In This Section

Call Center Fraudsters | Voice Morphing, Social Engineering, and the Need for Authentication

As technology advances, fraudsters use different, constantly evolving techniques that include exploiting the phone channel. With increasingly sophisticated attacks, fraudsters maneuver around authentication and security measures to access sensitive information that helps them take over accounts. This evolving criminal strategy is part of a $14 billion call center problem. From January 2016 to August 2017, call centers have experienced a…
July 21, 2017
Let’s Talk about Voice | The Rise of the Interface
We use voice controls to adjust the temperatures of our homes, order movies on-demand, schedule appointments using virtual assistants, and even accommodate in driving. With…
Read More →
July 20, 2017
U.S., European Law Enforcement Take Down AlphaBay Dark Web Market
Authorities in the United States and Europe have shut down two huge criminal marketplace operating on the dark web, one of which officials say was…
Read More →
July 20, 2017
Credit Card Gangs Using Online Courses to Recruit Potential Fraudsters
By Jonah Berg-Ganzarain Credit card fraud gangs are becoming more strategic in their efforts to exploit the public. These groups are expanding their operation to create remote…
Read More →
July 19, 2017
Apple Fixes Broadpwn Bug in iOS 10.3.3
In the latest version of iOS Apple has patched dozens of serious security flaws, including the Broadpwn vulnerability in some Broadcom WiFi chips, and a…
Read More →
July 19, 2017
Mozilla Wants to Build an Open Voice Engine
With manufacturers weaving voice control into a wide variety of devices, from phones to cars to home assistants, the accuracy of the voice-recognition engines in…
Read More →
July 18, 2017
National Security Letter Gag Orders Legal, Appeals Court Rules
In a decision that has drawn the ire of technology providers and privacy advocates, a United States appeals court has ruled that National Security Letters and…
Read More →
July 18, 2017
GhostCtrl Android Malware Hijacks Audio, Roots Devices
A recently discovered piece of Android malware called GhostCtrl apparently evolved from the well-known OmniRAT tool for desktop platforms and has the ability to steal or…
Read More →
July 18, 2017
New Data Shows Attackers Focusing More Attention on iOS
A new report released this morning by Skycure shows that attackers are beginning to focus more and more of their attention on iOS, even as attacks…
Read More →
July 17, 2017
Cisco Fixes Remote Code Execution Flaw in WebEx Extensions
Cisco has patched a serious remote code execution flaw in its WebEx extensions for both Google Chrome and Mozilla Firefox, a bug that could be…
Read More →
July 17, 2017
FCC Targets Robocalls Anew
As part of its strategy to stop unwanted and illegal robocalls, the FCC is opening an inquiry into the way that providers reassign phone numbers…
Read More →
July 17, 2017
Phone Fraud | Damaged Trust
How Phone Fraud by Actresses Damages Customer Trust in Businesses Breaches and fraud cost businesses their reputations. If you can’t protect your customers’ data –…
Read More →
July 14, 2017
FCC Looking For Call Authentication Systems
The FCC is looking for help in developing a system to authenticate phone calls. Caller ID spoofing has become one of the bigger problems on…
Read More →
PSCU and Pindrop Block $1 Million in Fraud in One Month