Thursday, 19 December 2019

Cracking the case with digital forensics.


In the world of law enforcement, digital forensics is a game changer nearly as important as DNA testing.

Image result for Cracking the case with digital forensics.

When two 13 year old girls went missing in September 2014, the first place detectives looked for clues was on their iPod, smartphones and other digital devices. The digital evidence led them to the girls and they were found in the basement of 23 year old Casey lee chin. He is now being charged with felony criminal sexual conduct, kidnapping and solicitation of a child.

 Digital forensics – the examination of cell phones, tablets and personal electronics in criminal investigations – is dramatically changing the way cases are worked and solved. While technology has created new portals for predators searching for victims, it is also leaving tell-tale trails for police.

Image result for Cracking the case with digital forensics.

Law enforcement say that digital forensics has become an investigation imperative. With majority of adult’s caring a cellophane the devices have become the one constant in many people’s lives. Your cell phone has become everything you need throughout the day – your alarm clock, phone line, email, social media terminal and so much more. Police use that almost constant phone activity to verify a suspects or witness statement and provide a log of a person movements and activities. Smartphones can even be an eyewitness by recording a crime in progress.

Electronic devices are just a treasure trove of information. The digital evidence is one of the first thing investigators look at because they leave footprints all over the place – who you were talking with, where you’re take you photos and even who you’re been tweeting.

Image result for Cracking the case with digital forensics.

It’s true, technology leaves a tell-tale trail for law enforcement and digital forensic investigators.

Tuesday, 17 December 2019

Smartphone safety for children


Were more connected than we were a few years ago and were continuing to grow as time goes by.

These days, teenagers and even small children are getting caught up in all the new technology that is being introduced. The ability to communicate with friends with the push of a button is a sought after thing, and having a smartphone is a privilege that all teenagers assume they should have. However smartphones can bring a few danger with them.

Image result for smart phone safety for children

It’s about time you sit down with your children and have a chat with them about smartphone safety.

You will never be able to remove them completely from the world of technology, so make sure to sit down and have an educational conversation instead of arguing with them.

Who are they talking to would be a great question to ask yourself?

Are they chatting to their friends or someone they met online? Let them know that people are usually not who they seem to be online and they should apply “stranger danger” online as well as in the street.

What kind of content are they looking at? Are the apps, games, videos, etc. They’re looking at appropriate for their age? Remember to be aware of any cyber-bullying is taking place.

Image result for smart phone safety for children

Are they texting and driving? Texting and driving is beyond dangerous, especially for young teens who have just started driving and have little experience. There are apps you have use to control this, but there should be strict rules in place too.

Do you have any questions about smartphones safety or cellular forensics? At TCG Digital Forensics, we offer a range of services, from cyber forensics and mobile phone analysis to image enhancements and suspect profiling. Contact us on 0870010523 or contact@tcgforensics.co.za

Friday, 13 December 2019

7 steps to good digital parenting


Parenting today’s tech savvy kids can seem overwhelming, but you can do it! Take these seven simple, but still challenging steps, to becoming a good digital parent.

Yes when they are small we all have a hand on things. But as they get big it becomes more difficult to keep an eye out for things and so much can go wrong. Scams, hacking, kidnapping and so much 
more.

Image result for digital parenting

Talk with your kids

Educate yourself

Use parental controls

Set ground rules and enforce consequences

Friend and follow but don’t stalk

Explore, share, and celebrate

Be a good digital role model

Image result for digital parenting

Talk early and often be open and direct and always stay calm. Always try and search online for anything that you do not understand and try out some apps, games and sites yourself. Discuss and sign a family safety agreement so that the bond is already there. Restrict where and when they may use the device and that way boundaries will be set. If a rule is broken remove the tech privileges and do try and stick to them.

Follow your kids on social media but also respect their online space and freedom, try not to flood their accounts with comments and likes. Go online with your kids and explore their digital world, share your own online experiences and learn from each other and have some fun!

Get in contact with us on 0211100422 or www.tcgforensics.co.za

Thursday, 12 December 2019

Romance Scammers


What you need to know about Romance Scams. In this day and age lots of people are turning to online dating apps or social networking sites to meet someone. But instead of finding romance, many find a scammer trying to trick them into sending money.

The romance scams was 1 of the biggest reported losses over any other scams that was reported. Romance scammers create fake profiles on dates sites and apps, or they will target and contact through popular social media sites like Facebook, Instagram extra.

Here are just some of the lies they would tell you.

I am working on an oil rig
I am in the military
I am a doctor with an international organization

Here are some ways they will ask you for money and target you to send it to them and will ask you to wire the money or send it in a gift card.

Pay for a plane ticket
Pay for surgery
Pay for a visa or other official travel document

Image result for Romance scammers

Scammers ask you to pay by wiring money, with reload card, or with gift cards because they can get cash quickly and remain anonymous. They also know the transactions are almost impossible to reverse. Avoid losing money to a romance scammer and here is how.

Stop communication immediately
Talk to someone you trust about what is going on and get some advice
Do a search for the person job, profile, family or friends and ask questions re that
Do a reverse image search of the person profile picture

If you have any feeling this is a scammer or an uncertain feeling report it. Do not get yourself caught up losing money and braking your heart!

Contact us on 0211100422 or Email contact@osint.co.za 

Monday, 2 December 2019

All about Holiday Scams


It’s the festive season and everyone wants to travel. Now let us help you avoid any scams that you might come across when traveling or on your holiday as we both know this will be the worst! No one wants to be worried over this great festive season.

New research into cybersecurity has said that the UK alone has lost about 7M to fake sites and fraud in 2018. We are going to show you the five most common scams

Image result for holiday scams

Nowadays a fraudster will use increasingly sophisticated methods! They will target the most popular destination and time of the year to start with. They are well aware that we are all looking for great deals. As victims often find out just before they travel or even in-resort that they have3 been defrauded, it can then be difficult and expensive to obtain a legitimate replacement booking.

