top of page
Search


How to Spot a CIA Impersonator
Are you certain you can distinguish truth from deception?

Peter Warmka
Apr 10, 20244 min read
Â
Â
Â


Why Attractive Women Want to Connect with You on LinkedIn
I received a LinkedIn connection request from a woman claiming to be with a prominent U.S. technology company. This is what happened next.

Peter Warmka
Nov 10, 20233 min read
Â
Â
Â


Trust, Betrayal, and Cryptocurrency: An Inside Look at LinkedIn Frauds
The true story of how an accountant fell victim to a deceptive connection request.

Peter Warmka
Oct 27, 20234 min read
Â
Â
Â


How Human Hackers use Motivations and Vulnerabilities to their Advantage
Learn about human hacking tactics & how to protect yourself from social engineers who exploit motivations & vulnerabilities.

Christine Warmka
Jan 26, 20232 min read
Â
Â
Â


Threat Actors to Look Out For - State Actors
Practically every nation state in the world has an intelligence apparatus.

Peter Warmka
Jun 29, 20223 min read
Â
Â
Â


Why Hack Humans?
It all depends on the intent of the human hacker.

Christine Warmka
May 16, 20222 min read
Â
Â
Â
bottom of page





