Pink Hat Technology Management

Blog

Two-factor what?

Two-factor authentication (2FA for short), sometimes called multi-factor authentication, is a system in which you must verify your identity in two separate ways to ...

Even ‘Unsubscribe’ Emails Can Put the Organization at Risk

Social Engineering tactics seek to use any means that’s familiar to the intended victim – and unsubscribing is perceived as being so benign, it may just be the perfect way to fool your users. While I can’t think of a single ...

Credit Card Fraud: How does it happen?

Rules for credit card and debit card information security are set forth in the Payment Card Industry Data Security Standards (PCI-DSS), a set of ...

Calendar Scams And What To Do About Them

Scammers are abusing Google Calendar invites to send out unsolicited, spammy events, according to Rob Verger at Popular Science. Attackers only need your Gmail ...

Blank Emails Come Before Email Fraud Attacks

Business Email Compromise attacks (BEC) is a form of cyber-crime which uses email fraud to attack commercial, government and non-profit organizations to achieve a specific outcome which ...

Why is adding a profile photo to your Outlook a good idea?

It is very easy for hackers to create a fake e-mail address that displays any name they want in attempt to ...

How secure is your mobile device?

Most of us have a smartphone, but how many of us really think about the security threats faced by these mobile devices? The bad ...

Email attacks are having a major impact on business with employees seen as a major weak link

With 82% of organizations facing an attempted email-based security threat in the past year, the impacts of these attacks are material and potentially harmful ...

What Are Credit Card Scammers After?

What are the bad guys after? As an employee at an organization that processes credit card transactions, you are required to keep sensitive information about those payments secure at all times. if ...

New Phishing Scam Targets Your Amazon Account

McAfee researchers have discovered a new version of the 16Shop phishing kit in use by hackers around the world. According to the latest research, there are now more than 200 URLs currently ...

Contact

Pink Hat Technology ManagementPink Hat Technology Management Logo $$$

Newsletter

  • This field is for validation purposes and should be left unchanged.

Social Media

  • Facebook
  • Twitter
  • LinkedIn