PINDROP BLOG

Month: February 2016

February 29, 2016
On the Wire Podcast: Roger Anderson
Roger Anderson is a self-proclaimed phone geek, the kind of guy who loves getting into the guts of a telco network and figuring out how it works. So when he decided that he’d had enough calls from telemarketers and robocallers, he didn’t cancel his landline, he built the Jolly Roger Telephone Company, a bot that…
Read More →
February 26, 2016
February 26 – The Week in Phone Fraud
This week in phone fraud, white hat social engineering and believable tech support scams. On Wednesday, reporter Kevin Roose published a story of his experience after asking to be hacked. The most surprising attack was also the most simple. The attacker simply called Roose’s cell phone company, impersonating his wife, and quickly gained access to…
Read More →
February 26, 2016
‘This is Not a Case About One Isolated iPhone’
Apple’s lawyers say that not only does the compromised operating system that the FBI wants to install on the iPhone used by a terrorist not exist, but that it would take between six and 10 engineers and other employees as long as a month to create it. That fact, the company argues, along with a…
Read More →
February 25, 2016
Cook: ‘This is Not What Should Be Happening in This Country’
As the deadline for Apple to respond to a court order to help the FBI unlock an iPhone, both sides are upping the level of their rhetoric, with Apple CEO Tim Cook saying “this is not what should be happening in this country.” In an interview Wednesday, Cook said that the company has refused to do…
Read More →
February 25, 2016
Acecard Android Malware Attacks Bank Apps
As more consumers and businesses have moved to mobile as their main platform for banking, attackers have taken notice and followed suit. The number of mobile banking Trojans increases every day, but some are more sophisticated than others, and researchers have discovered new variants in an old Android malware family that can attack more than…
Read More →
February 24, 2016
Rep. Lieu Asks Comey to Drop FBI’s Demands on Apple
Rep. Ted Lieu has sent a letter to FBI Director James Comey asking the bureau to drop its legal efforts to force Apple to circumvent its own security measures so the FBI can access data on an iPhone used by one of the shooters in the San Bernardino massacre. Lieu (D-Calif.), who has a background…
Read More →
February 23, 2016
The Selfie is the New Payment Biometric
Banks, credit card companies, and other financial companies are turning over every rock in an effort to fight fraud, including trying out novel authentication techniques. The latest move in this area is toward facial recognition via smartphones as a way to ensure the person making a purchase is who he claims to be. After decades…
Read More →
February 22, 2016
What We Know So Far: Apple and the FBI
The public back-and-forth between the FBI and Apple over the company’s refusal to create a custom version of iOS that would let the FBI access encrypted data on an iPhone belonging to one of the shooters in the San Bernardino massacre has produced a huge amount of rhetoric and confusion. The technical details of what…
Read More →
February 22, 2016
Phone Scam Breakdown: Google Listings Scam
The first step in protecting against phone scams is understanding how they work. That’s why in this series, we’re breaking down some of the newest and most popular phone scams circulating among businesses and consumers. The Scam You’re a small business owner running a website through a popular hosting site. You have purchased the unique…
Read More →
February 19, 2016
February 19 – The Week in Phone Fraud
This week in phone fraud: teenage phone hackers around the world On Friday, British authorities announced that they have arrested a 16-year-old suspected of being involved with a group that used social engineering phone calls to hack into the Department of Justice web portal, the FBI network, and the private email accounts of high-ranking U.S.…
Read More →
Webinar: Call Center Fraud Vectors & Fraudsters Analyzed