Some research we did and found out that 1 in 5 Brits in their lifetime are either been scammed or nearly scammed. As McAfee believes the actual figures are likely to be much higher as lots of people don’t actually report this issues small or big. As per below the big 5 scams that are common.

1. Fake Websites that look real
2. Being directed away from trusted sites for payment
3. Amazing Deals received via pop-up, emails and texts
4. Fake accommodation listings
5. Using unsecured networks

The above is just the simple one’s we can advise. Always just go with your gut feeling and if you do not know ask. Always report a scam or report it if you feel that it’s being suspicious activity.

Also always remember to connect with caution and avoid sharing sensitive data or bank account details. Consider using a VPN to help keep your connection secure. If you are going to rent do call the agent directly for information other than just sending an email or sms, always double check and do a little research and look at the comments and rates of the accommodation.

Try and book through a place that is well know or maybe a place that a family or friend has been to and recommended you to go. Another thing you can check is the payment page. Check for https:// rather than (http://) which should always appear on the payment page. Misspellings, additional words or characters, fuzzy or low-resolution pictures and logos are also be indicators of fraudulent website.

Otherwise you can always contact us! 


Wednesday, 27 November 2019

13 Vital Malware Warning Signs to look out for on your PC!

Imagine you’re working on something important and all of a sudden you start seeing multiple pop-up ads, plus your files or apps are taking ages to load. You start to ask yourself, is my computer infected with malware? It can happen to anyone of us, so always be extra careful!


If your computer starts acting up, it could be compromised with a virus or malware; however, this is just one of the many warning signs that could mean that your computer is infected. This is why it is vital to take action as quick as possible.

Here are the 13 most common warning signs of a malware infection on your computer.

1. Your computer is running slowly and your apps and files take longer to load than usual.

2. You keep getting blasted with pop-up ads or strange messages on your computer.

3. Your computer keeps crashing and/or it freezes and the blue screen of death appears.

4. You start getting this message on a regular basis, “you’re running out of disk space on Windows.”

5. You notice that when you start up your computer the network activity increases suspiciously.

6. Your homepage changes and you don’t remember doing it yourself.

7. Your computer is acting strange, like programs opening and closing, random shutting down, unusual messages, etc.

8. You’re getting messages saying that your antivirus software has been disabled.

9. Your friends are telling you that they’re getting random, strange messages from you on Facebook or other social media networks.

10. You notice that your desktop has new, unfamiliar icons that you do not recognize.

11. You start to see some unusual error messages appearing on your computer.

12. You can’t access your Control Panel on your computer.

13. Everything is working perfectly fine on your computer, but you’re paranoid and still want to check for malware. When it comes to protecting your data, it is vital to be a bit paranoid! The best way to protect your computer is to install a reliable security solution and do regular backups.

If you want to learn more about malware or any of our other services including open-source intelligence, digital forensics and IT support and solutions, please call 021 110 0422 or visit our websites www.osint.co.za | www.tcgforensics.co.za | www.tcgza.co.za

Wednesday, 20 November 2019

Be aware of these 5 Scams this Holiday Season

Hackers, scammers and cybercriminals love the holiday season because it gives them the chance to take advantage of the crazy holiday shopping and make a nice profit out of unknowing shoppers.

By using phishing scams, online scammers take advantage of the fact that your email inbox is so full of holiday specials and offers that you won’t think twice before clicking on a malicious link.
Here are 5 scams to keep an eye out for this holiday season…


Receipts and invoices. A lot of people do their shopping online these days and during the holiday season, there is a huge increase in online receipts and invoices that shoppers will receive via email. Scammers will hide malicious code in an attachment or link and shoppers won’t think twice when clicking on an attachment that’s apparently from Amazon!

Shipping status. Just like the fake receipts and invoices, fake shipping status alerts are a great way for scammers to trick shoppers into thinking there is a problem with their package or order. A notice from a legitimate-looking email to someone who is actually waiting for a delivery is bound to trick them into clicking on it.

Flyers and deals. The average user sees maybe a dozen or more special offers and deals during the holiday season. While going through emails, shoppers need to be on the lookout for discounts and offers from stores they have never shopped at before. It might be a great deal, but there’s a chance that clicking on it will only lead to a malware infection.

Malicious links. Malicious links are just as popular as malicious attachments, so always think twice before clinking on just any link in an email you receive. Hover your mouse over the link and if it is completely different the hyperlink included. In reality, the link is probably going to end up in malware or a fake website that’ll steal your private data.

Customer surveys. Scammers love to fake customer surveys that offer shoppers rewards such as gift cards or discounts after completing them. The difference between an actual survey and a fake one is easy to spot when you get to the last questions. A cybercriminal will often end up asking for your personal and financial information if so it’s definitely a scam!

Talk to your IT support provider to ensure your computer has the correct security measures in place as well as all the latest updates! Want to find out more about protecting your business or home from online scammers? Contact TCG Forensics on 021 110 0422 or pop an email to info@tcgforensics.co.za

Wednesday, 13 November 2019

6 Tips to help you avoid Scams and Trolls on Twitter

Twitter has gone from a silly, novelty social media platform to a source of news and information that almost everyone uses!

But just like other social media networks, Twitter is full of trolls and scammers who aim to harass and provoke you.


You need to know how to avoid scams and trolls on Twitter, here’s how.

1. Don’t be scared to block. It is vital that you know how and when to block someone, whether they are spamming you or bullying, you need to get rid of them before you end up infected with dangerous followers. The sooner you block the spammers or trolls, the better!

