Pindrop’s ICASSP 2024 paper shows how room acoustics can enhance liveness detection
In a research paper 1co-authored with David Looney to be presented at the International Conference on Acoustics, Speech and Signal Processing (ICASSP) in Seoul, South
Pindrop® Pulse, First to Accurately Detect Deepfakes from OpenAI’s Voice Engine
Several of our customers have asked Pindrop if our recently launched deepfake detection product, Pindrop® Pulse, can detect synthetic content generated by OpenAI’s1 new Voice
4 Top Cybersecurity Trends Discovered From Our Recent CFX Event
Ensuring cybersecurity is front and center for companies is now a non-negotiable task. That’s why Pindrop released quarterly insider sessions to check in and ensure
View by category
Popular Blogs
Critical Qualcomm Flaws Threaten 900 Million Android Devices
Researchers have detailed four vulnerabilities in Android, caused by bugs in Qualcomm chipset drivers, that allow an attacker to get complete control of a vulnerable
Google Research Reveals Depth of Deceptive Software Problem
LAS VEGAS–After a year-long study of affiliate networks running pay-per-install programs, which often include shareware, ad-injectors, and other unwanted software, Google and NYU found that nearly
Telephony Scams Findings as Shared by Pindrop at Black Hat 2016
Congratulations are in order if you’ve never had to experience the pleasure of being robocalled. The rampant growth of the underground phone fraud world is
Apple Patches Critical Bug in iOS
Apple has released a new version of iOS that includes a patch for a critical security vulnerability that could lead to arbitrary code execution. The
Apple Launches Bug Bounty Program
LAS VEGAS–Vulnerabilities in iPhone hardware and software are among the more valuable bugs there are especially those that give an attacker full access to the
Using Forensic Linguistics to Fight Phone Fraud
LAS VEGAS–One of the difficulties in protecting against phone fraud scams is actually detecting them. Technology certainly helps, but in a lot of cases, it’s
Lessons Learned From the Android Stagefright Bug
LAS VEGAS–Security engineers and developers typically view vulnerabilities as problems, things to be avoided. But they also can be valuable learning opportunities, especially for a
Using Data to Raise the Cost of Exploitation for Attackers
LAS VEGAS–The idea for a certification and testing lab for the security of software products has been kicking around the technology industry for a long
Researchers Bypass EMV Card Protections
LAS VEGAS–Chip-and-pin or EMV cards have been touted as a more secure alternative to traditional cards, but security researchers have found several methods for bypassing
Kaminsky: We Need an NIH for Cybersecurity
LAS VEGAS–The security field needs an NIH-like organization for the deep study of defensive and offensive techniques and technology to help fix the systemic problems