5 Tips for Improving Contact Center Productivity
A contact center’s profitability and effectiveness depend on the agents’ productivity. Historically, contact centers have been regarded as cost centers, there to support operations and
Pindrop’s ICASSP 2024 paper shows how room acoustics can enhance liveness detection
In a research paper 1co-authored with David Looney to be presented at the International Conference on Acoustics, Speech and Signal Processing (ICASSP) in Seoul, South
Pindrop® Pulse, First to Accurately Detect Deepfakes from OpenAI’s Voice Engine
Several of our customers have asked Pindrop if our recently launched deepfake detection product, Pindrop® Pulse, can detect synthetic content generated by OpenAI’s1 new Voice
View by category
Popular Blogs
Bypassing the CA Restrictions in Android Nougat
One of the new security features Google added to Android Nougat is a function that prevents the OS from trusting by default any user-installed certificate
Malware Infecting Seagate NAS Devices to Mine Monero Cryptocurrency
Attackers are using a nasty piece of malware to infect Seagate storage devices and then jump to the PCs connected to the NAS devices and
Large Database of Device Certificates, SSH Keys Published
Let’s say you’re a manufacturer of embedded device, maybe routers or wireless access points. Cool. And let’s also say that you want to offer encrypted
Wyden Calls on Senate to Prevent Expansion of Government Hacking
A proposed change to a little-known criminal procedure “would make us less safe, not more” by allowing law enforcement agencies to hack an unlimited number
Google Chrome to Mark HTTP Pages as Not Secure
Sites that send sensitive user data over HTTP will soon find their pages marked as insecure in Google Chrome. The company is planning to begin marking
Cry Ransomware Pinpoints Victims Via Google Maps API
UPDATE: A new strain of ransomware known variously as Cry or CryLocker has emerged, and it’s using a few novel techniques, including communicating via UDP
Exploit Kits Target Flash and Focus on Newer Vulnerabilities
The conventional wisdom on exploit kits is that they rely mainly on exploits for older vulnerabilities, bugs that were disclosed and patched years ago. But
Large Network of Compromised Embedded Devices Found
The word botnet usually conjures images of hordes of compromised PCs being used for DDoS attacks or malware operations, but researchers in the Czech Republic
Android Bug in Nexus 5 Devices Allowed Memory Access
Google quietly patched a serious vulnerability in the Android image used on some Nexus devices that could allow an attacker to get full access to
Here’s an Adult Conversation About Crypto
Earlier this week, FBI Director James Comey said that the country needed to have an “adult conversation” about encryption and how it’s used. To get