arrive at the encryption key is suboptimal. Since much of the early key negotiation between devices happens in the clear, brute forcing the shared secret that is key to encryption is a fairly easy and quick attack — and the range makes man-in-the-middle attacks easy to implement and harder to detect. The approach to device pairing also differs from Bluetooth to BLE. Needless to say, it is even less secure for BLE. Pairing in a payments context brings up further challenges, as it has to be silent, customer initiated and simple to execute. I am not going to pair my iPhone with a point-of-sale by punching in “000000” or another unique code each time I must pay Can NFC be of use here? It can. In fact, Bluetooth pairing is the only use case where I believe that Apple may feel there is utility for NFC so that an out-of-band key exchange can be possible (versus an in-band key exchange wholly over Bluetooth). This is far more secure than using Bluetooth alone and derives a much stronger encryption key. An out-of-band key exchange thus enables both devices to agree on a strong encryption key that can prevent malicious third parties from splicing themselves in the middle. BLE however does not allow for out-of-band key exchange and therefore is limited in its utility. This is another reason why if you are a BLE accessory maker Apple excludes you from having to participate in the MFi program. How can Apple secure Bluetooth and make it the standard of choice for a retail payment use case? The answer to that lies inside Apple’s specification for MFi participants — manifested in the form of the Integrated Circuit Apple provides to them so that these iOS accessories may authorize themselves to an iOS device and secure the communication that follows. This IC which encapsulates the initial setup including the certificate, mutual key negotiation and deriving the encryption key — can support Bluetooth. So if all that ails Bluetooth can be cured by including an IC – will point-of-sale manufacturers like Verifone and Ingenico line up to join Apple’s MFi program? The message is clear. You must curry favor with Apple if you want to be able to securely communicate with the iOS ecosystem. That is no tall barrier for terminal makers who would willingly sacrifice far more to be able to speak to 800M iOS devices and prevent being made irrelevant in an ever-changing retail environment. So why not include a single IC and instantaneously be able to authorize to that broad ecosystem of devices, and be capable of trusted communication? And if they do — or when they do — how will merchants, networks and issuers react? Today a point of sale is where everything comes together — payments, loyalty, couponing — and it’s also where everything falls apart. Will this be considered Card Present? Even with all the serious crypto that would become the underpinnings of such a system, unfairly or not the decision is entirely that of a few. Networks and issuers To answer how they may respond, we must ask how they may be impacted by what Apple builds. Is Apple really upending their role in the value chain? I believe Apple cares little about the funding source. Apple would instead defer to – the merchants who believe it should be debit, and the issuers who believe the customer should choose – and secretly hope that it is credit. I don’t think that Apple would want to get between those two factions. It wants to build simply the most secure, easy way to bring retail payments to iOS devices —  and allow all within the transaction flow to benefit. The rails do not change, but the end-points are now much more secured than they ever were, and they form a trusted bond and a far bigger pipe. A customer who authenticates via TouchID, a phone that announces to the point of sale that it’s ready to talk, a smart circuit that negotiates the strongest encryption possible while being invisible to all and a token that stands in for your payment credential that is understood by the point of sale. It is business as usual, and yet not. Will the iPhone6 have NFC? The presence of NFC in iPhone6 — if it’s announced — will not mean that NFC will be utilized in the same manner as it is today (for example, Isis). The radio will exist, but there will be no global platform secure element. Today the role of the radio is instrumental (in both secure element or HCE cases) in transmitting the PAN to the point of sale. When there are coupons that need to be presented and reconciled at the point of sale — things begin to get complex. Since the radio becomes the bottleneck, it requires longer than a quick tap for more data to be transmitted. Proximity is a good guarantee for device presence as well as the customer, but it’s a poor vehicle for information. So why wouldn’t one try to relegate it to the initial handshake to enable authentification of the device and therefore the customer with the point of sale? As I mentioned above, if Apple uses NFC, its role will be to facilitate an out-of-band key exchange to secure the subsequent Bluetooth communication so that an iOS device can trust the point of sale and securely transmit payment data. This data may include any and all tokenized payment credential along with loyalty, couponing and everything else. By using NFC for out-of-band authentication in conjunction with the authentication IC (provided by Apple) in the point of sale, Apple can run circles around the limitations imposed by a pure NFC approach — exceeding it on usability, security, adaptability and merchant utility. Yet, if NFC’s role is limited to the initial key negotiation, then the case can be made that NFC has very limited utility, it exists only to serve Apple’s security narrative, and utilizing NFC for the initial pairing strengthens the encryption and makes it harder to snoop. If it has only derived incremental value, would Apple care to put it on iPhone6 — and split its utility among customers using iPhone6 versus all others? With more than 400M iPhones out there that can support Bluetooth LE and iOS8, why ignore that advantage and create a self-induced dependency on a radio that has no subscribers today?  So where do I fall within this debate? I believe iPhone6 will not have NFC. Learn more about our Global Consulting Practice.  

