Pink Hat Technology Management

Blog

New IRS Tax Scammers Use Personal Data For Big Returns

Recently, the Department of Justice brought charges against Babatunde Olusegun Taiwo for using personal information acquired on the Dark Web. He used the information from data breaches to file fraudulent tax returns ...

New Hacking Method Looks Like A Locked Computer

Scammers have breathed new life into an old scam. For years, the old 'Law Enforcement Lock' trick has been used to cheat unsuspecting victims of their hard-earned money. The new wrinkle works ...

New Orleans Shuts Down After Ransomware Attack

Things aren't so easy in the Big Easy right now. The city of New Orleans has suffered a ransomware attack. As a result, most of the city's servers and computers are currently ...

Phishing Emails Are Becoming Even Harder To Identify

According to data collected by Microsoft, phishing emails accounted for 0.62 percent of all inbox receipts in September 2019. That's up from 0.31 percent just one year prior to that. The increase ...

Fake Voicemail Messages Tricking People Into Opening Malicious Content

Office 365 has been the target of an increasing number of ongoing phishing scams. The latest scam involves using fake voicemail messages to convince targets that they need to log in to ...

IT Security Tip #44: Should my computer be encrypted?

It’s another Tuesday in the airport, and you just cleared the TSA line and went to the pretzel shop for a quick bite before ...

Scam Of The Week: Phishing Attacks Using Better Benefits And Pay Raise Bait

Bad guys are now capitalizing on the benefits election/enrollment season and the yearly pay raise process which usually gets effective Jan 1st. These criminals are ...

Who has what passwords?

It may not be something on your radar, but let’s talk about why it should be. Your staff are signing up and logging in ...

Data Breaches Devastate Small Businesses in 2019 with 10 Percent Closing Their Doors

A new report from the National Cyber Security Alliance sheds some light on how prepared small and medium size businesses are and what the ...

Common Internet Scams

As technology continues to evolve, cybercriminals will use more sophisticated techniques to exploit technology to steal your identity, personal information, and money. According to the FTC, these are the top three kinds of threats reported in 2018:

Contact

Pink Hat Technology ManagementPink Hat Technology Management Logo $$$

Newsletter

  • This field is for validation purposes and should be left unchanged.

Social Media

  • Facebook
  • Twitter
  • LinkedIn