2. Don’t get hacked. Twitter accounts get hacked on a regular basis, so it is vital that you keep your account safe by using a strong password that has different numbers, symbols as well as upper and lowercase letters. It is best to use two-factor authentication. Even if it takes longer, it’s worth it to keep your account safe.

3. Don’t be fooled by trending topics. Twitter created trending topics and hashtags to make it easier to find content, but be careful because scammers love to hijack trending topics and add harmful and dangerous links that victims unknowingly click on without thinking.

4. Don’t trust shortened URLs. Just like trending topics, scammers and trolls love to use URL shorteners because they hide the ultimate endpoint of the link. If you see a shortened URL, make sure to check that it is coming from a trusted source. If not, do not click on it!

5. Don’t share your private information. This is an obvious one, but people still do not know not to share their personal information. Sharing your private information on social media platforms with millions and millions of strangers makes you an easy target for scammers and crimes such as identity theft.

6. Don’t ever use public Wi-Fi. It is best not to use other people’s computers as well as any public computers to log in to your Twitter account or any other personal account. Do not trust public Wi-Fi hotspots either as they make it easy for hackers to steal your passwords and other private information.

Use these six tips for Twitter as well as other social media platforms to keep your personal data safe and sound!

To learn more about Open Source Intelligence and Digital Forensics, please call us on 021 110 0422 or email contact@osint.co.za | info@tcgforensics.co.za

Wednesday, 6 November 2019

The Top most Common Types of Fraud!

When you become the victim of fraud, not only do you have to deal with the aftermath of someone scamming you, such as financial loss, but you also have to deal with the emotional side of it.


There are a range of different types of fraud, either way all of them can cause feelings of anger, devastation, fear and frustration. 

Do you think you have been the victim of fraud? At the TCG Forensic Division, we offer a range of digital forensic services, including fraud investigations. Please feel free to contact us on 021 110 0422 or email contact@tcgforensics.co.za to have a confidential discussion around your particular requirements.

Here are the 11 most common types of fraud to look out for…

1. Insurance Claim Fraud. People who make false claims, such as stage accidents, to receive insurance money from their insurance company. This can be a difficult type of fraud to investigate because some injuries can be difficult to medically identify and debate.  

2. Corporate Fraud. This includes fraud issues such as theft of information, such as private client information. This kind of fraud can lead to a damaged business reputation.

3. Financial Fraud. Evading tax, public corruption, healthcare fraud issues, telemarketing fraud and terrorist financing are all part of financial fraud.

4. Identity Theft. Those who are the victim of identity theft will have to look out for suspicious loan or credit card applications, strange withdrawals from bank accounts as well as using a different name to receive benefits.

5. Internet Fraud. Of course, this type of fraud always occurs online where a cybercriminal will try and take advantage with ransomware or phishing scams. Usually this includes stealing private information such as banking and login details.

6. Corporate Slip & Fall. Fraud like this is planned out by individuals in order to file a claim. People will go as far as to pretend to fall or throwing liquid on the floor in order to ensure a slip.

7. Transit Fraud. Companies who offer transportation, whether it is a bus, train or taxi, will often see fraud such as this where passengers will not seat or secure themselves properly, leading to them falling and injuring themselves on purpose.

8. Ticket Fraud. In some countries, the level of ticket fraud is significant. People will buy tickets online from a fake website; these tickets are not legitimate and have often already been used or do not exist.

9. Mechanical Fraud. This type of fraud is not common, however there are many people who fall victim to mechanics who scam their customers. Often they will be overpriced or they will request things to be fixed that are not broken.

10. Expense Claim Fraud. This often happens in large companies where employees will pocket run over business expenses for themselves. An example could be asking for money to stay in an expensive hotel when in fact they are staying in a cheap accommodation and pocketing the remainder.

11. Inventory Theft. Large companies face the issue of inventory theft when unsupervised employees steal products or order more than the store needs and take the rest for themselves. This may include “expired” food products when they are in fact not expired at all.

How does a malicious website infect your iPhone?

If you are under the impression that your iPhone is immune to malicious threats, then you are living in the past. Even though Apple iPhones are a smaller target then Android phones, it is possible to become infected by simply opening a website.

Infected websites can install malware as well as spyware on your device; from there they work in the background without you even noticing it is there!


The consequences of your device being infected can be serious, all your passwords, messages, call history, photos, etc. can be compromised, so always be sure to exercise caution.

Here’s how to avoid infecting your Apple iPhone with malicious malware…

- Make sure you regularly update your phone and ensure it is running the latest version of iOS. Always download all the updates as soon as they become available. Developers fix the issues that cybercriminals take advantage of in all the latest versions.

- Never click on links in ads, emails or messages, like SMSs from someone you do not know! You should always be extra careful. Always double-check with the sender. If in doubt, it’s best not to open it at all.

Unfortunately, there are no full-fledged antivirus solutions for iOS, so always be extra cautious!

To learn more about malicious websites as well as iPhone security, please contact TCG Digital Forensics on 021 110 0422 or email contact@tcgforensics.co.za

Wednesday, 30 October 2019

What is an online charity scam?

Social media sites such as Facebook have a range of scams, one of the most recent being fake fundraising campaigns!

The scammers will make an emotional post, provide their banking details and add a couple of sad comments as well. The post will usually be a plea for help for a terminally ill child or to help an animal rescue organization.


New scamming groups appear every month, each with similar details and posts and even though they are shut down on a regular basis, people still fall for the scam and pay money to the scammers anyway.

How can you spot an online charity scam?

Age of the group. The fake charity group will only be a few weeks old and contain barely any posts, but they have been shared and reposted thousands of times. This is usually the first signs that the charity is a scam! A real organization or charity will take a long period of time to become established and there will be multiple posts as well as more information about the cause.

