Pindrop’s ICASSP 2024 paper shows how room acoustics can enhance liveness detection
In a research paper 1co-authored with David Looney to be presented at the International Conference on Acoustics, Speech and Signal Processing (ICASSP) in Seoul, South
Pindrop® Pulse, First to Accurately Detect Deepfakes from OpenAI’s Voice Engine
Several of our customers have asked Pindrop if our recently launched deepfake detection product, Pindrop® Pulse, can detect synthetic content generated by OpenAI’s1 new Voice
4 Top Cybersecurity Trends Discovered From Our Recent CFX Event
Ensuring cybersecurity is front and center for companies is now a non-negotiable task. That’s why Pindrop released quarterly insider sessions to check in and ensure
View by category
Popular Blogs
On the Wire Podcast: Ronnie Tokazowski
For a youngster, the Mirai botnet has gotten more than its share of attention in its short life. The botnet first came to prominence when researchers
Congress Pushes Justice Department for Data on Government Hacking
A group of more than 20 members of Congress from both parties is asking the Department of Justice for details about how the government plans
U.S. Indicts 61 in International Phone Fraud Operation
Three weeks after authorities in India disrupted a major phone fraud ring in Mumbai, the Department of Justice has indicted 61 people in relation to
FCC Rule Forces Opt-In For Broadband Providers to Share User Data
The FCC has voted to enact a new rule that will force broadband companies to get consent from customers before they sell information about those customers’ online
Critics Say Robocall Strike Force Plan Falls Short
With the release of its initial report to the FCC yesterday, the Robocall Strike Force laid out plans to implement technical and policy solutions to
Carriers Plan to Implement Do Not Originate List to Defeat Robocalls
An industry-led strike force is preparing to take away one of the most valuable pieces of technology used by phone scammers: caller ID spoofing. The
Gartner Review & Recommendations: 3 Key Call Center Questions Answered
1. What are the key challenges of authenticating callers into the call center and IVR channels? Traditional contact center anti-fraud and authentication methods no longer
Senator Asks FCC Whether ISPs Can Block Insecure IoT Devices
Sen. Mark Warner on Tuesday sent a letter to the chairman of the FCC expressing concern about the emergence of the Mirai botnet and asking
Visa and Intel Collaborate on IoT Payment Security
As the security of IoT devices has become more and more of a problem, Visa and Intel are forming an alliance to make payments from
Malicious JPEG Can Lead to Code Execution on iPhones
Apple has patched several vulnerabilities in iOS that could lead to arbitrary code execution, including a handful of memory corruption bugs and a flaw that enables