PINDROP BLOG

Category: Hacking

May 31, 2019
Deepfakes | What You Need To Know
Let’s start off with something simple: what is a deepfake? Deepfakes can include anything from audio to video content that appear to look and sound like real footage. However, the difference is – it’s completely fake. The origin of the term deepfake comes from a pair of deep learning, the technology that makes it possible,…
Read More →
May 13, 2019
Authentication Myths | Knowledge Based Authentication Works
To be fair, there was a point in time where knowledge based authentication questions (KBAs) were an effective form of identification. But that time is gone. It’s likely that more personal information about each and every one of us is available on the web than anytime before in history, and the growing amount of cybersecurity…
Read More →
October 17, 2018
Privacy and Permissions | Google+
With Google making headlines about the privacy of apps and the breaking news of the Facebook data breach earlier this year, it has become clear that the apps on our phones are now holding, and disseminating, large amounts of data and are doing so most of the time. More often than not, we as consumers…
Read More →
August 24, 2018
Zelle | A direct funds transfer disruptor…What Are You Trading For Convenience?
With convenience on the mind of most consumers, peer to peer payment apps are making it easy to transfer money to friends, family, or acquaintances. The money-transfer market is dominated by Venmo and Paypal, however, Zelle is quickly catching up, offering an alternative that is backed by U.S. financial institutions. Zelle is known for its…
Read More →
February 23, 2018
Pindrop® Passport | Authentication 101
It is obvious that fraudsters’ sophistication is evolving, surpassing security measures toward a single end goal — financial gain. Worse, consumers are unaware of the effects of social media, with 61% admitting to sharing answers to security questions over their online profiles. This percentage rises to 80% for 18-24 year olds, making them beyond easy…
Read More →
January 10, 2018
Top Blogs of 2017: Fraudsters, Data Breaches, and All Things Voice
Last year, the phone channel experienced a variety of advancements and setbacks, from an additional spike in call center fraud to the discovery of mass data breaches and a rise in card-not-present fraud during the holiday season. We’re looking back to our top four posts from 2017. Call Center Criminals Unmasked | Real Life Fraudsters…
Read More →
October 18, 2017
Call Center Criminals Unmasked | Real-Life Fraudsters & Audio Recordings
Call center criminals are becoming increasingly sophisticated in order to maneuver around authentication and security measures, granting them access to sensitive information. It is evident the evolution of fraudsters’ techniques is jump-starting other criminal behavior including account takeover and identity theft – causing the global increase in call center fraud to jump to 113% since…
Read More →
September 12, 2017
BlueBorne Attack Threatens IoT Devices
Researchers have developed a new attack against Bluetooth-enabled devices that takes advantage of the fact that these devices are always listening for connections and can be used by attackers to connect to nearby devices and then exploit one of several new vulnerabilities in the protocol to compromise the devices. The attack is known as BlueBorne…
Read More →
September 12, 2017 | Dennis Fisher
We’ve Reached Peak Data Breach
It would seem that data breaches have now reached their logically absurd peak. The compromise of Equifax, revealed last Thursday evening, is the kind of incident you get when attackers get bored of stealing cases of bottled water and decide to steal the entire mountain spring instead. As reported by Bloomberg, the breach affects the…
Read More →
September 11, 2017 | Dennis Fisher
Overlay Attack Threatens Many Android Users
A vulnerability in nearly all of the current versions of Android can be used by attackers to execute an overlay attack to trick users into installing malware, ransomware, or other malicious apps. The flaw affects most of the Android devices in use right now, except for those that have been updated to Oreo, the newest…
Read More →
In a race of information vs. misinformation, what will deep fakes and data breaches look like? Register for our webinar to learn how to defend against these types of threats