Pressure to feel pity. Using shocking videos and photos as well as lots of capitalized letters and exclamation points will pressurize you into acting quickly and spontaneously. A real charity will never resort to using these measures, because they are there to build relationships, on the other hand, scammers just want to raise money for themselves.

No supporting documentation. Scammer groups will have little to no medical reports or records to prove their cause or charity organization. And if they do have the documentation you should always read through it thoroughly to make sure the details are the same as the assistance they are asking for.

Responding to questions. It is not uncommon for people who are concerned about someone’s health or wellbeing to ask the people who created the group for information about the cause as well as updates on the situation. If the group is a scam these questions will be ignored, deleted or the user will be banned.

Websites. Sometimes links to a legitimate website for the charity or cause are posted in the group, this is how scammers will trick you into trusting them. This is to prove their legitimacy by showing they have a website presence. The website it links to often looks real, but be wary of inputting any of your personal information. Real charity foundations will always post how they spend the money they have collected, if not, you cannot trust that organization.


The desire to help others is great, but it is best to always stop and think first instead of acting impulsively.

For assistance and more information about online scams, please contact OSINT on 021 110 0422 or email contact@osint.co.za

Wednesday, 23 October 2019

How to protect yourself from Catfishing

With the increase in social interactions being done online, there has been an increase in relationships that are being built over social media networks as well as apps such as Tinder, etc. Did you know that a recent study showed that 1 in 5 relationships began online?

If things continue like this then by the year 2040, almost 70% of people in the world will meet their significant other online via a social media network or an app!

Because everything is online these days, scammers have taken advantage of this opportunity to con those who are looking for love online. Catfishing is an online scam where someone creates a fake online identity for the purpose of starting a fake relationship and usually scamming people out of their money over a period of time.


Are you dating online or thinking about dating online?

The person is too good to be true – 

They are extremely rich, attractive and glamourous.

The relationship is moving unnaturally fast – 

They profess their undying love for you unusually early and try to rush the relationship along.

They can never meet you in person – 

They claim they are always on the road or something always comes up so they can never meet you in person.

Their social media presence is very vague – 

They have few friends and barely any photos and the photos they do have all look as if they may have been stolen.

Never give money out to someone you’ve met on the internet, even if you feel that you can trust them, do not let someone play on your desire for love!

Wednesday, 16 October 2019

How to Protect your Smartphone from Spyware!

Your cell phone is an important part of your everyday life. I mean, we basically need our phones for just about everything from work and play to storing personal info and data. This is why smartphones have become one of the main targets for spyware!


How can spyware harm you?

Once spyware is installed on your phone, it will track all your movements as well as your internet use so it can target you with the appropriate advertisements. It is frightening to think that this could happen to you, but luckily this spyware rarely affects you or your information too seriously.

However, there are other, more dangerous types of spyware that you should worry about! These programs are created to gather your personal information to use for identity theft or even spy on you directly by gaining access to your smartphone camera or microphone. Because we use our mobile phones for just about everything these days, spyware is and will still become more widespread in the future.

Here’s how to protect your smartphone from spyware:

Do not install any third-party software on your phone. The only apps you should be downloading are ones from official channels such as the App Store or Google Play. Third-party apps are full of malware, including spyware, however, even some apps that make it onto the stores can have spyware.

ALWAYS check app permissions before you install an app. An app that is used for navigation will obviously need access to your location, but should a game app ask for permissions and it seems a bit odd; do not download it all together!

Be cautious of attachments, links and open Wi-Fi connections. Just like when you use your computer hackers can use all these to install spyware on your phone. Never connect to an open Wi-Fi connection; never open an email attachment as well as a link if you do not know where it was sent from.

Be prepared and protect your phone. All these rules won’t mean much if you do not have the proper protection. Always install antivirus software on your device as well as install all the latest mobile operating system updates that are available.

Take the time to protect your mobile device properly, this way you can effectively protect your identity, personal information and finances.

Have you been the victim of spyware? Please contact us on 021 110 0422 or email contact@tcgcape.co.za

Wednesday, 9 October 2019

Smishing Scams – Serious Fraud with a Silly Name!

Smishing attacks aim to gain access to your private information by using SMSs to target victims. Smishing is becoming an emerging threat that continues to grow over the years. Why? Because mobile banking is becoming more and more commonly used these days.


Here’s how smishing attacks work:

- You will receive an SMS that seems legitimately from a popular bank or organisation asking you to contact them on a number or click on a link.

- Once you contact them or click the link you will be asked to give out your personal information such as your account number, password or PIN.

- The scammers now have access to your accounts, etc. and can do with them what they wish.

In this day and age, people use their smartphones for basically everything, including online banking. There is a lot of private information at risk if your phone is exposed to a scammer.

Here’s how to identify a smishing scam:

- You are SMSed and asked to confirm your private details such as your bank account number, PIN or password. A legitimate bank will never ask for this over an SMS. The best thing to do is call your bank or the organisation directly to double-check the SMS is actually from them and the information is not fake.

- There is a sense of urgency such as if you do not confirm your account your bank account will be closed or you will receive an SMS with a link that you need to click on in order to make an urgent outstanding payment.

- The SMSs are usually from a strange, unknown, toll-free number and the grammar is usually bad or doesn’t make sense.

- Always remember that your bank will never ask for your private details over the phone!

It only takes one bad SMS to compromise your overall security! Use a little common sense and caution to ensure that you don’t become the next victim of smishing.


Contact our OSINT (Open-Source Intelligence) Department on 021 110 0422 or email contact@osint.co.za to learn more about smishing as well as our other services. 

Wednesday, 2 October 2019

What is an Online Shopping Scam?

An online shopping scam will usually include a scammer using a fake website or fake social media account/ store to trick you into buying something from them. The scam will usually also involve using fake adverts to try and lure victims in.


