PINDROP BLOG

Category: Pindrop® Labs

December 3, 2019
Voice Intelligence | Where Voice, and Fraudsters, Are Headed
We all know KBAs, or knowledge based authentication questions, are outdated – but can you imagine a world that relies solely on an authentication method that’s always been a part of you – your voice? It’s easy to get excited to think about where voice is headed, but these advances can quickly turn into a…
Read More →
November 21, 2019
Learning to Think Like a Fraudster | The Fraud Bible
Have you ever wondered where – and how – fraudsters learn how to do what they do best? A new publication, The Fraud Bible, is here to answer all your questions – and unfortunately share the means of becoming a criminal. From a consumer mindset, this bible will offer insight into the ways fraudsters take…
Read More →
November 21, 2019
A Fraudster’s Holiday | Contact Center Fraud in Retail
With the impending stresses of Black Friday, Cyber Monday, and other holiday shopping activities on the horizon, it is easy to forget to consider that fraudsters will soon be celebrating too. As you fill your online cart and swipe your card at brick and mortars, fraudsters will be following behind you – waiting for their…
Read More →
June 26, 2019
AI | Infant Technology in Training
The promise of artificial intelligence is too attractive to ignore. Ideas range from discerning trends we are currently unable to see and optimizing decision making to hundreds of other ways AI could make our lives easier is too tempting to not entertain. Artificial intelligence is capable of solving complex problems from housing to disease –…
Read More →
May 31, 2019
Deepfakes | What You Need To Know
Let’s start off with something simple: what is a deepfake? Deepfakes can include anything from audio to video content that appear to look and sound like real footage. However, the difference is – it’s completely fake. The origin of the term deepfake comes from a pair of deep learning, the technology that makes it possible,…
Read More →
May 29, 2019
Authentication Myths | Reaching Critical Mass – Quick & Easy
Reaching critical mass for enrollment can be defined as having enrolled a large portion of your customer base to justify the purchase price of the authentication solution in question. Traditional voice biometric software requires a customer to enroll actively, meaning they have to intently participate in saying a phrase or have the agent start to…
Read More →
May 13, 2019
Authentication Myths | Knowledge Based Authentication Works
To be fair, there was a point in time where knowledge based authentication questions (KBAs) were an effective form of identification. But that time is gone. It’s likely that more personal information about each and every one of us is available on the web than anytime before in history, and the growing amount of cybersecurity…
Read More →
May 1, 2019
Authentication Myths | The Truth About Voice Biometrics
Voice biometrics create an impenetrable obstacle for fraudsters. Fact or fiction? The answer to this may seem obvious – fiction. However, claims like voice biometrics software being able to tell the difference between identical twins or detect a professional voice imitator persist even though both have been disproven. In May of 2017, a BBC researcher…
Read More →
March 8, 2019
Natural Communication | The Latest Consumer Interface
From the first computers, which quickly made their way to being a major force of communication, to the advent of smartphones, consumers have always been at the forefront of changes and arrivals of interfaces and popular technology. Computers were characterized by the creation of passwords and PINs to keep track of accounts, logins, and access…
Read More →
February 13, 2019
Voice | A Password Close To Your Heart
Examining the evolution of technology, we have been caught in a trend moving toward natural conversations. The start of this timeline begins with computers, which quickly made their way to being a major force of communication, whether that was through the first emails or internet searches. Bound to the hardwired interface in computers was typing…
Read More →
In a race of information vs. misinformation, what will deep fakes and data breaches look like? Register for our webinar to learn how to defend against these types of threats