Articles.jpg

Articles

THE MILITARY WALLET

October 22nd, 2021

Spear-phishers may use LinkedIn profiles to target military members, veterans and contractors with security clearances. Here's what you need to know to protect yourself.

LinkedIn Phone.jpg
Reviewing CVs

CHRON

October 15th, 2021

Always perform your search comparing the name of the person, name of their company, and their profession as recruiters on Google. If they are legitimate, you will find information that confirms their background.

DARK READING

October 15th, 2021

Inside their motivations, how they go about it -- and what businesses can do about it, according to Counterintelligence Institute founder Peter Warmka.

Hacking Humans.jpg
Computer Hacker.jpg

ASIS

September 29th, 2021

Savvy attackers work behind a computer screen; with the amount of information that an organization places online about itself and its staff, threat actors can use that data to gain access into an organization by cultivating inside help.

Peter Warmka, author, former CIA senior intelligence officer, and executive member of the Counterintelligence Institute, explains how attackers are taking very meticulous steps to build a trusted connection with victims before they complete a spear-phishing attack.

Cybersecurity Threats.png

DATAMATION

September 24th, 2021

Malware Infection.jpg

September 9th, 2021

WASHINGTON EXAMINER

While cybercriminals are constantly looking for new ways to compromise IT systems, sometimes the old ways work just fine. Two cybersecurity vendors recently noted malware getting spread through a tried-and-true method: Microsoft Word documents.

INFOSECURITY PROFESSIONAL

September/October 2021

Hackers have everyone fooled, even cybersecurity professionals themselves! Think twice before reaching out—and responding to—online connections.

Phishing.jpg

June 1st, 2021

With increasing reliance on digital and remote work, common applications, and a diversified employee base, today’s businesses face an age-old and ever-evolving threat; the threat posed by human vulnerability.

SECURITY INFO WATCH

Weakest Link.jpg

THE SWAT CLUB

August 20th, 2020

Peter Warmka identifies several key skills and competencies possessed by professional spies which are sorely lacking among today’s corporate managers.

Manager in Meeting.jpg

FRAUD INTELLIGENCE

Trojan Horse.jpg

June/July 2019

Peter Warmka exposes social engineering methodology and the most effective defenses. Just as the Trojans of ancient literature were intrigued by a giant wooden horse, social engineers are assailing countless organizations today under seemingly innocent guises.

WORLDWIDE INTELLIGENCE NETWORK

February 27th, 2019

Sophisticated threat actors will frequently target the most significant vulnerability found in most organizations: the human factor. The interaction between human beings and the technology meant to protect the organization is commonly referred to as the weakest link in security.

Cybersecurity Networking.jpg
Employees.jpg

SHRM

October 20th, 2018

Chief financial officer Malcolm Fisher never thought he would be victimized by cybercrime—until a social engineer successfully impersonated him and bilked his company out of more than $125,000.

Subscribe to the Counterintelligence Institute Newsletter

FRAUD CONFERENCE NEWS

June 18th, 2018

It should come as no surprise that with the growing prevalence of the internet, it’s even easier today to get personal information on a potential target. Personal information is everywhere and criminals know exactly where to look.

Conference Presentation.png