Peter WarmkaNov 10, 20233 min readWhy Attractive Women Want to Connect with You on LinkedIn I received a LinkedIn connection request from a woman claiming to be with a prominent U.S. technology company. This is what happened next.
Christine WarmkaJan 26, 20232 min readHow Human Hackers use Motivations and Vulnerabilities to their AdvantageLearn about human hacking tactics & how to protect yourself from social engineers who exploit motivations & vulnerabilities.
Christine WarmkaJan 19, 20233 min readWhat Do Your Social Media Profiles Reveal to Human Hackers?Social media platforms all offer a different perspective and reveal different types of information about you to the human hacker.
Christine WarmkaDec 1, 20222 min readHow Human Hackers Select Insider TargetsAn insider is an individual who has regular unescorted access to the facilities of a target or to their IT network.
Peter WarmkaJun 18, 20203 min readLinkedIn Networking: Unmasking the DeceptionFalse LinkedIn profiles are often created by criminal groups as well as foreign intelligence services for the purpose of breaching security