Wednesday, 18 September 2019

Social Media Safety – Facebook

With the rise of social media came the rise of private information becoming accessible to just about anyone who knows how to use the internet!

With the right safety precautions you can still enjoy Facebook and other social media networks, but always make sure to use these safety tips.


Make sure your password is secure

With all your personal information exposed on Facebook, it can be easy for someone to guess your password. A good password should have a mixture of upper and lower case letters, numbers and special characters.

Don’t friend people you don’t know

If you don’t know who they are why would you become friends with them? It may seem innocent, but cybercriminals often use fake profiles to send out spam and even steal your personal info.

Protect your location

While it may seem fun to share a photo of yourself and then add your location, it has some hidden risks. Potential criminals can easily see whether you are home or not, allowing them to take advantage and break in. Another danger you could face includes stalkers!

Change who can see your personal information

Have you listed your address and phone number on Facebook? It may seem handy to do so, but you don’t want everyone seeing this information. For maximum privacy, make sure to set these to be “me only” or choose who gets to see what.

NEVER overshare

The best way to be safe? Have some common sense! Be sure that what you’re posting online will not compromise your safety. Did you know that a deleted photo will remain on the Facebook servers for months after it is gone? It is harder to retract information, so simply do not share it in the first place!

It’s better to be safe than sorry, so go ahead and use these safety tips!

Need help with your social media security? Contact our Digital Forensics department on 021 110 0422 or email contact@tcgforensics.co.za

Wednesday, 11 September 2019

What’s doable in an Audio Investigation?

Audio forensics and investigations are defined as the field of digital forensics that is related to the acquisition, analysis, and evaluation of sound recordings. The results of an audio investigation are usually presented as evidence in court cases, whether they come from a criminal investigation or part of an official inquiry.


We spoke to Sound Engineer, Kiana Schulla Pronk, to find out all there is to know about what is doable in an audio investigation.

I was born and raised in Cape Town, South Africa. After becoming involved in the music scene in my high school years, I attended City Varsity School of Media and Creative Arts in Cape Town (CBD) 2016 - 2017. I completed a 2-year Diploma in Sound Engineering and graduated in March of 2018.

This institution had the resources to train us and give us the tools to become an expert in the field that we study, to which I chose Sound Engineering. For 2 years, I studied full time and underwent training to become an Audio Engineer.

Within the two years of studying at this institution. We learned the basics of the broad spectrum, categorising it into a few sectors – all with sound-based, but different processes. Our different categories would differ between Live Sound (concerts), Film Audio Engineer, Mastering and Production, Composition and Post Production.

Where I felt my strengths were was in the post-production sector, analysing audio, as well as cleaning ‘noisy’ audio as well as the Sound Design sector.

I am proficient in DAW Systems such as Pro Tools, Cubase and Reason Rewire. Frequency hearing tests and analysing sound on various frequencies were part of my training.  

Since the year 2018, I have been assisting various companies with audio analysis, identification, and comparison. Additionally, I have been doing my training with the company TCG Digital Forensics and educating myself with software systems such as Praat & Diamond Cut Forensics Audio Lab to assist in finding, analysing and recording evidence that is relevant to a case.

In analysing Audio with the above-mentioned software, we have the tools to:

Forensics Audio Authentication, Voice-Printing & Formant Analysis
File Transcription / Time Expansion / Speed and/or Pitch Change
Audio Restoration & Enhancement
Audio Editing & Voice Garbling / Voice Disguising
Audio & Acoustical Measurements
Audio File Format Conversions
Statistical Measurement Tools


Any piece of audio recording can be looked at and with the information on how the audio piece is recorded, can already give investigators hints/tip offs in disciplinary hearings or official court cases.

I am currently rendering services to: 

Company Name: TCG Digital Forensics (Craig Pedersen)
Location: 32 Woodbridge Business park, 452 Koeberg Road, Milnerton, 7441
Tel: +27 21 110 0422 | Mobile: +27 79 691 0138
Email: contact@tcgforensics.co.za
Website:  www.tcgforensics.co.za  

Company Name: TSU International – K&E Division (Adv Herman Bosman)
Location: 17 Main Road, Strand, 7140
Tel: +27 21 492 5951 / Mobile: +27 82 857 6096
Email: k.e1@tsuint.com
Website:  www.tsuint.com

Wednesday, 4 September 2019

The most popular Online Scams that everyone is falling for

As the internet expands so do the online scams and how sophisticated they are becoming.


