How to Spot a CIA Impersonator
top of page
Search
Are you certain you can distinguish truth from deception?
Peter Warmka
- Nov 10, 2023
- 3 min
Why Attractive Women Want to Connect with You on LinkedIn
I received a LinkedIn connection request from a woman claiming to be with a prominent U.S. technology company. This is what happened next.
281 views0 comments
Peter Warmka
- Oct 5, 2023
- 3 min
Protection Against Social Engineering Threats: Simplified, Yet Effective
In today’s digital age, social engineering threats have become increasingly common and sophisticated. These threats can manifest through...
65 views0 comments
Peter Warmka
- Jul 27, 2023
- 3 min
Foiling Grandparent Scams: How Vigilance and Communication Saved a Family
How a family’s preparedness and quick thinking protected their grandfather from falling victim to a cunning scheme involving his grandson.
41 views0 comments
Peter Warmka
- Jul 11, 2023
- 2 min
Empowering Our Seniors: Safeguarding Privacy, Security, and Well-being in the Digital Age
How can elders, the most vulnerable and victimized segment of the population, protect their information?
63 views0 comments
Christine Warmka
- Jan 26, 2023
- 2 min
How Human Hackers use Motivations and Vulnerabilities to their Advantage
Learn about human hacking tactics & how to protect yourself from social engineers who exploit motivations & vulnerabilities.
28 views0 comments
Christine Warmka
- Oct 21, 2022
- 3 min
How Human Hackers Analyze Targets
What can a human hacker find out about you on the web?
94 views0 comments
Peter Warmka
- Jun 29, 2022
- 3 min
Threat Actors to Look Out For - State Actors
Practically every nation state in the world has an intelligence apparatus.
113 views0 comments
Christine Warmka
- Jun 14, 2022
- 3 min
How Do Human Hackers Choose Their Targets?
“My organization would never be targeted by a hacker or criminal group, let alone a foreign intelligence service!” If this is your...
154 views0 comments
Christine Warmka
- Nov 24, 2021
- 2 min
Look Out for this Black Friday Scam
There is more to phishing emails than simply just not clicking on a link.
73 views0 comments
Peter Warmka
- Feb 11, 2021
- 3 min
The Story Behind the Story of a CIA Spy
What can you learn from a former CIA spy who spent his career artfully manipulating innocent people to steal high value secrets?
384 views0 comments
Peter Warmka
- Jun 18, 2020
- 3 min
LinkedIn Networking: Unmasking the Deception
False LinkedIn profiles are often created by criminal groups as well as foreign intelligence services for the purpose of breaching security
242 views0 comments
Peter Warmka
- Jan 16, 2020
- 4 min
Fallen Victims: Recruited by Headhunter to Commit Espionage
How an information technology specialist was recruited by a “headhunter” to commit industrial espionage.
176 views0 comments
Peter Warmka
- Dec 16, 2019
- 3 min
Fallen Victims: How A Receptionist Got Vished
Christine was so excited to have landed the receptionist job with her employer.
67 views0 comments
Peter Warmka
- Dec 1, 2019
- 3 min
Confessions of a CIA Spy
What is of more serious concern is the general apathy of those who believe that they will never fall victim to such security breach attempts
238 views0 comments
bottom of page