Data Breaches: The Death Knell of KBA

In the 1930s, the United States introduced Social Security Numbers to keep track of workers’ wages and their Social Security Program contributions. Today, the private sector uses Social Security Numbers as a unique identifier for consumers and the primary means of gathering information on individuals. Our society is comfortable using this identifier when applying for home loans, credit cards, utilities,…
April 15, 2014
Largest IRS Phone Scam Likely Exceeded 450,000 Potential Victims in March
The IRS is warning people about the “largest ever” phone fraud scam targeting taxpayers. In the interest of learning more about this phone-based threat, Pindrop…
Read More →
April 9, 2014
Phone security on the radio
Last week, I sat down with Dana Barrett of the Wall Street Business Network to talk about our company’s technology and how organizations can use…
Read More →
January 20, 2014
New York Times talks phone fraud
Fake emails are usually pretty easy to spot because you can look and see if it came from Bank of America or from FreeEmailAddressInEgypt(dot)com,” said…
Read More →
November 21, 2013
Know Your Fraudster
Today Pindrop Security released “KYF: Know Your Fraudster,” our 2013 Phone Fraud Report. You already Know Your Customer (KYC), time to know the other callers…
Read More →
September 27, 2013
Right person, right phone, right place
There are not a lot of surprises in the security world. With email, web, database, etc., the model has looked basically the same. Figure out…
Read More →
September 27, 2013
Six Degrees of Phone Fraud
If you are like me, the never ending stories on hackers breaking into businesses don’t even merit a passing glance anymore. We never stop to…
Read More →
September 6, 2013
Travel in style
A happy Pindrop customer wearing his Pindrop T on an elephant in Thailand! Must be tracking down fraudsters!
Read More →
July 30, 2013
Internet-like Attacks Are Already Targeting the Telephony Channel
I just finished a series of blog posts asserting that the telephony landscape has changed fundamentally. Unfortunately, evidence abounds. In the “Demise of POTS: An…
Read More →
July 24, 2013
Telephony Going the Internet Way: Multi-layered Approach for Countering Emerging Threats
Telephony going the Internet way is the title of this series of blog posts. In this concluding post on this topic, let us revisit the…
Read More →
July 23, 2013
Black Hat, Defcon & The ALL-IN Party
Next week, the week of July 29, is the Black Hat Conference in Las Vegas. The annual hacker meetup is not your traditional conference. The…
Read More →
July 19, 2013
Telephony Going the Internet Way: Secure Phone Fingerprinting
Last week we discussed a number of requirements for phone authentication solutions. Ideally, we want both high accuracy and strong security. This means low false…
Read More →
July 10, 2013
Telephony Going the Internet Way: Voice Biometrics
Voice biometrics, where characteristics of a speaker’s voice are used to authenticate him or her, is a recent development from the long history of speech…
Read More →