Monday, 14 January 2019

What do you know about SMS & Mobile Phone Phishing?

Because there has been a rise of mobile phone messaging services such as WhatsApp and Facebook messenger, cybercriminals now have a new way to attack users!

SMS phishing or SMiShing works in the same way as email phishing – the victim is sent a fake offer or warning that appears to be from a legitimate company or organization. The message usually contains a malicious link that the victim is persuaded into clicking.

A SMiShing message is often short and to the point with the aim of shocking or scaring a user into clicking the link without thinking twice. A common method is when cybercriminals pretend to be from a bank, warning the victim that their account has been closed, disabled or compromised.

Because the fraudulent message is received via SMS or private message, it can be difficult to realise the message is fake. Why? Because these messages do not contain warning signs of a scam such as the senders email address. Without knowing the SMS is fraudulent, the victim will click on the link willingly and hand over their private information and/or passwords to the cyber attackers.

Here are some helpful tips on preventing SMiShing:

1. Do not click on unknown SMSs or private messages hat contain links!
2. Never reply or give out your personal information if you receive an SMS asking you to
3. If the SMS asks for a quick/urgent reply this is a sign of SMiShing
4. An SMS states “Congratulations, you have won”, etc. this is another sign of SMiShing
5. Should you receive an SMS from your bank, always call your banks customer service line first to double check that it is legitimate

Trust your instincts – if the SMS doesn’t seem right, do not click on it!

TCG Forensics offers a range of cellular and digital forensics services. Should you need the assistance of an expert forensic investigator please do not hesitate to give us a call on 021 110 0422 or email

Wednesday, 9 January 2019

How to protect yourself against SMS Phishing Attacks (SMiShing)

Everyday scammers are coming up with new ways to target people and trick them into parting with their money. Nothing digital is safe anymore – social media networks, emails and now even SMSs.

SMS phishing, otherwise known as SMiShing, are phishing scams that are sent out on SMSs!
Here are some helpful tips on how to spot a SMiShing scam SMS…

Always double check SMSs from your bank. If your bank does send you SMSs, then be sure to find out what number they use so if you receive an SMS you can compare it and find out if it’s legitimate. If you do now know the number, call your bank’s customer service number just to be sure.

Be wary of suspicious-looking numbers & links. Scammers are likely to mask their identities so they will use a variety and different phone numbers as well as unusual links in SMS scams – if you receive any SMSs from strange numbers that you do not recognise always double check with whoever sent it and NEVER link on a link you do not recognise.

Report threats. Should you ever receive regular SMS scams, any threatening or potentially dangerous SMSs always report it to the local authorities, cybercrime centre/website or get in touch with a professional digital or mobile forensics expert from in South Africa – call 021 110 0422 or email

Always stay vigilant and be aware of the common techniques that SMS scammers use when they’re SMiShing – this will go a long way when it comes to keeping yourself and your money safe!

Thursday, 13 December 2018

What is the Difference Between Digital Forensics and Information Security

Before we get into the differences between digital forensics and information security, let’s stop and take a look at how they are alike.

Image result for digital forensics

Both digital forensics and information security are aimed at protecting your digital data, goods and valuables as well as digital resources. People who are involved in digital forensics or information security can work in a range of industries, including private businesses and organisations. Why can people in the digital forensics and information security work in so many different industries? Because, companies know that as the world becomes more digitally dependant so does the need to keep their technology and systems properly secured. Digital forensics and information security specialists are becoming more and more popular as the demand for their skillset grows.

But, just because digital forensics and information security are both focused on digital goods and resources doesn’t mean the two are both closely associated with each other doesn’t mean they are the same.

It is best to think of digital forensics and information security as two different sides of the same thing, so the services and work that is done is very much the same, but it does have differences.

So what is the difference between digital forensics and information security? To put it into simple terms that everyone can understand, information security is about preventing and protecting against online and digital threats. On the other hand digital forensics is about the response that comes after.

Related image

Let’s look at it like this – information security is the team that executes and supports the information security system with the aim being to protect individuals and businesses against cyber threats. If information security fails to protect the users and the systems are broken, then this is where the digital forensics experts come into the picture – they will put their skills to use by singling out the threat, understanding it and trying to recover all the data that was lost and/or stolen.

At TCG Digital Forensics, we offer all our clients clean, professional and affordable digital forensics services as well as information security – all supplied by our team of skilled digital forensics experts. Do not hesitate to contact us to discuss your requirements; simply give us a call on 021 110 0422 or email

Tuesday, 11 December 2018

3 Reasons why you should always update WhatsApp

In this digital age, time is important, so most people want to satisfy most of their needs in just one click… More and more messengers are becoming popular, but WhatsApp still remains especially popular, which is why hackers keep their sights on it.

Image result for whatsapp

Here are some of the vulnerabilities in the WhatsApp application…

> Did you know that it is possible to gain access to an individual’s messages because of vulnerability in the WhatsApp protocol?

> Hackers can a gain access to a user’s cell phone by using a vulnerability that is triggered when a video call is answered.