Jun 10,2014 by

The true lifecycle of fraud

There are some definite misunderstandings about the lifecycle of fraud. The very first phase is infection – and regardless of HOW it happens, the victim’s machine has been compromised. You may have no knowledge of this fact and no control. All of that compromised data is off in the ether and has been sold. The next phase is to make sure that the next set of fraudsters can validate those compromised accounts and make sure they got their money’s worth. It’s only at the last phase – theft – that any money movement occurs. We call this out because there are a lot of organizations out there who have built their entire solution on this last phase. We would say you are about two weeks too late as the crime actually began much earlier. So how can you protect your organization? Here are five take-aways to consider: User / device trust. Do this user and device share a history? Has this user seen of been associated with this device historically? It may not be fraud but it is something we watch for. User / device compatibility. Does the user align with devices they’ve used in the past? What are the attributes of the device with respect to user preferences, profile and so on. Device hostility. Look at its behavior across your ecosystem. How many identities has it been associating with? Is it associated with a number of personal attributes or focused on risky activities? Malware. Does this device configuration suggest malware? Because we have information about the device itself, we can show that it’s been infected. Device reputation. Has this device been associated with previous crimes? There are some organizations who have built their entire solution around device reputation. We believe this is interesting to include but it’s more important to look at everything in the context across your entire ecosystem rather that focus on just one area. Want to learn more? Listen to this on-demand webinar “Where the WWW..wild things are – when good data is exploited for fraudulent gain”.

Jun 10,2014 by Guest Contributor

FICO Integrates Leading Fraud Management System with 41st Parameter’s Cybersecurity Technology to Reduce Blocks on Online Transactions

FICO, a leading predictive analytics and decision management software company, has partnered with 41st Parameter®, a part of Experian® and a leader in securing online relationships, to fight fraud on card-not-present (CNP) transactions, the top source of payment card fraud today, while letting more genuine transactions proceed in real time. FICO is integrating 41st Parameter’s TrustInsight™ with the FICO® Falcon® Platform, which protects 2.5 billion card accounts and is used by more than 9,000 financial institutions worldwide. Authenticating the device being used in a transaction provides yet another layer of detection to the Falcon Platform, which includes proprietary analytics based on more than 30 patents. 41st Parameter’s TrustInsight™ solution provides a real-time analysis of a transaction, crowd-sourced from a network of merchants, that produces a TrustScore™ indicating whether the transaction is likely to be genuine and should be approved. TrustInsight helps reduce the number of “false positives,” or good transactions that are declined or investigated by the card issuer. The TrustScore, integrated with the FICO Falcon Fraud Manager Platform, provides a link between data the merchant knows and data the issuer knows to enable issuers to utilize additional information that is not currently available in their fraud detection process, including the identification of a cardholder’s “trusted devices.” Read the entire release here.