A scammer will try and use unbelievable deals and services such as shipping overnight and free delivery to trick victims into not thinking twice and just acting on instinct.

The goods that the scammer is offering are usually fake or you just never receive them. They will often ask you not to pay by card, but to use an EFT payment, gift card or cryptocurrency.

Not only that, but a scammer will try and trick you into giving out your personal information, such as your bank information, by asking you to fill in a form to finish the order or to sign-up.

Online shopping scams continue to increase every year, here’s how to spot and online shopping scam:

- You receive an email from an online store, but you cannot find any info about them such as their website and the link to the limited deal or offer looks fake.

- The deal is almost unbelievable and it is offered at an incredibly low price.

- There are other amazing services included such as free shipping and delivery overnight.

- The deal on offer always has a time limit.

- You are asked not to use your credit card to make the payment, but to rather pay using EFT, gift card or cryptocurrencies.

- If the online shop is on a social media network then there are almost no details or reviews that you can reference.

- You cannot find direct contact numbers on the website or no one responds to your enquiries.

- The online store website has noticeable spelling errors and does not look professional.

Always remember that if it looks too good to be true then it probably is!

Wednesday, 25 September 2019

4 Scams in South Africa that are on the Rise

It is vital that you do not fall into an online scammers trap, especially recently as online scams have been on the rise in South Africa.

Here are the most common signs of these four popular online scams that you need to be aware of in order to not become the next victim.


Online Goods. Scammers love to target those who are selling valuables online. They may tell you that they want to meet and pick up the goods and pay via EFT. Either they will reverse the transfer once they have received the goods or they will send you fake proof of payment.

Always meet in a safe, public environment and rather accept payments in cash only.

Account Information. If you receive an email or SMS from your bank claiming that your account number or information has been changed, be very wary! A lot of people fall for this and end up paying a scammer for absolutely nothing, believing that it is a legitimate message from their bank.

If you receive messages like this, rather contact your bank to double-check that it is real.

Phone Blocking. Similar to other scams where you unknowingly give out your private information, a scammer will block your phone so you cannot see that they are withdrawing your money. This means you can’t take the correct steps to stop the scam because you do not realise it is happening.

Fake Loans. If you apply for a loan online be aware of fake companies. They are easy to spot because they will approve your loan, regardless of the amount you request, however, there will be an initiation fee to get the loan.

Do not ever pay a fee in order to receive a loan!

Have you been the victim of a scam? Please contact our OSINT (Open-Source Intelligence) department on 021 110 0422 or email contact@osint.co.za

Wednesday, 18 September 2019

Social Media Safety – Facebook

With the rise of social media came the rise of private information becoming accessible to just about anyone who knows how to use the internet!

With the right safety precautions you can still enjoy Facebook and other social media networks, but always make sure to use these safety tips.


Make sure your password is secure

With all your personal information exposed on Facebook, it can be easy for someone to guess your password. A good password should have a mixture of upper and lower case letters, numbers and special characters.

Don’t friend people you don’t know

If you don’t know who they are why would you become friends with them? It may seem innocent, but cybercriminals often use fake profiles to send out spam and even steal your personal info.

Protect your location

While it may seem fun to share a photo of yourself and then add your location, it has some hidden risks. Potential criminals can easily see whether you are home or not, allowing them to take advantage and break in. Another danger you could face includes stalkers!

Change who can see your personal information

Have you listed your address and phone number on Facebook? It may seem handy to do so, but you don’t want everyone seeing this information. For maximum privacy, make sure to set these to be “me only” or choose who gets to see what.

NEVER overshare

The best way to be safe? Have some common sense! Be sure that what you’re posting online will not compromise your safety. Did you know that a deleted photo will remain on the Facebook servers for months after it is gone? It is harder to retract information, so simply do not share it in the first place!

It’s better to be safe than sorry, so go ahead and use these safety tips!

Need help with your social media security? Contact our Digital Forensics department on 021 110 0422 or email contact@tcgforensics.co.za

Wednesday, 11 September 2019

What’s doable in an Audio Investigation?

Audio forensics and investigations are defined as the field of digital forensics that is related to the acquisition, analysis, and evaluation of sound recordings. The results of an audio investigation are usually presented as evidence in court cases, whether they come from a criminal investigation or part of an official inquiry.


We spoke to Sound Engineer, Kiana Schulla Pronk, to find out all there is to know about what is doable in an audio investigation.

I was born and raised in Cape Town, South Africa. After becoming involved in the music scene in my high school years, I attended City Varsity School of Media and Creative Arts in Cape Town (CBD) 2016 - 2017. I completed a 2-year Diploma in Sound Engineering and graduated in March of 2018.

This institution had the resources to train us and give us the tools to become an expert in the field that we study, to which I chose Sound Engineering. For 2 years, I studied full time and underwent training to become an Audio Engineer.

Within the two years of studying at this institution. We learned the basics of the broad spectrum, categorising it into a few sectors – all with sound-based, but different processes. Our different categories would differ between Live Sound (concerts), Film Audio Engineer, Mastering and Production, Composition and Post Production.

Where I felt my strengths were was in the post-production sector, analysing audio, as well as cleaning ‘noisy’ audio as well as the Sound Design sector.

I am proficient in DAW Systems such as Pro Tools, Cubase and Reason Rewire. Frequency hearing tests and analysing sound on various frequencies were part of my training.  

Since the year 2018, I have been assisting various companies with audio analysis, identification, and comparison. Additionally, I have been doing my training with the company TCG Digital Forensics and educating myself with software systems such as Praat & Diamond Cut Forensics Audio Lab to assist in finding, analysing and recording evidence that is relevant to a case.

