Pindrop® Pulse: Stay Connected, Stay Informed, and Stay Ahead VIEW NOW →

Knowledge-Based Authentication (KBA) is on the Outs, but Remain Useful

There was a point in time where knowledge-based authentication (KBA) questions were an effective form of identification. But that time is gone. It’s likely that more personal information about each and every one of us is available on the web than any time before in history, and the growing amount of cybersecurity incidents each year isn’t helping. Pindrop’s data shows…
June 19, 2013
Investment in Pindrop
The phone ecosystem is insecure. Caller ID is broken. How many times have you got a call from a bank and wondered if it was…
Read More →
June 12, 2013
Telephony Going the Internet Way: Caller-ID Spoofing
All of us need to be vigilant and safeguard our financial lives against social engineering and other attacks that have grown in frequency and sophistication…
Read More →
February 15, 2013
Startup Rally flexes Georgia and Atlanta’s entrepreneurial muscles
Pindrop Security is happy to be participating in Startup Rally – “a monumental celebration of Georgia’s entrepreneurial spirit that includes a startup exposition with over…
Read More →
October 26, 2012
Video: FTC Robocall Summit panel on Caller ID Spoofing
Pindrop Security CEO Vijay Balasubramaniyan spoke and joined a panel on Caller ID Spoofing at the FTC Robocall Summit on October 18. Visit the site…
Read More →
October 25, 2012
FS-ISAC Fall Summit 2012
Several of the Pindrop team spent the first part of this week at the FS-ISAC conference in Leesburg, VA. FS-ISAC (Financial Services – Information Sharing…
Read More →
October 23, 2012
Robocalls perpetuate phone fraud
The Federal Trade Commission (FTC) launched a competition this past week that challenges small businesses to discover an innovative solution that will block illegal robocalls…
Read More →
October 17, 2012
Trust & the phone
Pity the phone, long abused by bad people like telemarketers and fraudsters and unable to do anything about it. Caller ID has no security capabilities…
Read More →
October 11, 2012
Phone Fraud is an International Problem
Social engineering via the phone comes in every possible form. Below are some examples, with victims from Taiwan to Canada.   Phone fraud is easily accomplished…
Read More →
October 8, 2012
Phantom Debt Collection Scams
Ohio and Michigan have recently been inundated with calls pretending to be a collection agency or police officer.  The fraudsters are targeting the most vulnerable…
Read More →
October 5, 2012
Tech support phone scams
This week the Federal Trade Commission launched a major international crackdown on tech support scams.  Tech support scams are a niche phone fraud strategy used…
Read More →
September 3, 2011
Stop Takeovers
Account takeover create significant losses. Phone transactions for reconnaissance plays a huge role in enabling account takeover. Be proactive. Prevent fraudulent phone calls. More than…
Read More →
September 3, 2011
Verify Caller ID
Caller ID is vulnerable as it an easily spoofable technique. Attackers are leveraging this and causing millions in losses. Reduce identity theft and account takeover.…
Read More →