top of page
Search


How to Spot a CIA Impersonator
Are you certain you can distinguish truth from deception?

Peter Warmka
Apr 10, 20244 min read
573 views
0 comments


Why Attractive Women Want to Connect with You on LinkedIn
I received a LinkedIn connection request from a woman claiming to be with a prominent U.S. technology company. This is what happened next.

Peter Warmka
Nov 10, 20233 min read
425 views
0 comments


Protection Against Social Engineering Threats: Simplified, Yet Effective
In today’s digital age, social engineering threats have become increasingly common and sophisticated. These threats can manifest through...

Peter Warmka
Oct 5, 20233 min read
71 views
0 comments


Foiling Grandparent Scams: How Vigilance and Communication Saved a Family
How a family’s preparedness and quick thinking protected their grandfather from falling victim to a cunning scheme involving his grandson.

Peter Warmka
Jul 27, 20233 min read
44 views
0 comments


Empowering Our Seniors: Safeguarding Privacy, Security, and Well-being in the Digital Age
How can elders, the most vulnerable and victimized segment of the population, protect their information?

Peter Warmka
Jul 11, 20232 min read
67 views
0 comments


How Human Hackers use Motivations and Vulnerabilities to their Advantage
Learn about human hacking tactics & how to protect yourself from social engineers who exploit motivations & vulnerabilities.

Christine Warmka
Jan 26, 20232 min read
36 views
0 comments


How Human Hackers Analyze Targets
What can a human hacker find out about you on the web?

Christine Warmka
Oct 21, 20223 min read
98 views
0 comments


Threat Actors to Look Out For - State Actors
Practically every nation state in the world has an intelligence apparatus.

Peter Warmka
Jun 29, 20223 min read
142 views
0 comments


How Do Human Hackers Choose Their Targets?
“My organization would never be targeted by a hacker or criminal group, let alone a foreign intelligence service!” If this is your...

Christine Warmka
Jun 14, 20223 min read
171 views
0 comments


Look Out for this Black Friday Scam
There is more to phishing emails than simply just not clicking on a link.

Christine Warmka
Nov 24, 20212 min read
74 views
0 comments


The Story Behind the Story of a CIA Spy
What can you learn from a former CIA spy who spent his career artfully manipulating innocent people to steal high value secrets?

Peter Warmka
Feb 11, 20213 min read
431 views
0 comments


LinkedIn Networking: Unmasking the Deception
False LinkedIn profiles are often created by criminal groups as well as foreign intelligence services for the purpose of breaching security

Peter Warmka
Jun 18, 20203 min read
248 views
0 comments


Fallen Victims: Recruited by Headhunter to Commit Espionage
How an information technology specialist was recruited by a “headhunter” to commit industrial espionage.

Peter Warmka
Jan 16, 20204 min read
206 views
0 comments


Fallen Victims: How A Receptionist Got Vished
Christine was so excited to have landed the receptionist job with her employer.

Peter Warmka
Dec 16, 20193 min read
68 views
0 comments


Confessions of a CIA Spy
What is of more serious concern is the general apathy of those who believe that they will never fall victim to such security breach attempts

Peter Warmka
Dec 1, 20193 min read
285 views
0 comments
bottom of page