In analysing Audio with the above-mentioned software, we have the tools to:

Forensics Audio Authentication, Voice-Printing & Formant Analysis
File Transcription / Time Expansion / Speed and/or Pitch Change
Audio Restoration & Enhancement
Audio Editing & Voice Garbling / Voice Disguising
Audio & Acoustical Measurements
Audio File Format Conversions
Statistical Measurement Tools


Any piece of audio recording can be looked at and with the information on how the audio piece is recorded, can already give investigators hints/tip offs in disciplinary hearings or official court cases.

I am currently rendering services to: 

Company Name: TCG Digital Forensics (Craig Pedersen)
Location: 32 Woodbridge Business park, 452 Koeberg Road, Milnerton, 7441
Tel: +27 21 110 0422 | Mobile: +27 79 691 0138
Email: contact@tcgforensics.co.za
Website:  www.tcgforensics.co.za  

Company Name: TSU International – K&E Division (Adv Herman Bosman)
Location: 17 Main Road, Strand, 7140
Tel: +27 21 492 5951 / Mobile: +27 82 857 6096
Email: k.e1@tsuint.com
Website:  www.tsuint.com

Wednesday, 4 September 2019

The most popular Online Scams that everyone is falling for

As the internet expands so do the online scams and how sophisticated they are becoming.


What online scams all have in common is that they prey on your fear, greed, and ignorance – here are some of the most sophisticated online scams on the internet that everyone seems to fall for.

Phishing – One of the most popular scams out there is email phishing. Victims of phishing scams will be tricked into giving out their passwords through legitimate emails and seemingly trustworthy businesses. According to a recent study, nearly 100 000 attempts of phishing are reported each month.
Learn more about phishing scams here.

The Nigerian Prince Scam – One of the oldest online scams in the books is the Nigerian prince scam. You’ll receive an email from a Nigerian prince or investor offering you a chance of financial gain, the catch is you need to pay a small portion upfront or give out your private banking information.

Ticket Fraud – Victims of the ticket fraud scam will be tricked into buying fake tickets for popular sporting events, concerts, and other events. Often, the tickets will have forged barcode or be duplicates, while other times you’ll pay and never receive any tickets. Learn more about ticket scams here.


Celebrity Impersonators – Similar to phishing, online scammers sometimes like to pretend to be celebrities or influencers. The scam usually involves messaging victims and promising “gifts” if they click on a link.

Ransomware – Some of the worst scams involve ransomware. Hackers will install malware on your computer that blocks you from accessing your files, from there payment is demanded, often Bitcoin, in order for you to unblock your personal files.

GoFundMe Fakes – Another thriving online scam is using crowdfunding websites to take advantage of people’s generosity and can them into donating money for a fake fund.

Some of the most elaborate and sophisticated scams are doing the rounds on the internet right now, so always be on the lookout and use your common sense!

Want to know more about online scams as well as more about our Digital Forensics and OSINT (Open Source Intelligence) services? Contact us on 021 110 0422 or email contact@osint.co.za | www.contact@tcgforensics.co.za. Alternatively, take a look at our website www.tcgforensics.co.za | www.osint.co.za 

Wednesday, 28 August 2019

What is Ethical Hacking?

Ethical hacking, sometimes known as white hat hacking is when a digital forensics expert or OSINT investigator attempts to penetrate a computer system, network or app on behalf of the owners – with their permission. Ethical hacking is usually done to find if there is any security vulnerabilities that a hacker or cybercriminal could use to exploit someone.

The purpose of ethical hacking is to test the security of the systems involved and identify if there are any vulnerabilities in the system as well as the network or infrastructure. Investigators involved will often attempt to exploit the vulnerabilities themselves to see whether malicious activities are possible.


Black hat hackers are the unethical counterpart of ethical hackers. Rather than take advantage, ethical hackers will use their skills to document if there are any weaknesses in the systems and give advice on how to fix them and then strengthen their overall security systems.

Here are some ways ethical hacking done by digital forensics experts involve in OSINT (Open Source Intelligence) can help businesses and organisations:

1. Finding Vulnerabilities: By using ethical hacking you can discover if the IT security measures are working properly as well as whether they need to be updated. A business can use the advice from ethical hackers and improve their overall security to stay safe from cyber-attacks, including online scams and fraud.

2. Demonstrate Cybercrime Methods: These demonstrations can help show users how malicious hackers will attach their systems and create disasters for businesses. Those who have an in-depth knowledge of this are better able to prevent it from happening again in the future.

3. Prepare for a Cyber-attack: The one way to destroy a business is a cyber-attack, especially small businesses, but businesses are still not prepared! Ethical hackers know how cybercriminals work so they can assist businesses and business owners with prepare for the future and better adapt to online threats.

Some say that hacking is hacking, but ethical hacking is done by professionals to assist businesses and organisations with their security systems and ensure they are effective and successful.

Is your security system up to par? Contact the OSINT or digital forensics department on 021 110 0422 or email contact@osint.co.za | contact@tcgforensics.co.za. Alternatively, you can find out more on the website www.osint.co.za | www.tcgforensics.co.za

Wednesday, 21 August 2019

How can a Digital Device be involved in a Cyber Crime?

In this day and age, it is so easy for criminals to use a digital device to carry out a traditional crime.


A traditional crime such as blackmail which, back in the day, would usually be done using newspaper cuttings collaged together to create a ransom note is now being done in a completely different way using the power of digital devices as well as the internet.

These days, it is so much easier for criminals to just use a computer to carry out a range of crimes such as, blackmail, identity theft, social media scams, ticket scams, dating bots, data theft and so much more.

Some examples of other traditional crimes where a digital device can be used include instant messaging, which is often used to commit harassment. Criminals also continue to pose as your bank where they will SMS you and try to scam you into paying fake accounts, etc.

