Peter WarmkaNov 10, 20233 minWhy Attractive Women Want to Connect with You on LinkedIn I received a LinkedIn connection request from a woman claiming to be with a prominent U.S. technology company. This is what happened next.
Christine WarmkaJan 26, 20232 minHow Human Hackers use Motivations and Vulnerabilities to their AdvantageLearn about human hacking tactics & how to protect yourself from social engineers who exploit motivations & vulnerabilities.
Christine WarmkaJan 19, 20233 minWhat Do Your Social Media Profiles Reveal to Human Hackers?Social media platforms all offer a different perspective and reveal different types of information about you to the human hacker.
Christine WarmkaDec 1, 20222 minHow Human Hackers Select Insider TargetsAn insider is an individual who has regular unescorted access to the facilities of a target or to their IT network.