Remove Company Remove Fraud Remove Houston Remove Security
article thumbnail

Pindrop’s Solutions Fight Call Center And Voice Fraud

PYMNTS

A classic image of payment fraud involves a fraudster stealing credit card numbers and shopping for goods in-person or online. But what’s left out of this picture, said David Dewey, director of research at Pindrop Security , is the element of voice. From there, I could have done anything I wanted to on his account.”.

Fraud 107
article thumbnail

FinovateSpring 2016 Live Blog – Day 1

William Mills

One use case is to use a bot, via text messaging, to help customers when they have potential credit card fraud. For Banks, Know Your Customer, is a critical security responsibility. Not sure what the business model is here, or how they are different from other similar companies. ^SR. Houston Frost (SVP, Prepaid Products).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Facebook’s Libra, Uber Losses, Instant Deposits Top Week’s News

PYMNTS

Subscription-based offerings can be essential with helping business-to-consumer (B2C) companies create long-running relationships and lock down more predictable streams of revenue. That’s because China eCommerce company Alibaba apparently has removed any products related to the Houston Rockets from its search results.

Cards 116
article thumbnail

Will Children Point The Way Forward For Wearables?

PYMNTS

Children are the future — that’s just a biological fact, and the theme of an old Whitney Houston song. Corporate payments, including travel expenses, is one area that has yet to find wide use with wearables, though companies are trying to figure out how to do so in an ecosystem that involves multiple players. Wearables for Children.

Apple 114
article thumbnail

Business As Usual For North Korean Hackers Despite Trump Meeting

PYMNTS

and European companies, reported the New York Times. The campaign started with attacks on banks, utilities and oil and gas companies when tensions between the U.S. The report noted that the attacks were extremely focused on engineers and executives who had broad access to the servers and intellectual property of the companies.

Meeting 116