PINDROP BLOG

Category: Device Security

October 17, 2018
Privacy and Permissions | Google+
With Google making headlines about the privacy of apps and the breaking news of the Facebook data breach earlier this year, it has become clear that the apps on our phones are now holding, and disseminating, large amounts of data and are doing so most of the time. More often than not, we as consumers…
Read More →
August 29, 2018
A [Female] Voice of Concern
The number of people using digital assistants are growing by the day, and the increasing popularity has led to predictions of as many as 75% of US households owning smart speakers by 2020 according to Gartner. Within this expansive growth, there are several brands of assistants, including Amazon Alexa, Google Home, and Microsoft Cortana, taking…
Read More →
December 27, 2017
2017: The Year of Breaches, Failing PII, and the Voice Movement
By Shawn Hall, Director of Fraud Prevention & Strategy The anti-fraud and authentication industry has seen some major happenings in 2017. Overall, we saw an increase in call center fraud rates, with a noted rise in the use of mobile devices and ANI spoofing, for fraudulent activities. At the beginning of the year, the fraud…
Read More →
October 18, 2017
Call Center Criminals Unmasked | Real-Life Fraudsters & Audio Recordings
Call center criminals are becoming increasingly sophisticated in order to maneuver around authentication and security measures, granting them access to sensitive information. It is evident the evolution of fraudsters’ techniques is jump-starting other criminal behavior including account takeover and identity theft – causing the global increase in call center fraud to jump to 113% since…
Read More →
September 12, 2017
BlueBorne Attack Threatens IoT Devices
Researchers have developed a new attack against Bluetooth-enabled devices that takes advantage of the fact that these devices are always listening for connections and can be used by attackers to connect to nearby devices and then exploit one of several new vulnerabilities in the protocol to compromise the devices. The attack is known as BlueBorne…
Read More →
September 11, 2017 | Dennis Fisher
Overlay Attack Threatens Many Android Users
A vulnerability in nearly all of the current versions of Android can be used by attackers to execute an overlay attack to trick users into installing malware, ransomware, or other malicious apps. The flaw affects most of the Android devices in use right now, except for those that have been updated to Oreo, the newest…
Read More →
September 7, 2017 | Dennis Fisher
Using Inaudible Voice Commands to Control Siri and Alexa
Researchers have developed a method for sending human-inaudible ultrasonic voice commands to voice-enabled assistants such as Alexa, Siri, and Google Assistant that could be used to force the assistants to visit attacker-controlled websites or take control of other connected smart devices. The technique is known as DolphinAttack and was developed by academic researchers at Zhejiang…
Read More →
August 10, 2017 | Dennis Fisher
Ukrainian Police Arrest Suspect in Petya Ransomware Campaign
Police in Ukraine have arrested a 51-year-old man in connection with spreading the notorious Petya ransomware earlier this summer. In their statement, the Ukraine Cyberpolice did not say that the man was accused of creating Petya, only that he allegedly helped spread it. The outbreak of a ransomware connected to Petya in June was centered in Ukraine…
Read More →
August 9, 2017 | Dennis Fisher
Mamba Ransomware Pokes Its Head Back Up
The ransomware that wreaked havoc on San Francisco’s Muni mass transit system last Thanksgiving has resurfaced and is infecting enterprises in several countries around the world. The Mamba ransomware used in these attacks isn’t one of the big-name variants like Cryptolocker or Petya, but it has the potential to cause serious problems. Last November the malware infected…
Read More →
August 9, 2017 | Dennis Fisher
EFF Asks Court to Require Warrants For Device Searches at the Border
A case making its way through the United States court system right now could have long-lasting effects on how much–if any–privacy travelers have when they reach the border. The case revolves around the prosecution of a woman named Maria Isabel Molina-Isidoro, whose phone was searched at the U.S. border. Some of the information found on the…
Read More →
2019 Voice Intelligence Webinar Series – where voice, not touch is the main interface for customers.