Showing posts with label digital forensic services. Show all posts
Showing posts with label digital forensic services. Show all posts

Wednesday, 6 November 2019

The Top most Common Types of Fraud!

When you become the victim of fraud, not only do you have to deal with the aftermath of someone scamming you, such as financial loss, but you also have to deal with the emotional side of it.


There are a range of different types of fraud, either way all of them can cause feelings of anger, devastation, fear and frustration. 

Do you think you have been the victim of fraud? At the TCG Forensic Division, we offer a range of digital forensic services, including fraud investigations. Please feel free to contact us on 021 110 0422 or email contact@tcgforensics.co.za to have a confidential discussion around your particular requirements.

Here are the 11 most common types of fraud to look out for…

1. Insurance Claim Fraud. People who make false claims, such as stage accidents, to receive insurance money from their insurance company. This can be a difficult type of fraud to investigate because some injuries can be difficult to medically identify and debate.  

2. Corporate Fraud. This includes fraud issues such as theft of information, such as private client information. This kind of fraud can lead to a damaged business reputation.

3. Financial Fraud. Evading tax, public corruption, healthcare fraud issues, telemarketing fraud and terrorist financing are all part of financial fraud.

4. Identity Theft. Those who are the victim of identity theft will have to look out for suspicious loan or credit card applications, strange withdrawals from bank accounts as well as using a different name to receive benefits.

5. Internet Fraud. Of course, this type of fraud always occurs online where a cybercriminal will try and take advantage with ransomware or phishing scams. Usually this includes stealing private information such as banking and login details.

6. Corporate Slip & Fall. Fraud like this is planned out by individuals in order to file a claim. People will go as far as to pretend to fall or throwing liquid on the floor in order to ensure a slip.

7. Transit Fraud. Companies who offer transportation, whether it is a bus, train or taxi, will often see fraud such as this where passengers will not seat or secure themselves properly, leading to them falling and injuring themselves on purpose.

8. Ticket Fraud. In some countries, the level of ticket fraud is significant. People will buy tickets online from a fake website; these tickets are not legitimate and have often already been used or do not exist.

9. Mechanical Fraud. This type of fraud is not common, however there are many people who fall victim to mechanics who scam their customers. Often they will be overpriced or they will request things to be fixed that are not broken.

10. Expense Claim Fraud. This often happens in large companies where employees will pocket run over business expenses for themselves. An example could be asking for money to stay in an expensive hotel when in fact they are staying in a cheap accommodation and pocketing the remainder.

11. Inventory Theft. Large companies face the issue of inventory theft when unsupervised employees steal products or order more than the store needs and take the rest for themselves. This may include “expired” food products when they are in fact not expired at all.

Wednesday, 27 February 2019

Protecting yourself from Package Tracking Scams


Scammers are creative, they seem to be coming up with new scams every week – and people always seem to fall for them!

Related image

In the past few years, large amounts of package tracking scams have popped up. The scam will include an email trying to convince you to click a link or give out your private information. Most of the time the email will advise you that there is a shipping problem and you need to take some steps to clear the package that you didn’t even know you were receiving.

Even though most of these scams are easy to spot because of their awful English spelling and grammar, some are so well done that they can be difficult to spot. Keep an eye out for these signs so you do not fall victim to a tracking scam…

- Odd URLs
- Requests to input your private information
- Requests to click a link
- Email messages starting with “Dear Customer”, etc.

NEVER give out any information about yourself and never click on links in an email, no matter how real it may look!

The bottom line is if you are not expecting a package and someone invites you to click a link to track a shipment of a brand new iPhone you never ordered – delete the message and move on!

At TCG Digital Forensics, we do all forms of digital forensics services such as cyber forensics, hacking recovery, cellular phone analysis and digital track and tracing! Give us a call on 021 110 0422 or email contact@tcgforensics.co.za to discuss your specific requirements.

Thursday, 13 December 2018

What is the Difference Between Digital Forensics and Information Security


Before we get into the differences between digital forensics and information security, let’s stop and take a look at how they are alike.

Image result for digital forensics

Both digital forensics and information security are aimed at protecting your digital data, goods and valuables as well as digital resources. People who are involved in digital forensics or information security can work in a range of industries, including private businesses and organisations. Why can people in the digital forensics and information security work in so many different industries? Because, companies know that as the world becomes more digitally dependant so does the need to keep their technology and systems properly secured. Digital forensics and information security specialists are becoming more and more popular as the demand for their skillset grows.

