top of page
Search

How to Spot a CIA Impersonator
Are you certain you can distinguish truth from deception?
Peter Warmka
Apr 10, 20244 min read
552 views
0 comments

Why Attractive Women Want to Connect with You on LinkedIn
I received a LinkedIn connection request from a woman claiming to be with a prominent U.S. technology company. This is what happened next.
Peter Warmka
Nov 10, 20233 min read
387 views
0 comments

Trust, Betrayal, and Cryptocurrency: An Inside Look at LinkedIn Frauds
The true story of how an accountant fell victim to a deceptive connection request.
Peter Warmka
Oct 27, 20234 min read
45 views
0 comments


How Human Hackers use Motivations and Vulnerabilities to their Advantage
Learn about human hacking tactics & how to protect yourself from social engineers who exploit motivations & vulnerabilities.
Christine Warmka
Jan 26, 20232 min read
35 views
0 comments


Threat Actors to Look Out For - State Actors
Practically every nation state in the world has an intelligence apparatus.
Peter Warmka
Jun 29, 20223 min read
142 views
0 comments


Why Hack Humans?
It all depends on the intent of the human hacker.
Christine Warmka
May 16, 20222 min read
176 views
0 comments
bottom of page