PINDROP BLOG

Category: Pindrop Labs

October 21, 2015
How A Teenager Hacked The CIA With A Few Phone Calls
Earlier this week, news broke that hackers had accessed the personal email accounts of CIA director John Brennan and Homeland Security Secretary Jeh Johnson. These attacks on some of America’s most security-focused leaders sound like they must have been incredibly sophisticated – maybe the result of organized crime leaders or international espionage. But as it…
Read More →
July 23, 2015
Ashley Madison Hack Opens Door to Phone Scams
With any major data breach, we expect to see an increase in phone scams. Attackers sell hacked customer data on the black market. Other criminals use the information to mount social engineering attacks on consumers. The recent attack on dating website Ashley Madison, however, could take these types of phone scams to a new level.…
Read More →
July 22, 2015
How to Spot Call Center Phone Fraud
We know that at least 1 in every 2200 calls to an enterprise call center is fraud, but how can we tell which one it is? Distinguishing between a legitimate caller and a phone fraudster is not always an easy task. Certain techniques used by phone fraudsters can be fairly easily identified, but other, less…
Read More →
July 6, 2015
Data Science: How Do We Get Started? – Part Three
Predicting the Outcome of March Madness Written by Scott W. Strong In the first part of this series, I discussed how important it is as a data scientist to ask the right questions when solving a new problem. In this post I will be digging into a specific example relating to the situation when a…
Read More →
July 2, 2015
The Geography of Phone Fraud: Where Do Phone Scams Come From?
How can you tell if an attacker is on the phone line? According to our latest phone fraud report, one of the key giveaways is where the call is coming from. After analyzing millions of calls, Pindrop Labs found that 64 percent of fraud calls originate in a country other than the country of the…
Read More →
June 25, 2015
Data Science: How Do We Get Started? – Part Two
Exploring a Fraud Dataset at a Calling Card Company Written by Scott W. Strong In the first part of this series, I discussed how important it is as a data scientist to ask the right questions when solving a new problem. In this post I will be digging into a specific example relating to the…
Read More →
June 18, 2015
Visualizing Data in the Space it Resides
Written by Hassan A. Kingravi In this blog post, I will show an example of how utilizing the mathematical structure of an algorithm can highlight interesting visual features in data. Kernel Support Vector Machines One of the most common machine learning tasks is the classification problem. Informally, the problem can be stated as follows: given…
Read More →
June 17, 2015
Data Science: How Do We Get Started? – Part One
Written by Scott W. Strong In the world of data science, we have so many (almost too many) options available to us when we are trying to solve a problem. Much of the time, people tend to get caught up in the “deep” this and the “Bayesian” that and forget about having a foundational process…
Read More →
June 17, 2015
Welcome to Pindrop Labs!
Pindrop Security has its roots deep in the research world. In 2010, a young graduate student at Georgia Tech, Vijay Balasubramaniyan, published a research paper at a top security conference, ACM CCS (Computer and Communications Security). Most academic papers, while they are written by extremely smart people doing smart things, tend to fall into obscurity,…
Read More →
June 17, 2015
The State of Phone Fraud
Today, Pindrop Labs released their latest Phone Fraud Report. In the report, we examined several million calls to understand fraud tactics, frequency of attacks, and potential consequences of fraud. This year, for the first time, we dug deeper into the many ways phone fraud affects different industries. From the amount of fraud calls, to the…
Read More →