As I visit many of the biggest offices around the world, I wonder “wow” what a nice office. And almost immediately that wow is replaced with angst as I get ready to go through the elaborate, unwelcome and quite frankly unnecessary sign-in process. Of course, my details will have to be captured and my movement […]
It’s fair to say that contacting call centres, in particular Financial Institutions, are never a pleasant experience. It’s hard to get through the IVR and even harder to get through the security questions to prove who you say you are. Knowledge based details such as mother’s maiden name, date of birth, present and past address, […]
A phenomenon called ‘contact customer support’ – anything short of a revolution is indeed a disaster.
After enduring the audio tune and typing in every number on the keypad, you are finally connected to Customer Support – breath easy. Well, not yet. Instead of getting to the point straight away, you will be subjected to a barrage of security questions to prove your identity. It would seem like every customer is […]
User authentication, and in particular two-factor authentication, is a key step for secure data transactions. Pretty much all financial institutions mandate two-factor authentication for all mobile and online transactions to prevent fraud. Two-factor authentication usually constitutes something that the user has (e.g. mobile phone, credit or debit card) and the user knows (e.g. password or […]
Since time immemorial, we have been asked to stick paper photos onto application forms. Driver’s license, Visa forms, ID cards, School applications, Bank applications – you name it. Wherever you went, you carried with you your avatar on paper – torn, outdated, pixelated. Sounds so 19th century. Well, it’s time to change all of that with fotopod.
Rarely does this happen: you are called in for a potential funding opportunity by a leading venture capital firm and you end up leaving the room closing a sale. It was particularly gratifying because the product clearly won. We felt there was a genuine need to improve Axilor’s visitor experience, in an otherwise uber cool […]
International Revenue Share Fraud (IRSF) accounts for about $10.7 billion in fraud losses. Losses are up by 497% from previous year. This case study highlights the fact that there is no operator who is immune to IRSF attack. And prevention is the best form of cure as there is no cure for this malicious attack.
Application fraud is committed when fraudsters provide incomplete, inaccurate, fabricated or stolen information with an intent to defraud the service provider.
What an incredible year it has been. From going live with Vodafone India – largest installation to date processing over 5 billion call records to protect Vodafone customer from fraud – to winning the AnthaPrerana 2015 Competition (a TiE Bangalore initiative for start-ups). It didn’t end there. We were also part of the Canada India […]
The fascinating story about the arrest of Noor Aziz Uddin, one of FBI’s most wanted cybercriminal for international phone fraud came to a quiet end on 14 February in the outskirts of Karachi. It is said that Uddin and his accomplice had amassed a wealth of over $50 million in a short span of 4 […]