What online scams all have in common is that they prey on your fear, greed, and ignorance – here are some of the most sophisticated online scams on the internet that everyone seems to fall for.

Phishing – One of the most popular scams out there is email phishing. Victims of phishing scams will be tricked into giving out their passwords through legitimate emails and seemingly trustworthy businesses. According to a recent study, nearly 100 000 attempts of phishing are reported each month.
Learn more about phishing scams here.

The Nigerian Prince Scam – One of the oldest online scams in the books is the Nigerian prince scam. You’ll receive an email from a Nigerian prince or investor offering you a chance of financial gain, the catch is you need to pay a small portion upfront or give out your private banking information.

Ticket Fraud – Victims of the ticket fraud scam will be tricked into buying fake tickets for popular sporting events, concerts, and other events. Often, the tickets will have forged barcode or be duplicates, while other times you’ll pay and never receive any tickets. Learn more about ticket scams here.


Celebrity Impersonators – Similar to phishing, online scammers sometimes like to pretend to be celebrities or influencers. The scam usually involves messaging victims and promising “gifts” if they click on a link.

Ransomware – Some of the worst scams involve ransomware. Hackers will install malware on your computer that blocks you from accessing your files, from there payment is demanded, often Bitcoin, in order for you to unblock your personal files.

GoFundMe Fakes – Another thriving online scam is using crowdfunding websites to take advantage of people’s generosity and can them into donating money for a fake fund.

Some of the most elaborate and sophisticated scams are doing the rounds on the internet right now, so always be on the lookout and use your common sense!

Want to know more about online scams as well as more about our Digital Forensics and OSINT (Open Source Intelligence) services? Contact us on 021 110 0422 or email contact@osint.co.za | www.contact@tcgforensics.co.za. Alternatively, take a look at our website www.tcgforensics.co.za | www.osint.co.za 

Wednesday, 28 August 2019

What is Ethical Hacking?

Ethical hacking, sometimes known as white hat hacking is when a digital forensics expert or OSINT investigator attempts to penetrate a computer system, network or app on behalf of the owners – with their permission. Ethical hacking is usually done to find if there is any security vulnerabilities that a hacker or cybercriminal could use to exploit someone.

The purpose of ethical hacking is to test the security of the systems involved and identify if there are any vulnerabilities in the system as well as the network or infrastructure. Investigators involved will often attempt to exploit the vulnerabilities themselves to see whether malicious activities are possible.


Black hat hackers are the unethical counterpart of ethical hackers. Rather than take advantage, ethical hackers will use their skills to document if there are any weaknesses in the systems and give advice on how to fix them and then strengthen their overall security systems.

Here are some ways ethical hacking done by digital forensics experts involve in OSINT (Open Source Intelligence) can help businesses and organisations:

1. Finding Vulnerabilities: By using ethical hacking you can discover if the IT security measures are working properly as well as whether they need to be updated. A business can use the advice from ethical hackers and improve their overall security to stay safe from cyber-attacks, including online scams and fraud.

2. Demonstrate Cybercrime Methods: These demonstrations can help show users how malicious hackers will attach their systems and create disasters for businesses. Those who have an in-depth knowledge of this are better able to prevent it from happening again in the future.

3. Prepare for a Cyber-attack: The one way to destroy a business is a cyber-attack, especially small businesses, but businesses are still not prepared! Ethical hackers know how cybercriminals work so they can assist businesses and business owners with prepare for the future and better adapt to online threats.

Some say that hacking is hacking, but ethical hacking is done by professionals to assist businesses and organisations with their security systems and ensure they are effective and successful.

Is your security system up to par? Contact the OSINT or digital forensics department on 021 110 0422 or email contact@osint.co.za | contact@tcgforensics.co.za. Alternatively, you can find out more on the website www.osint.co.za | www.tcgforensics.co.za

Wednesday, 21 August 2019

How can a Digital Device be involved in a Cyber Crime?