> There is vulnerability with the two-factor authentication on WhatsApp. If a user switches off their phone at night, the password recovery system can be made to call and name the code, this code can be accessed using voicemail since most passwords are still weak.

To avoid becoming the next victim, always keep your WhatsApp updated! Has your phone been hacked? Please contact us immediately at TCG Digital Forensics in Cape Town and Centurion – give us a call on 021 110 0422 or email

Friday, 7 December 2018

Cellular Forensics and Radar Analysis help find Plane Crash Site in Record Time!

Did you know that involving experts in the cell phone and radar analysis fields can not only save time in finding a crash site, but also save lives! By using cellular forensics and radar analysis, the search area is made smaller and urgent matters, such as saving the lives of those who were involved in the crash, can be resolved.

On the 19th of November 2019 in North Dakota, a Medevac plane was reported missing. By using the power of cellular forensics as well as radar analysis, the Civil Air Patrol’s National Radar Analysis Team and the National Cell Phone Forensics played a massive part in saving the day. These two teams were able to aid the rescue team in finding the terrible plane crash site.

So how did the two teams manage to identify the precise spot where the plane went down? Well, using cellular data forensics and partnering with the power or radar data forensics, they prepared a detailed map showing where the plane crash was located. After they supplied the map to the CAP’s North Dakota Wing, state and local authorities, they were able to then discover the passengers who were all fatally injured.

Details from the cellular forensics data and the radar analysis show that the plane may have been destroyed while it was still in the air; however nothing has been confirmed yet.

The cellular devices of the three deceased plane passengers were used by the cellular forensics experts to detect, to the meter, exactly where the plane had gone down.

Although the outcome of the search was not what the cellular forensics team, the radar analysis team and the authorities had hope for, it is amazing to see that when these two teams joined together they were able to give detailed information on exactly where the plane crash site was – all in record time!

At TCG Digital Forensics we offer reliable and affordable cellular forensic analysis services in Cape Town as well as Johannesburg - do not hesitate to contact us today on 021 110 0422 | 087 001 0523 or email

What is Service of Summons

What exactly is the meaning when we hear “Service of Summons”?

Related image

The service of summons needs to be composed of a number of important documents and information. If you take a look at Rules 5 and 7 of the Magistrates’ Courts Act, as well as Rule 17 in the Uniform Rules of Court you will get a detailed description of what a service of summons contains. Here are some of the most important items a service of summons needs to consist of…

- A clear form of consent to the particular judgement
- Citations of both parties involved
- The particulars of the claim
- The address of the party involved that will receive the service of summons during the legal process

The service of summons is then passed on to a legal attorney or lawyer and signed, however the party involved can sign off if they chose not to be assisted by an attorney.

The next step is for the service of summons to be drafted, once this is done it is checked thoroughly by an officer of the court who stamps the summons document and assigns it with a unique case number.

When the summons is issued by the officer of the court, it can be served.

As a value added service to our clients abroad, at TCG Digital Forensics are offering a service of summons processing/service in South Africa.

We are able to affect the service of legal processing/summons in the following areas in South Africa:

·         > Cape Town
·         > Durban
·         > Johannesburg

Please note that we may be available to offer our services to clients in other, additional areas on request. Service is executed by experienced process servers with supporting statements issued and commissioned to that effect. Generally we offer summons processing/services around the needs of attorneys, investigators and forensics audits, but we also cover a wider scope.

For additional information or discussions around the serving of legal process/summons in South Africa as well as additional areas, please do not hesitate to make contact with us directly on 021 110 0422 | 087 001 0523 or email

The latest Digital Fraud Investigation trends to look out for...

When it comes to the business world, being prepared for the future is key. But what digital fraud investigation trends do we have to keep our eyes open for in the future? 

Image result for Digital Fraud Investigation

At TCG Digital Forensics, our Certified Fraud Examiners offer digital fraud investigations using a unique set of expertise in detecting, preventing and then investigating fraud – allowing your business to uncover fraud sooner and avoid losses that can negatively affect your organization. No organisation is completely safe from fraud and the damage that it can cause. From large corporations to small family-run businesses, fraud is often inescapable, resulting in a devastating outcome.

Our CFEs offer digital fraud investigations in South Africa that can protect you, your organisation and strengthen your overall anti-fraud efforts. We offer a range of digital forensics services including digital fraud investigations in South Africa which can protect you, your organisation and strengthen your overall anti-fraud efforts.

Do not let the fraudsters damage your company or business in the years to come, here are the latest digital fraud investigations trends to look out for…

Identity theft will evolve – It’s nothing new to digital fraud investigations, but identity theft fraud will take new and more sophisticated steps to steal your private information and data.

Rapid growth of fake accounts – From internet trolls to fake news, there is always an overflow of fake accounts, but as tech grows rapidly so will the creation of sham accounts

Fraud detection and machine learning – Fraudsters will continue the trend of focusing on popular industries including travel, tech and fashion, meaning digital fraud investigations will be on the rise.

As you’ve seen will regards to the digital fraud investigations above, with new technology advancing at a rapid rate, so will the digital fraud investigation trends.