PINDROP BLOG

Category: Device Security

December 3, 2019
Welcoming Voice Comes With Hurdles | Technological and Generational
As the conversational economy grows and intertwines within businesses, it becomes more and more clear that this won’t be an entirely easy path. There are many hurdles that exist along this road, many related to the technology itself, including: Computational resources The right infrastructure needed to support these resources The promise of 5G providing a…
Read More →
November 21, 2019
Learning to Think Like a Fraudster | The Fraud Bible
Have you ever wondered where – and how – fraudsters learn how to do what they do best? A new publication, The Fraud Bible, is here to answer all your questions – and unfortunately share the means of becoming a criminal. From a consumer mindset, this bible will offer insight into the ways fraudsters take…
Read More →
May 13, 2019
Authentication Myths | Knowledge Based Authentication Works
To be fair, there was a point in time where knowledge based authentication questions (KBAs) were an effective form of identification. But that time is gone. It’s likely that more personal information about each and every one of us is available on the web than anytime before in history, and the growing amount of cybersecurity…
Read More →
May 1, 2019
Authentication Myths | The Truth About Voice Biometrics
Voice biometrics create an impenetrable obstacle for fraudsters. Fact or fiction? The answer to this may seem obvious – fiction. However, claims like voice biometrics software being able to tell the difference between identical twins or detect a professional voice imitator persist even though both have been disproven. In May of 2017, a BBC researcher…
Read More →
October 17, 2018
Privacy and Permissions | Google+
With Google making headlines about the privacy of apps and the breaking news of the Facebook data breach earlier this year, it has become clear that the apps on our phones are now holding, and disseminating, large amounts of data and are doing so most of the time. More often than not, we as consumers…
Read More →
August 29, 2018
A [Female] Voice of Concern
The number of people using digital assistants are growing by the day, and the increasing popularity has led to predictions of as many as 75% of US households owning smart speakers by 2020 according to Gartner. Within this expansive growth, there are several brands of assistants, including Amazon Alexa, Google Home, and Microsoft Cortana, taking…
Read More →
December 27, 2017
2017: The Year of Breaches, Failing PII, and the Voice Movement
By Shawn Hall, Director of Fraud Prevention & Strategy The anti-fraud and authentication industry has seen some major happenings in 2017. Overall, we saw an increase in call center fraud rates, with a noted rise in the use of mobile devices and ANI spoofing, for fraudulent activities. At the beginning of the year, the fraud…
Read More →
October 18, 2017
Call Center Criminals Unmasked | Real-Life Fraudsters & Audio Recordings
Call center criminals are becoming increasingly sophisticated in order to maneuver around authentication and security measures, granting them access to sensitive information. It is evident the evolution of fraudsters’ techniques is jump-starting other criminal behavior including account takeover and identity theft – causing the global increase in call center fraud to jump to 113% since…
Read More →
September 12, 2017
BlueBorne Attack Threatens IoT Devices
Researchers have developed a new attack against Bluetooth-enabled devices that takes advantage of the fact that these devices are always listening for connections and can be used by attackers to connect to nearby devices and then exploit one of several new vulnerabilities in the protocol to compromise the devices. The attack is known as BlueBorne…
Read More →
September 11, 2017 | Dennis Fisher
Overlay Attack Threatens Many Android Users
A vulnerability in nearly all of the current versions of Android can be used by attackers to execute an overlay attack to trick users into installing malware, ransomware, or other malicious apps. The flaw affects most of the Android devices in use right now, except for those that have been updated to Oreo, the newest…
Read More →
In a race of information vs. misinformation, what will deep fakes and data breaches look like? Register for our webinar to learn how to defend against these types of threats