top of page
Search


Bytes of Burden: How to Break Free from Digital Hoarding
How does this accumulation of digital clutter impact our security awareness and vulnerability in the digital realm?

Peter Warmka
Mar 21, 20243 min read
Â
Â
Â


Why Attractive Women Want to Connect with You on LinkedIn
I received a LinkedIn connection request from a woman claiming to be with a prominent U.S. technology company. This is what happened next.

Peter Warmka
Nov 10, 20233 min read
Â
Â
Â


Trust, Betrayal, and Cryptocurrency: An Inside Look at LinkedIn Frauds
The true story of how an accountant fell victim to a deceptive connection request.

Peter Warmka
Oct 27, 20234 min read
Â
Â
Â


Memory, Money, and Manipulation: The Silent Epidemic of Scams Targeting Seniors with Dementia
How a scam targeting the elderly turned deadly.

Peter Warmka
Oct 12, 20234 min read
Â
Â
Â


How Human Hackers use Motivations and Vulnerabilities to their Advantage
Learn about human hacking tactics & how to protect yourself from social engineers who exploit motivations & vulnerabilities.

Christine Warmka
Jan 26, 20232 min read
Â
Â
Â


What Do Your Social Media Profiles Reveal to Human Hackers?
Social media platforms all offer a different perspective and reveal different types of information about you to the human hacker.

Christine Warmka
Jan 19, 20233 min read
Â
Â
Â


How Human Hackers Select Insider Targets
An insider is an individual who has regular unescorted access to the facilities of a target or to their IT network.

Christine Warmka
Dec 1, 20222 min read
Â
Â
Â


Why Hack Humans?
It all depends on the intent of the human hacker.

Christine Warmka
May 16, 20222 min read
Â
Â
Â
bottom of page





