Data Breaches: The Death Knell of KBA

In the 1930s, the United States introduced Social Security Numbers to keep track of workers’ wages and their Social Security Program contributions. Today, the private sector uses Social Security Numbers as a unique identifier for consumers and the primary means of gathering information on individuals. Our society is comfortable using this identifier when applying for home loans, credit cards, utilities,…
October 17, 2012
Trust & the phone
Pity the phone, long abused by bad people like telemarketers and fraudsters and unable to do anything about it. Caller ID has no security capabilities…
Read More →
October 11, 2012
Phone Fraud is an International Problem
Social engineering via the phone comes in every possible form. Below are some examples, with victims from Taiwan to Canada.   Phone fraud is easily accomplished…
Read More →
October 8, 2012
Phantom Debt Collection Scams
Ohio and Michigan have recently been inundated with calls pretending to be a collection agency or police officer.  The fraudsters are targeting the most vulnerable…
Read More →
October 5, 2012
Tech support phone scams
This week the Federal Trade Commission launched a major international crackdown on tech support scams.  Tech support scams are a niche phone fraud strategy used…
Read More →
October 2, 2012
Video: Secure Out of Band Verification demo at Finovate Fall 2012
In this video, Vijay Balasubramaniyan demonstrates Pindrop’ new secure out of band verification solution. The new solution allows banks to detect forwarded calls and prevent…
Read More →
October 2, 2012
Why phone fraud works: emotional pressure
One of the reasons phone fraud is  so effective is that the caller has  is able to form a relationship with the victim and manipulate…
Read More →
June 11, 2012
Finovate Spring
Pindrop was selected to participate in the Finovate Spring 2012 conference in San Francisco. Check out this video of Pindrop’s demo featuring Vijay Balasubramaniyan. I’ve been to a…
Read More →
September 3, 2011
Stop Takeovers
Account takeover create significant losses. Phone transactions for reconnaissance plays a huge role in enabling account takeover. Be proactive. Prevent fraudulent phone calls. More than…
Read More →
September 3, 2011
Verify Caller ID
Caller ID is vulnerable as it an easily spoofable technique. Attackers are leveraging this and causing millions in losses. Reduce identity theft and account takeover.…
Read More →
September 3, 2011
Stop Phone Fraud
Mobile devices, voice over IP, and land lines all fall victim to phone-based fraud attacks. Prevent, Detect and Mitigate Attacks. Learn how attackers are leveraging…
Read More →