top of page
Search

Peter Warmka
Nov 10, 20233 min read
Why Attractive Women Want to Connect with You on LinkedIn
I received a LinkedIn connection request from a woman claiming to be with a prominent U.S. technology company. This is what happened next.
363 views0 comments

Peter Warmka
Oct 12, 20234 min read
Memory, Money, and Manipulation: The Silent Epidemic of Scams Targeting Seniors with Dementia
How a scam targeting the elderly turned deadly.
27 views0 comments


Christine Warmka
Jan 26, 20232 min read
How Human Hackers use Motivations and Vulnerabilities to their Advantage
Learn about human hacking tactics & how to protect yourself from social engineers who exploit motivations & vulnerabilities.
35 views0 comments


Christine Warmka
Oct 21, 20223 min read
How Human Hackers Analyze Targets
What can a human hacker find out about you on the web?
98 views0 comments


Christine Warmka
Jun 14, 20223 min read
How Do Human Hackers Choose Their Targets?
“My organization would never be targeted by a hacker or criminal group, let alone a foreign intelligence service!” If this is your...
169 views0 comments


Christine Warmka
Nov 24, 20212 min read
Look Out for this Black Friday Scam
There is more to phishing emails than simply just not clicking on a link.
74 views0 comments


Peter Warmka
Oct 22, 20213 min read
Security Experts Being Deceived by Fake Profiles is a Reality
Fake profiles like Robin Sage live on as security experts are still trusting invitations to connect on social media from imposters.
654 views0 comments
bottom of page