Jun 10,2014 by

Test

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Phasellus at nisl nunc. Sed et nunc a erat vestibulum faucibus. Sed fermentum placerat mi aliquet vulputate. In hac habitasse platea dictumst. Maecenas ante dolor, venenatis vitae neque pulvinar, gravida gravida quam. Phasellus tempor rhoncus ante, ac viverra justo scelerisque at. Sed sollicitudin elit vitae est lobortis luctus. Mauris vel ex at metus cursus vestibulum lobortis cursus quam. Donec egestas cursus ex quis molestie. Mauris vel porttitor sapien. Curabitur tempor velit nulla, in tempor enim lacinia vitae. Sed cursus nunc nec auctor aliquam. Morbi fermentum, nisl nec pulvinar dapibus, lectus justo commodo lectus, eu interdum dolor metus et risus. Vivamus bibendum dolor tellus, ut efficitur nibh porttitor nec. Pellentesque habitant morbi tristique senectus et netus et malesuada fames ac turpis egestas. Maecenas facilisis pellentesque urna, et porta risus ornare id. Morbi augue sem, finibus quis turpis vitae, lobortis malesuada erat. Nullam vehicula rutrum urna et rutrum. Mauris convallis ac quam eget ornare. Nunc pellentesque risus dapibus nibh auctor tempor. Nulla neque tortor, feugiat in aliquet eget, tempus eget justo. Praesent vehicula aliquet tellus, ac bibendum tortor ullamcorper sit amet. Pellentesque tempus lacus eget aliquet euismod. Nam quis sapien metus. Nam eu interdum orci. Sed consequat, lectus quis interdum placerat, purus leo venenatis mi, ut ullamcorper dui lorem sit amet nunc. Donec semper suscipit quam eu blandit. Sed quis maximus metus. Nullam efficitur efficitur viverra. Curabitur egestas eu arcu in cursus. H1 asdf asdf H2 H3 H4 Lorem ipsum dolor sit amet, consectetur adipiscing elit. Vestibulum dapibus ullamcorper ex, sed congue massa. Duis at fringilla nisi. Aenean eu nibh vitae quam auctor ultrices. Donec consequat mattis viverra. Morbi sed egestas ante. Vivamus ornare nulla sapien. Integer mollis semper egestas. Cras vehicula erat eu ligula commodo vestibulum. Fusce at pulvinar urna, ut iaculis eros. Pellentesque volutpat leo non dui aliquet, sagittis auctor tellus accumsan. Curabitur nibh mauris, placerat sed pulvinar in, ullamcorper non nunc. Praesent id imperdiet lorem. H5 Curabitur id purus est. Fusce porttitor tortor ut ante volutpat egestas. Quisque imperdiet lobortis justo, ac vulputate eros imperdiet ut. Phasellus erat urna, pulvinar id turpis sit amet, aliquet dictum metus. Fusce et dapibus ipsum, at lacinia purus. Vestibulum euismod lectus quis ex porta, eget elementum elit fermentum. Sed semper convallis urna, at ultrices nibh euismod eu. Cras ultrices sem quis arcu fermentum viverra. Nullam hendrerit venenatis orci, id dictum leo elementum et. Sed mattis facilisis lectus ac laoreet. Nam a turpis mattis, egestas augue eu, faucibus ex. Integer pulvinar ut risus id auctor. Sed in mauris convallis, interdum mi non, sodales lorem. Praesent dignissim libero ligula, eu mattis nibh convallis a. Nunc pulvinar venenatis leo, ac rhoncus eros euismod sed. Quisque vulputate faucibus elit, vitae varius arcu congue et. Ut maximus felis quis diam accumsan suscipit. Etiam tellus erat, ultrices vitae molestie ut, bibendum id ipsum. Aenean eu dolor posuere, tincidunt libero vel, mattis mauris. Aliquam erat volutpat. Sed sit amet placerat nulla. Mauris diam leo, iaculis eget turpis a, condimentum laoreet ligula. Nunc in odio imperdiet, tincidunt velit in, lacinia urna. Aenean ultricies urna tempor, condimentum sem eget, aliquet sapien. Ut convallis cursus dictum. In hac habitasse platea dictumst. Ut eleifend eget erat vitae tempor. Nam tempus pulvinar dui, ac auctor augue pharetra nec. Sed magna augue, interdum a gravida ac, lacinia quis erat. Pellentesque fermentum in enim at tempor. Proin suscipit, odio ut lobortis semper, est dolor maximus elit, ac fringilla lorem ex eu mauris. Phasellus vitae elit et dui fermentum ornare. Vestibulum non odio nec nulla accumsan feugiat nec eu nibh. Cras tincidunt sem sed lacinia mollis. Vivamus augue justo, placerat vel euismod vitae, feugiat at sapien. Maecenas sed blandit dolor. Maecenas vel mauris arcu. Morbi id ligula congue, feugiat nisl nec, vulputate purus. Nunc nec aliquet tortor. Maecenas interdum lectus a hendrerit tristique. Ut sit amet feugiat velit. Test Yes asedtsdfd asdf asdf adsf Related Posts

