PINDROP BLOG

Category: Phone Security Threats

January 24, 2017
NRF 2017 Recap: The Current State of Retail Fraud
Last week, Pindrop joined nearly 35,000 attendees at the NRF Annual Convention and EXPO in New York City. According to speakers from the event, retail brands will need to focus on their customers, their technology, and their leadership in 2017. Customer priorities are constantly adapting as available technology changes. These new innovations and technical capabilities…
Read More →
November 30, 2016
Assessing Phone Fraud in the Contact Center: The Growing Problem
Aite Group, an independent research and advisory firm focused on business, technology, and regulatory issues, interviewed 25 executives at 18 of the top 40 largest U.S. financial institutions based on asset size in order to provide an evaluation of the current state of fraud. New research proves that contact centers are being attacked more than…
Read More →
November 10, 2016
Pindrop’s Phoneprinting Technology Addresses the $400 Million Fraud Problem
Analysts at Aite Group have identified five key security and service steps that legacy solutions are failing to perform. These are the features that are keeping Caller ID, KBA, and voice biometrics from being viable anti-fraud and authentication solutions for the contact center. With 61% of account takeovers traced back to the contact center, this…
Read More →
October 26, 2016
Gartner Review & Recommendations: 3 Key Call Center Questions Answered
1. What are the key challenges of authenticating callers into the call center and IVR channels? Traditional contact center anti-fraud and authentication methods no longer stand up to the advanced tactics leveraged by today’s criminals. Most contact centers rely on caller ID, a facility that identifies and displays the telephone numbers of incoming calls made…
Read More →
September 28, 2016
The Need for Multiple Layers of Security in the Contact Center
The wealth of information housed by contact centers can be leveraged by fraudsters for data mining and cross-channel attacks. In an effort to prevent phone fraud, many businesses implement authentication methods; however, most fail to administer the authentication required to provide a layered defense system. As social engineering and fraud technologies have become more advanced,…
Read More →
September 26, 2016
Protecting Call Centers at Government Agencies
Fraud poses a substantial risk to the integrity of federal programs and weakens the public’s trust in government. Though government agencies have made great strides in online security over the past few years, they have neglected to implement similar protections for the phone channel. Fraudsters commonly use the call center as a first step in…
Read More →
September 15, 2016
The Top 10 Takeaways from Tuesday’s Webinar
Aite Group, an independent research and advisory firm focused on business, technology, and regulatory issues, interviewed 25 executives at 18 of the top 40 largest U.S. financial institutions based on asset size in order to provide an accurate evaluation of the most effective technology solutions to protect against fraud. On Tuesday, Aite’s Senior Analyst, Shirley…
Read More →
September 1, 2016
61% of Fraud Traced Back to the Contact Center
Contact center fraud attacks have increased substantially in recent years due to the EMV transition and data breaches. Despite the intent to administer positive and timely customer experiences, contact centers often fall victim to social engineering methods that enable fraud attacks. Fraud attacks increase operational costs, decrease customer satisfaction, and jeopardize brand reputation as customer…
Read More →
December 9, 2015
What’s Next in Phone Fraud: 2016 Trends & Predictions from Pindrop Labs
It’s that time of year again. We’ve asked Pindrop Labs researchers to break out their crystal balls and make some predictions for the coming year in phone fraud. Below are a few of the trends that our team will be watching for in 2016. Scammers Hit the Campaign Trail 2016 is an election year, which…
Read More →
October 21, 2015
How A Teenager Hacked The CIA With A Few Phone Calls
Earlier this week, news broke that hackers had accessed the personal email accounts of CIA director John Brennan and Homeland Security Secretary Jeh Johnson. These attacks on some of America’s most security-focused leaders sound like they must have been incredibly sophisticated – maybe the result of organized crime leaders or international espionage. But as it…
Read More →