top of page
Search


Why Attractive Women Want to Connect with You on LinkedIn
I received a LinkedIn connection request from a woman claiming to be with a prominent U.S. technology company. This is what happened next.

Peter Warmka
Nov 10, 20233 min read
427 views
0 comments


How Human Hackers use Motivations and Vulnerabilities to their Advantage
Learn about human hacking tactics & how to protect yourself from social engineers who exploit motivations & vulnerabilities.

Christine Warmka
Jan 26, 20232 min read
36 views
0 comments


What Do Your Social Media Profiles Reveal to Human Hackers?
Social media platforms all offer a different perspective and reveal different types of information about you to the human hacker.

Christine Warmka
Jan 19, 20233 min read
186 views
0 comments


How Human Hackers Select Insider Targets
An insider is an individual who has regular unescorted access to the facilities of a target or to their IT network.

Christine Warmka
Dec 1, 20222 min read
42 views
0 comments


LinkedIn Networking: Unmasking the Deception
False LinkedIn profiles are often created by criminal groups as well as foreign intelligence services for the purpose of breaching security

Peter Warmka
Jun 18, 20203 min read
248 views
0 comments
bottom of page