In This Section

PINDROP BLOG

Category: Identity

January 10, 2017
Foreign Government Blamed for Anthem Data Breach
Attackers backed by a foreign government were behind the attack that compromised health insurance company Anthem in 2015, a breach that compromised the information of more than 78 million people, according to the findings of an investigation into the attack. The Anthem data breach is one of the larger health cae-related incidents ever in the United…
Read More →
December 22, 2016
Call Centers a Soft Target for Fraudsters
The fraud schemes that consumers and businesses face every day are the end result of a lot of research, work, and planning on the part of the criminals who perpetrate them. There are a lot of moving pieces in the background that victims never see, and often the schemes involve many intermediate steps before a…
Read More →
December 21, 2016
On the Wire Podcast: Michael Tiffany
Cybercriminals depend upon the income they generate from their schemes to fund further operations, and one of the main ways that they extract money from victims is through ad fraud. This week, researchers at White Ops disclosed the existence of the Methbot ad fraud network, which is using a sophisticated worldwide infrastructure and custom browsers…
Read More →
December 20, 2016
Mobile Wallets Present New Opportunities for Fraud
One of the great things about the advanced mobile devices everyone carries now is that they serve so many different purposes. They’re encyclopedias, world maps, communications devices, and now they’ve evolved to become wallets, too. But as convenient as mobile wallet technology is, it carries with it some unique threats and risks for both consumers…
Read More →
December 15, 2016
Yahoo Data Breach Highlights Defender’s Disadvantage
For the second time in less than three months, Yahoo has disclosed a massive data breach, and this is one for the record books. The company said more than one billion accounts are affected by the breach, and Yahoo officials still aren’t exactly sure how the attackers got in. On Wednesday evening, Yahoo CISO Bob…
Read More →
December 5, 2016
Google Trusted Contacts Allows Users to Share Location in Real Time
Google has spent a lot of time and money on security over the last few years, developing new technologies and systems to protect users’ devices. One of the newer technologies the company has come up with is designed to provide security for users themselves rather than their laptops or phones. On Monday Google launched a new…
Read More →
October 31, 2016
Silently Tracking Users With Ultrasonic Beacons
As consumers have begun using ad blockers in greater numbers, skipping TV ads with DVRs, and generally looking for any possible way to avoid advertising, technology providers and marketers have been trying to find new methods to get their messages in front of potential buyers. One of the newer methods uses ultrasonic signals in ads…
Read More →
October 31, 2016
Dozens Arrested in Huge European Online Fraud Raid
Law enforcement officials in 10 countries conducted sweeping raids Monday on what they is a distributed, organized cybercrime ring that has been conducting online fraud operations across Europe and have stolen more than €3.5 million. The raids were coordinated by Europol and involved authorities in the U.K., Spain, Portugal, France, Ireland, and several countries, and resulted…
Read More →
October 25, 2016
Visa and Intel Collaborate on IoT Payment Security
As the security of IoT devices has become more and more of a problem, Visa and Intel are forming an alliance to make payments from those devices more secure and trustworthy. The partnership has two separate components: adding Visa’s encryption technology to devices that use Intel’s chipsets, and hardware-level device authentication to ensure that payments are…
Read More →
September 30, 2016
On the Wire Podcast: Jessy Irwin
Jessy Irwin makes her triumphant return to the podcast to help us work through our feelings about the Yahoo data breach, the NIST guidance on SMS two-factor authentication, and why we’re still giving terrible security advice to users. Dennis Fisher and Jessy also talk about what kind of breaches could be lurking on the horizon…
Read More →
2019 Voice Intelligence Webinar Series – where voice, not touch is the main interface for customers.