Email is also used by cybercriminals on a regular basis to commit fraud by using phishing scams. It seems that the list is endless and so is the workload of digital forensics investigators as well as those dealing with Open Source Intelligence! Want to know more about our digital forensics and OSINT services? Please contact us on 021 110 0422, email contact@tcgforensics.co.za | contact@osint.co.za.

In the TCG Digital Forensics and OSINT department, we combine the experience of seasoned investigators with the latest technologies to achieve the results that you require. Contact us today!

Wednesday, 7 August 2019

Using OSINT to Detect and Prevent Online Fraud!

These days most of our purchases these days are being made online. You can buy everything online from clothing, a new car, groceries and so much more.


Unfortunately, because of this, there is a rise in the amount of online fraud occurring. Find out about our OSINT services and how you can be safe and secure online.

All across the internet fraud and illegal activities are continuously growing and those who are involved in manufacturing, insurance industries and finances are experiencing an even higher increase of fraud, leading to significant financial loss.

Did you know that it is estimated that 2% of the world’s total current output comes from illegal activity online?

It’s time to fight fraud with open-source intelligence!

Every business or organization knows that it is vital to prevent fraud in order to keep your company healthy and successful.

However, most only think it is necessary to monitor the internal data, but this is only a small fraction of the amount of information available online. In order for you and your business to fight against online fraud, it is important to consider OSINT services.

The primary factor of using our OSINT services is to discover important data that a regular person cannot find on an ordinary search on Google. Why? Because most illegal online activities happen on the deep or dark web.

Are you ready to fight online fraud? Please contact our OSINT division on 021 110 0422 or email contact@osint.co.za if you’d like to find out more or schedule a meeting! Alternatively you can contact our digital forensics department on contact@tcgforensics.co.za

Wednesday, 31 July 2019

Is it Real? 4 Ways to Identify a Fake Degree Certificate

It is shocking to discover how many fake degrees are actually out there and they are becoming a massive global problem! Buying a fake degree certificate is only a small part of the problem; those who already have degrees are also faking their academic transcripts and adding or altering their qualifications on their CVs.

Related image

Fake credentials such as fake degree certificates are a growing issue in South Africa. Just a year or two ago the country had a large increase in the number or fraudulent qualifications reported and those were just the fake credentials reported, the real number is probably through the roof.

As a business or university,  it can be worrying, who amongst your employees was actually telling the truth about their qualifications?

Here’s how you can identify if it is a fake degree certificate.

DESIGN

Always inspect the design of the degree and be aware that a genuine certificate will be embossed with a watermark visible under a light. The signature should also not be printed but written in ink without any silly spelling mistakes.

LANGUAGE

The language and grammar on a degree certificate should always be studied thoroughly. There should be no spelling errors or incorrect order of words such as “Cape Town University” instead of “The University of Cape Town.”

LOCATION

Always double check the location of the university to confirm that it is a genuine institute. By using Google maps you’ll be able to locate the address provided and spot any fake universities.

TRUST THE PROFESSIONALS

By simply following the steps provided you’ll be saving yourself a lot of hassles in the long run. 

Should you need some assistance please do not hesitate to contact our OSINT department about our Due Diligence processes on 021 110 0422 or email contact@osint.co.za. Alternatively, you can email chris@tcgforensics.co.za for more details on how our pre-employment due diligence can help YOU get the right candidate!

Monday, 29 July 2019

Are you Flirting with a Dating Bot?

Guess what, dating bots are a real thing and falling for one is easier than you think.


Online dating is supposed to be fun and convenient, you get to chat with new, fascinating people that could potentially turn into love interests plus it takes away that first-date awkwardness.

But it’s never that simple.

Dating online has many pitfalls including dating bots that clog almost all the online dating sites you use. Did you know that almost 60% of traffic online is generated by bots? This includes dating websites and social media sites.

Online dating bots are specifically designed to chat with you and trick you into paying membership fees on dating websites; they can even trick you into giving out your private information such as your banking details.

Here’s how to recognize a dating bot:
  • Their profile picture is a professional glamour shot.
  • They profess their undying love for you a day or two after chatting.
  • They make promises to meet you in person, but something always comes up.
  • They ask you for money for things such as emergency medical bills, travel expenses, etc.

It is important that you know that there is a difference between dating bots and malicious scammers. A scammer is a cybercriminal who wants to steal your money and possibly your personal information, but a dating bot is an automated computer script.

Are you flirting with a dating bot? Here are some signs to look out for:
  • They have automated scripts so they will respond to your messages really fast.
  • They don’t respond directly to you if you ask a specific question instead, they’ll respond with a series of lines.
  • They don’t have mutual friends or interests.
  • They immediately encourage you to visit a specific site or share your personal information with them.
Despite all the negatives about online dating, in this day and age online dating is a great way to meet new people and possibly find your perfect companion.


If you think you’ve been scammed, contact OSINT immediately on 021 110 0422 or email contact@osint.co.za.

Friday, 26 July 2019

What are Online Ticket Scams?

Online ticket scammers usually target various, popular events or destinations to try and take advantage or all the people who are desperately rushing and searching for tickets for buy.


Fake tickets for various events include:

- Concerts
- Conferences
- Plays
- Sporting events
- Live performances
- Shows
- Flight or train tickets
- Other special events


In general, all the tickets that these scammers sell are completely fake. Other times the tickets don’t exist, to begin with, so you pay but never receive anything.

Since 2015 online ticket scams have been increasing and occurring more often. Scammers have been having a field day because of all the popular shows and events that are happening these days.

Here are some tell-tale signs to lookout for:

- The prices are much higher than the regular ticket price OR the prices are suspiciously low.

