In This Section

PINDROP BLOG

Category: Consumer Fraud

May 16, 2014
May 16, 2014 – The Week in Phone Fraud
This week in Phone Fraud news saw coverage around a UK based bank scam out of Limavady. On Tuesday UTV first reported on the scam, noting that over the course of two months Limavady police officials had noticed an uptick of fraudsters social engineering victims out of significant sums of money. The fraudster’s methodology varied…
Read More →
May 9, 2014
May 8, 2014 – The Week in Phone Fraud
This week in Phone Fraud news saw coverage around an emerging Fake Windows Support Scam, in which Fraudsters targeted a wide swath of the population, including in multiple instances, the elderly Swedish community. On Monday Gregg Keizer of Computerworld first reported that Microsoft was aware of the issue and that there were no signs of…
Read More →
May 8, 2014
IRS Scam – who are the targets?
Are you at risk? Use our interactive tool to view the level of activity from fraudsters in your county. Either enter your zip or county name or simply click on the map. [iframe src=”/wp-content/themes/zap-installable/visualizations/irs-scam-counties/index.html?v=4″ width=”647″ height=”640″]   In our previous blog post, we recorded our interaction with the scammers by posing as the victim. We…
Read More →
May 2, 2014
May 2, 2014 – The Week in Phone Fraud
This week in phone fraud news saw coverage around the revelation that the IRS Phone Scam we reported on in a previous blog post was far larger than originally reported, along with one Forbes reporter’s personal brush with a phone scam. On Monday, Forbes reporter Tony Bradley published an article detailing his own close call…
Read More →
April 15, 2014
Largest IRS Phone Scam Likely Exceeded 450,000 Potential Victims in March
The IRS is warning people about the “largest ever” phone fraud scam targeting taxpayers. In the interest of learning more about this phone-based threat, Pindrop has investigated the attacks and, among other things, we have successfully posed as a victim and recorded the call. What follows is the complete audio and transcript of the interaction,…
Read More →
April 9, 2014
Phone security on the radio
Last week, I sat down with Dana Barrett of the Wall Street Business Network to talk about our company’s technology and how organizations can use it to help protect themselves from the constantly evolving threat posed by attackers. During the interview, we discussed a very basic but somewhat unsettling fact. Despite incredible strides made in…
Read More →
January 20, 2014
New York Times talks phone fraud
Fake emails are usually pretty easy to spot because you can look and see if it came from Bank of America or from FreeEmailAddressInEgypt(dot)com,” said Mr. Forester, 29, who is an electrician. “With the phone, you don’t have that option of researching. The New York Times today invested some time in discussing the increase in…
Read More →
September 27, 2013
Six Degrees of Phone Fraud
If you are like me, the never ending stories on hackers breaking into businesses don’t even merit a passing glance anymore. We never stop to think how we are connected to these events. Recently, LexisNexis was again in the news over data breaches. Now, LexisNexis has some of the most sophisticated security controls in the…
Read More →
July 24, 2013
Telephony Going the Internet Way: Multi-layered Approach for Countering Emerging Threats
Telephony going the Internet way is the title of this series of blog posts. In this concluding post on this topic, let us revisit the reasons for this title. First, it is about the changing underlying technology. With technologies like VoIP, we are increasingly using IP networks for transporting voice the same way the Internet…
Read More →
July 19, 2013
Telephony Going the Internet Way: Secure Phone Fingerprinting
Last week we discussed a number of requirements for phone authentication solutions. Ideally, we want both high accuracy and strong security. This means low false negatives and false positives even in the presence of threats that will likely target voice biometric solutions. For example, we do not want an adversary to be able to impersonate…
Read More →
Introducing Pindrop® Express – Authenticate without compromise.