Mar 01,2025 by Jon Mostajo, test user

Used Car Special Report: Millennials Maintain Lead in the Used Vehicle Market

With the National Automobile Dealers Association (NADA) Show set to kickoff later this week, it seemed fitting to explore how the shifting dynamics of the used vehicle market might impact dealers and buyers over the coming year. Shedding light on some of the registration and finance trends, as well as purchasing behaviors, can help dealers and manufacturers stay ahead of the curve. And just like that, the Special Report: Automotive Consumer Trends Report was born. As I was sifting through the data, one of the trends that stood out to me was the neck-and-neck race between Millennials and Gen X for supremacy in the used vehicle market. Five years ago, in 2019, Millennials were responsible for 33.3% of used retail registrations, followed by Gen X (29.5%) and Baby Boomers (26.8%). Since then, Baby Boomers have gradually fallen off, and Gen X continues to close the already minuscule gap. Through October 2024, Millennials accounted for 31.6%, while Gen X accounted for 30.4%. But trends can turn on a dime if the last year offers any indication. Over the last rolling 12 months (October 2023-October 2024), Gen X (31.4%) accounted for the majority of used vehicle registrations compared to Millennials (30.9%). Of course, the data is still close, and what 2025 holds is anyone’s guess, but understanding even the smallest changes in market share and consumer purchasing behaviors can help dealers and manufacturers adapt and navigate the road ahead. Although there are similarities between Millennials and Gen X, there are drastic differences, including motivations and preferences. Dealers and manufacturers should engage them on a generational level. What are they buying? Some of the data might not come as a surprise but it’s a good reminder that consumers are in different phases of life, meaning priorities change. Over the last rolling 12 months, Millennials over-indexed on used vans, accounting for more than one-third of registrations. Meanwhile, Gen X over-indexed on used trucks, making up nearly one-third of registrations, and Gen Z over-indexed on cars (accounting for 17.1% of used car registrations compared to 14.6% of overall used vehicle registrations). This isn’t surprising. Many Millennials have young families and may need extra space and functionality, while Gen Xers might prefer the versatility of the pickup truck—the ability to use it for work and personal use. On the other hand, Gen Zers are still early in their careers and gravitate towards the affordability and efficiency of smaller cars. Interestingly, although used electric vehicles only make up a small portion of used retail registrations (less than 1%), Millennials made up nearly 40% over the last rolling 12 months, followed by Gen X (32.2%) and Baby Boomers (15.8%). The market at a bird’s eye view Pulling back a bit on the used vehicle landscape, over the last rolling 12 months, CUVs/SUVs (38.9%) and cars (36.6%) accounted for the majority of used retail registrations. And nearly nine-in-ten used registrations were non-luxury vehicles. What’s more, ICE vehicles made up 88.5% of used retail registrations over the same period, while alternative-fuel vehicles (not including BEVs) made up 10.7% and electric vehicles made up 0.8%. At the finance level, we’re seeing the market shift ever so slightly. Since the beginning of the pandemic, one of the constant narratives in the industry has been the rising cost of owning a vehicle, both new and used. And while the average loan amount for a used non-luxury vehicle has gone up over the past five years, we’re seeing a gradual decline since 2022. In 2019, the average loan amount was $22,636 and spiked $29,983 in 2022. In 2024, the average loan amount reached $28,895. Much of the decline in average loan amounts can be attributed to the resurgence of new vehicle inventory, which has resulted in lower used values. With new leasing climbing over the past several quarters, we may see more late-model used inventory hit the market in the next few years, which will most certainly impact used financing. The used market moving forward Relying on historical data and trends can help dealers and manufacturers prepare and navigate the road ahead. Used vehicles will always fit the need for shoppers looking for their next vehicle; understanding some market trends will help ensure dealers and manufacturers can be at the forefront of helping those shoppers. For more information on the Special Report: Automotive Consumer Trends Report, visit Experian booth #627 at the NADA Show in New Orleans, January 23-26.