In this day and age, it is so easy for criminals to use a digital device to carry out a traditional crime.


A traditional crime such as blackmail which, back in the day, would usually be done using newspaper cuttings collaged together to create a ransom note is now being done in a completely different way using the power of digital devices as well as the internet.

These days, it is so much easier for criminals to just use a computer to carry out a range of crimes such as, blackmail, identity theft, social media scams, ticket scams, dating bots, data theft and so much more.

Some examples of other traditional crimes where a digital device can be used include instant messaging, which is often used to commit harassment. Criminals also continue to pose as your bank where they will SMS you and try to scam you into paying fake accounts, etc.

Email is also used by cybercriminals on a regular basis to commit fraud by using phishing scams. It seems that the list is endless and so is the workload of digital forensics investigators as well as those dealing with Open Source Intelligence! Want to know more about our digital forensics and OSINT services? Please contact us on 021 110 0422, email contact@tcgforensics.co.za | contact@osint.co.za.

In the TCG Digital Forensics and OSINT department, we combine the experience of seasoned investigators with the latest technologies to achieve the results that you require. Contact us today!

Wednesday, 7 August 2019

Using OSINT to Detect and Prevent Online Fraud!

These days most of our purchases these days are being made online. You can buy everything online from clothing, a new car, groceries and so much more.


Unfortunately, because of this, there is a rise in the amount of online fraud occurring. Find out about our OSINT services and how you can be safe and secure online.

All across the internet fraud and illegal activities are continuously growing and those who are involved in manufacturing, insurance industries and finances are experiencing an even higher increase of fraud, leading to significant financial loss.

Did you know that it is estimated that 2% of the world’s total current output comes from illegal activity online?

It’s time to fight fraud with open-source intelligence!

Every business or organization knows that it is vital to prevent fraud in order to keep your company healthy and successful.

However, most only think it is necessary to monitor the internal data, but this is only a small fraction of the amount of information available online. In order for you and your business to fight against online fraud, it is important to consider OSINT services.

The primary factor of using our OSINT services is to discover important data that a regular person cannot find on an ordinary search on Google. Why? Because most illegal online activities happen on the deep or dark web.

Are you ready to fight online fraud? Please contact our OSINT division on 021 110 0422 or email contact@osint.co.za if you’d like to find out more or schedule a meeting! Alternatively you can contact our digital forensics department on contact@tcgforensics.co.za

Wednesday, 31 July 2019

Is it Real? 4 Ways to Identify a Fake Degree Certificate

It is shocking to discover how many fake degrees are actually out there and they are becoming a massive global problem! Buying a fake degree certificate is only a small part of the problem; those who already have degrees are also faking their academic transcripts and adding or altering their qualifications on their CVs.

Related image

Fake credentials such as fake degree certificates are a growing issue in South Africa. Just a year or two ago the country had a large increase in the number or fraudulent qualifications reported and those were just the fake credentials reported, the real number is probably through the roof.

As a business or university,  it can be worrying, who amongst your employees was actually telling the truth about their qualifications?

Here’s how you can identify if it is a fake degree certificate.

DESIGN

Always inspect the design of the degree and be aware that a genuine certificate will be embossed with a watermark visible under a light. The signature should also not be printed but written in ink without any silly spelling mistakes.

LANGUAGE

The language and grammar on a degree certificate should always be studied thoroughly. There should be no spelling errors or incorrect order of words such as “Cape Town University” instead of “The University of Cape Town.”

LOCATION

Always double check the location of the university to confirm that it is a genuine institute. By using Google maps you’ll be able to locate the address provided and spot any fake universities.

TRUST THE PROFESSIONALS

By simply following the steps provided you’ll be saving yourself a lot of hassles in the long run. 

Should you need some assistance please do not hesitate to contact our OSINT department about our Due Diligence processes on 021 110 0422 or email contact@osint.co.za. Alternatively, you can email chris@tcgforensics.co.za for more details on how our pre-employment due diligence can help YOU get the right candidate!