top of page
Search


How to Spot a CIA Impersonator
Are you certain you can distinguish truth from deception?

Peter Warmka
Apr 10, 20244 min read
573 views
0 comments


Why Attractive Women Want to Connect with You on LinkedIn
I received a LinkedIn connection request from a woman claiming to be with a prominent U.S. technology company. This is what happened next.

Peter Warmka
Nov 10, 20233 min read
425 views
0 comments


Trust, Betrayal, and Cryptocurrency: An Inside Look at LinkedIn Frauds
The true story of how an accountant fell victim to a deceptive connection request.

Peter Warmka
Oct 27, 20234 min read
45 views
0 comments


How Human Hackers use Motivations and Vulnerabilities to their Advantage
Learn about human hacking tactics & how to protect yourself from social engineers who exploit motivations & vulnerabilities.

Christine Warmka
Jan 26, 20232 min read
36 views
0 comments


Threat Actors to Look Out For - State Actors
Practically every nation state in the world has an intelligence apparatus.

Peter Warmka
Jun 29, 20223 min read
142 views
0 comments


Why Hack Humans?
It all depends on the intent of the human hacker.

Christine Warmka
May 16, 20222 min read
179 views
0 comments
bottom of page