top of page
Search

Bytes of Burden: How to Break Free from Digital Hoarding
How does this accumulation of digital clutter impact our security awareness and vulnerability in the digital realm?
Peter Warmka
Mar 21, 20243 min read
25 views
0 comments

Why Attractive Women Want to Connect with You on LinkedIn
I received a LinkedIn connection request from a woman claiming to be with a prominent U.S. technology company. This is what happened next.
Peter Warmka
Nov 10, 20233 min read
387 views
0 comments

Memory, Money, and Manipulation: The Silent Epidemic of Scams Targeting Seniors with Dementia
How a scam targeting the elderly turned deadly.
Peter Warmka
Oct 12, 20234 min read
31 views
0 comments

Foiling Grandparent Scams: How Vigilance and Communication Saved a Family
How a family’s preparedness and quick thinking protected their grandfather from falling victim to a cunning scheme involving his grandson.
Peter Warmka
Jul 27, 20233 min read
44 views
0 comments


How Human Hackers use Motivations and Vulnerabilities to their Advantage
Learn about human hacking tactics & how to protect yourself from social engineers who exploit motivations & vulnerabilities.
Christine Warmka
Jan 26, 20232 min read
35 views
0 comments


What Do Your Social Media Profiles Reveal to Human Hackers?
Social media platforms all offer a different perspective and reveal different types of information about you to the human hacker.
Christine Warmka
Jan 19, 20233 min read
186 views
0 comments


How Do Human Hackers Choose Their Targets?
“My organization would never be targeted by a hacker or criminal group, let alone a foreign intelligence service!” If this is your...
Christine Warmka
Jun 14, 20223 min read
170 views
0 comments


Why Hack Humans?
It all depends on the intent of the human hacker.
Christine Warmka
May 16, 20222 min read
176 views
0 comments


Look Out for this Black Friday Scam
There is more to phishing emails than simply just not clicking on a link.
Christine Warmka
Nov 24, 20212 min read
74 views
0 comments
bottom of page