Jan 21,2025 by Kirsten Von Busch

Special Report: Inside the Used Vehicle Finance Market

The automotive industry is constantly changing. Shifting consumer demands and preferences, as well as dynamic economic factors, make the need for data-driven insights more important than ever. As we head into the National Automobile Dealers Association (NADA) Show this week, we wanted to explore some of the trends in the used vehicle market in our Special Report: State of the Automotive Finance Market Report. Packed with valuable insights and the latest trends, we’ll take a deep dive into the multi-faceted used vehicle market and better understand how consumers are financing used vehicles. 9+ model years grow Although late-model vehicles tend to represent much of the used vehicle finance market, we were surprised by the gradual growth of 9+ model year (MY) vehicles. In 2019, 9+MY vehicles accounted for 26.6% of the used vehicle sales. Since then, we’ve seen year-over-year growth, culminating with 9+MY vehicles making up a little more than 30% of used vehicle sales in 2024. Perhaps more interesting though, is who is financing these vehicles. Five years ago, prime and super prime borrowers represented 42.5% of 9+MY vehicles, however, in 2024, those consumers accounted for nearly 54% of 9+MY originations. Among the more popular 9+MY segments, CUVs and SUVs comprised 36.9% of sales in 2024, up from 35.2% in 2023, while cars went from 44.3% to 42.9% year-over-year and pickup trucks decreased from 15.9% to 15.6%. 2024 highlights by used vehicle age group To get a better sense of the overall used market, the segments were broken down into three age groups—9+MY, 4-8MY, and current +3MY—and to no surprise, the finance attributes vary widely. While we’ve seen the return of new vehicle inventory drive used vehicle values lower, it could be a sign that consumers are continuing to seek out affordable options that fit their lifestyle. In fact, the average loan amount for a 9+MY vehicle was $19,376 in 2024, compared to $24,198 for a vehicle between 4-8 years old and $32,381 for +3MY vehicle. Plus, more than 55% of 9+MY vehicles have monthly payments under $400. That’s not an insignificant number for people shopping with the monthly payment in mind. In 2024, the average monthly payment for a used vehicle that falls under current+3MY was $608. Meanwhile, 4-8MY vehicles came in at an average monthly payment of $498, and 9+MY vehicles had a $431 monthly payment. Taking a deeper dive into average loan amounts based on specific vehicle types—as of 2024, current +3MY cars came in at $28,721, followed by CUVs/SUVs ($31,589) and pickup trucks ($40,618). As for 4-8MY vehicles, cars came in with a loan amount of $22,013, CUVs/SUVs were at $23,133, and pickup trucks at $31,114. Used 9+MY cars had a loan amount of $19,506, CUVs/SUVs came in at $17,350, and pickup trucks at $22,369. With interest rates remaining top of mind for most consumers as we’ve seen them increase in recent years, understanding the growth from 2019-2024 can give a holistic picture of how the market has shifted over time. For instance, the average interest rate for a used current+3MY vehicle was 8.0% in 2019 and grew to 10.2% in 2024, the average rate for a 4-8MY vehicle went from 10.3% to 12.9%, and the average rate for a 9+MY vehicle increased from 11.4% to 13.8% in the same time frame. Looking ahead to the used vehicle market It’s important for automotive professionals to understand and leverage the data of the used market as it can provide valuable insights into trending consumer behavior and pricing patterns. While we don’t exactly know where the market will stand in a few years—adapting strategies based on historical data and anticipating shifts can help professionals better prepare for both challenges and opportunities in the future. As used vehicles remain a staple piece of the automotive industry, making informed decisions and optimizing inventory management will ensure agility as the market continues to shift. For more information, visit us at the Experian booth (#627) during the NADA Show in New Orleans from January 23-26.

Jan 21,2025 by Melinda Zabritski

In this article…

typesetting, remaining essentially unchanged. It was popularised in the 1960s with the release of Letraset sheets containing Lorem Ipsum passages, and more recently with desktop publishing software like Aldus PageMaker including versions of Lorem Ipsum.