Pink Hat Technology Management

Blog

Scam of The Week: New Social Security Account Fraud

Bad guys are abusing the Social Security Administration's (SSA) online service called My Social Security Account in two ways: A phishing scam which encourages employees to create an account, ...

Cell Phone Privacy – 4 Smart Changes You Should Make NOW

Last month I shared how Marc Goodman, author of “Future Crimes,” opened my eyes to the amount of private information we hand over unwittingly on a day-to-day basis, simply by using our computers. As you probably assume, our mobile devices ...

NEVER TRUST A FOUND USB DRIVE, BLACK HAT DEMO SHOWS WHY

Does dropping an infected USB drive in a parking work when it comes to a hacker luring its prey into a digital trap? The answer is a resounding yes. At Black Hat USA, security researcher Elie Bursztein shared the results ...

Hackers unleash smart Twitter phishing tool that snags two in three users

Just. Don't. Click. On. Dodgy. ShortURLs. People. Black Hat Twitter scammers have a new weapon with the release of an effective spear phishing ...

Incidents of Ransomware on the Rise

Protect Yourself and Your Organization Hospitals, school districts, state and local governments, law enforcement agencies, small businesses, large businesses—these are just some of the ...

Illegal Game of Thrones Download Phishing Attack

Illegally downloading television shows and movies from a variety of torrent websites is done all the time. The HBO series, ...

There’s no such thing as “free” Wi-Fi … ask the RNC.

Many of you probably heard the recent news about Avast, a virus-protection software company, setting up a fake Wi-Fi network at the RNC that was an open (or insecure) network. They claimed to have done this to prove how careless ...

Pokémon Malware, Muggings And Other Mayhem

In case you just came back from vacation, there literally is a new craze going on with an augmented-reality smartphone app called Pokémon Go. It's a geocaching game, meaning it's tied to real-world locations. It's a smash hit sending people on the ...

Mac Is The Focus of New Malware

In the old days, before the rise of the iPad and iPhone, hackers were mostly content to leave Apple alone. They had such a tiny slice of the computer market that it ...

Avoiding malicious emails and phishing attacks

Here we will list a few steps to help you not to fall victim to a phishing attack. All it takes is common sense and a pinch of suspicion. - Review the sender, the subject line and inspect the grammar. You can catch this scam before it even happens, by reviewing who is sending that message ...

Contact

Pink Hat Technology ManagementPink Hat Technology Management Logo $$$

Newsletter

  • This field is for validation purposes and should be left unchanged.

Social Media

  • Facebook
  • Twitter
  • LinkedIn