In This Section

PINDROP BLOG

Category: Pindrop

January 20, 2014
New York Times talks phone fraud
Fake emails are usually pretty easy to spot because you can look and see if it came from Bank of America or from FreeEmailAddressInEgypt(dot)com,” said Mr. Forester, 29, who is an electrician. “With the phone, you don’t have that option of researching. The New York Times today invested some time in discussing the increase in…
Read More →
November 21, 2013
Know Your Fraudster
Today Pindrop Security released “KYF: Know Your Fraudster,” our 2013 Phone Fraud Report. You already Know Your Customer (KYC), time to know the other callers into your institution. We examined phone fraud activity affecting financial services institutions during the first six months of 2013 and found some staggering figures, most notably that 1 call for…
Read More →
September 27, 2013
Right person, right phone, right place
There are not a lot of surprises in the security world. With email, web, database, etc., the model has looked basically the same. Figure out how what a good guy does differs from what a bad guy does. The challenge has always been telling that difference. What do you know? Can you trust it? Can…
Read More →
September 27, 2013
Six Degrees of Phone Fraud
If you are like me, the never ending stories on hackers breaking into businesses don’t even merit a passing glance anymore. We never stop to think how we are connected to these events. Recently, LexisNexis was again in the news over data breaches. Now, LexisNexis has some of the most sophisticated security controls in the…
Read More →
July 30, 2013
Internet-like Attacks Are Already Targeting the Telephony Channel
I just finished a series of blog posts asserting that the telephony landscape has changed fundamentally. Unfortunately, evidence abounds. In the “Demise of POTS: An Internet Engineer’s Perspective” article, which appeared this week in the Internet Engineering Task Force Journal, Henning Schulzrinne, Columbia University Professor and current Chief Technology Officer of the U.S Federal Communications…
Read More →
July 24, 2013
Telephony Going the Internet Way: Multi-layered Approach for Countering Emerging Threats
Telephony going the Internet way is the title of this series of blog posts. In this concluding post on this topic, let us revisit the reasons for this title. First, it is about the changing underlying technology. With technologies like VoIP, we are increasingly using IP networks for transporting voice the same way the Internet…
Read More →
July 19, 2013
Telephony Going the Internet Way: Secure Phone Fingerprinting
Last week we discussed a number of requirements for phone authentication solutions. Ideally, we want both high accuracy and strong security. This means low false negatives and false positives even in the presence of threats that will likely target voice biometric solutions. For example, we do not want an adversary to be able to impersonate…
Read More →
July 10, 2013
Telephony Going the Internet Way: Voice Biometrics
Voice biometrics, where characteristics of a speaker’s voice are used to authenticate him or her, is a recent development from the long history of speech research. Although researchers have worked on areas ranging from speech recognition to speech synthesis, the aspects most relevant to authentication are speaker identification and speaker verification (see a 2009 paper…
Read More →
June 26, 2013
Telephony Going the Internet Way: Pitfalls of Knowledge-Based Authentication
In Caller-ID Spoofing we discussed how difficult it is to verify a caller. Why does that matter? Because banks are losing millions of dollars in fraudulent telephony transactions every day from callers impersonating legitimate callers. Fraudsters are routinely spoofing caller-id and other call metadata. The problem is so common that when you make a call to…
Read More →
June 19, 2013
Investment in Pindrop
The phone ecosystem is insecure. Caller ID is broken. How many times have you got a call from a bank and wondered if it was really your bank calling? Especially when they were asking for your social security number. Enterprises face the same issue. How do they know they are talking to you? Or are…
Read More →
Introducing Pindrop® Express – Authenticate without compromise.