- Before you buy tickets from a website, always check the contact details to make sure it’s legitimate.
- If the website URL doesn’t include “https” you’re most likely dealing with a scammer.

- If the seller requests a very specific payment for the ticket such as cash, a gift card or cryptocurrency, it’s most likely a scam.

- If they’re selling the tickets on social media, the language is stilted and it seems English isn’t their first language.

- Their social media profile includes no details, all their posts were made a couple of days ago and their friends were all recently added.

And obviously, if it feels like it is too good to be true then it probably is!


If you paid for fake tickets, contact OSINT immediately on 021 110 0422 or email contact@osint.co.za. And we will do everything we can to assist you in getting your money back and catching the scammers!

Thursday, 25 July 2019

How to spot a Social Media Scam

Social media has made it possible for people to interact with each other from all over the world – everyone knows what everyone else is doing, where they’re going on vacation, when they got married, etc.


However, social media networks have also made it possible for more users to become victims of scams. Over the last few years, social media scams have basically quadrupled with fake accounts popping up everywhere.

Don’t become the next victim of a scam – here’s how to spot, prevent and deal with social media scams:

- There is an ad or poster offering an amazing deal or job that sounds too good to be true.
- A job, prize or loan application asks you to pay upfront beforehand.
- A popular company uses a Yahoo or Gmail email account to contact you.
- You are urged to act immediately!
- They ask you to share your private information.
- You get a friend request from a “friend” but they ask you random questions or for money.


How to prevent social media scams from happening:

- Preventing social media scams is easy; all you have to do is use your common sense!
- Always think before you click on something.
- If it sounds dodgy or overly intrusive, ignore it.
- Never share your personal information on social media sites.
- Be wary when it comes to loan scams – here are the red flags to look out for.
- Never agree to pay for something upfront without being certain that it’s legitimate.
- Go through your social media privacy settings on a regular basis to ensure they haven’t changed.
- Never post any personal information about yourself that can be stolen and used to steal your identity.


If you’re a victim, here’s what to do:

- Shut down your computer and use a different device to change all your passwords immediately.
- Put out a fraud alert on your credit to stop any loans or lines of credit the scammer may try to take out.
- Call our OSINT division for professional assistance: 021 110 0422 | contact@osint.co.za
- Tell your friends so that they know about the scam and can avoid it if it pops up on their social media feeds.

Do not let the social media scammers bait and hook you – always be safe online!

Tuesday, 23 July 2019

Use Facebook more safely with these 5 Security Tips

Facebook is an awesome way to stay in touch with your friends and family members, however, you need to remember to always be careful about the private information your reveal because it might end up in the wrong hands!


These days a range of financial scams can be used to try and steal your money, one of them is cybercriminals making fake Facebook profiles and sending friend requests in order to gain your personal information.

This is why it is vital to be careful when you are using Facebook as well as any other social media network.

Here are 5 important Facebook security tips:

1. Always verify all Facebook contacts. Make sure that you are actually talking to the person you think you’re talking to and not a criminal trying to gain your personal information or money.

2. Protect your financial information. Never tell anyone about your private banking details such as your bank account details, credit card numbers and passwords or any other financial data on Facebook.

3. Be suspicious of strangers. Never add or accept any friend requests from people that you do not know.

4. Keep your password a secret. Always take extra care about the password you choose as it is one of the most vital parts of your Facebook security.

- Use a complicated password that is at least 12 characters and consists of upper and lower case letters, a number and special symbol.
- Remember to change your password on a regular basis.
- Never use the same passwords for all your accounts.

5. Secure all your devices. Make sure to install anti-malware software on your computer, laptop, smartphone, tablet – whatever devices you use – to ensure that everything is protected from viruses as well as any other threats.

Need assistance with your Facebook security? Have you been the victim on Facebook? Please contact our OSINT (Open-Source Intelligence) Division on 021 110 0422 or email contact@osint.co.za | www.osint.co.za

Monday, 22 July 2019

The Threats and Dangers on the Dark Web

The internet is an endless place with millions of websites, databases and servers. The visible sites that can be found when you Google something are just the tip of the iceberg.

            

Below the surface is the deep web and the dark web. It was once only available to hackers, criminals and law enforcement, but now because of new technologies it is possible for just about anyone to access the dark web!

Did you know – The deep and dark web is so large that it accounts for 90% of all websites!

Those who wish to access the dark web or the deep web need to use Tor, a browser software like Google, but the difference is Tor uses “nodes”, a random path of encrypted servers to connect users to the dark web without their tracks being followed.

Websites on the dark web also use the Tor software to remain unnamed so you won’t be able to find out who has created them, who is running them or who is hosting them.

Many people actually use Tor as a regular browser to search the surface web as well as the dark web. Why? Because they refer their search history to remain hidden from the government and their internet service providers.

But using Tor comes with a negative side as cyber criminals and hackers also prefer to use it.


For some people the deep web and the dark web is convenient when it comes to finding series and movies that may not be available in their areas yet, while others go a bit deeper to download music and movies that aren’t even in cinemas yet. However at the deep, dark end of the internet you’ll find some scary and strange things.

Things like credit card data, fake identity documents, passports and even professional hitman services are available on the dark web. Illegal substances are one of the most popular items to buy on the dark web – learn more about the drug marketplace, the Silk Road here.

Thanks to a range of tools such as encryption and anonymization, there is little to no law enforcement down in the deep and dark web. This means that many materials such as “adult” content that will give you nightmares can be found there.

If you do choose to go deep into the dark web always make sure to restrict access to your device so that children do not have the ability to accidentally stumble across it. Should you visit the dark web or the deep web, always remember to be careful and tread lightly, you never know what you might find down there!


Should you need any of our OSINT (Open-Source Intelligence) services please do not hesitate to contact us on 021 110 0422 or email contact@osint.co.za.