But, just because digital forensics and information security are both focused on digital goods and resources doesn’t mean the two are both closely associated with each other doesn’t mean they are the same.

It is best to think of digital forensics and information security as two different sides of the same thing, so the services and work that is done is very much the same, but it does have differences.

So what is the difference between digital forensics and information security? To put it into simple terms that everyone can understand, information security is about preventing and protecting against online and digital threats. On the other hand digital forensics is about the response that comes after.

Related image

Let’s look at it like this – information security is the team that executes and supports the information security system with the aim being to protect individuals and businesses against cyber threats. If information security fails to protect the users and the systems are broken, then this is where the digital forensics experts come into the picture – they will put their skills to use by singling out the threat, understanding it and trying to recover all the data that was lost and/or stolen.

At TCG Digital Forensics, we offer all our clients clean, professional and affordable digital forensics services as well as information security – all supplied by our team of skilled digital forensics experts. Do not hesitate to contact us to discuss your requirements; simply give us a call on 021 110 0422 or email contact@tcgforensics.co.za

Wednesday, 8 August 2018

11 Common Types of Fraud


When you become the victim of fraud, not only do you have to deal with the aftermath of someone scamming you, such as financial loss, but you also have to deal with the emotional side of it.

Image result for fraud

There are a range of different types of fraud, either way all of them can cause feelings of anger, devastation, fear and frustration. 

Do you think you have been the victim of fraud? At the TCG Forensic Division, we offer a range of digital forensic services, including fraud investigations. Please feel free to contact us on 087 001 0523 or email contact@tcgforensics.co.za to have a confidential discussion around your particular requirements.
Here are the 11 most common types of fraud to look out for…

1. Insurance Claim Fraud. People who make false claims, such as stage accidents, to receive insurance money from their insurance company. This can be a difficult type of fraud to investigate because some injuries can be difficult to medically identify and debate.  

2. Corporate Fraud. This includes fraud issues such as theft of information, such as private client information. This kind of fraud can lead to a damaged business reputation.

3. Financial Fraud. Evading tax, public corruption, healthcare fraud issues, telemarketing fraud and terrorist financing are all part of financial fraud.

4. Identity Theft. Those who are the victim of identity theft will have to look out for suspicious loan or credit card applications, strange withdrawals from bank accounts as well as using a different name to receive benefits.

5. Internet Fraud. Of course, this type of fraud always occurs online where a cybercriminal will try and take advantage with ransomware or phishing scams. Usually this includes stealing private information such as banking and login details.

6. Corporate Slip & Fall. Fraud like this is planned out by individuals in order to file a claim. People will go as far as to pretend to fall or throwing liquid on the floor in order to ensure a slip.

7. Transit Fraud. Companies who offer transportation, whether it is a bus, train or taxi, will often see fraud such as this where passengers will not seat or secure themselves properly, leading to them falling and injuring themselves on purpose.

8. Ticket Fraud. In some countries, the level of ticket fraud is significant. People will buy tickets online from a fake website; these tickets are not legitimate and have often already been used or do not exist.

9. Mechanical Fraud. This type of fraud is not common, however there are many people who fall victim to mechanics who scam their customers. Often they will be overpriced or they will request things to be fixed that are not broken.

10. Expense Claim Fraud. This often happens in large companies where employees will pocket run over business expenses for themselves. An example could be asking for money to stay in an expensive hotel when in fact they are staying in a cheap accommodation and pocketing the remainder.

11. Inventory Theft. Large companies face the issue of inventory theft when unsupervised employees steal products or order more than the store needs and take the rest for themselves. This may include “expired” food products when they are in fact not expired at all.

Wednesday, 11 July 2018

What is a Due Diligence Investigation & why should one be conducted?


A due diligence investigation needs to be conducted to assess the qualifications and track records of the people involved in a certain business transaction. This type of investigation needs to identify or reveal if there are any potential inconsistencies, misrepresentations, omissions or controversies.

Related image

So – why should a due diligence investigation be conducted?

Any business that is involved with IPO’s, mergers, acquisitions, joint venture, partnership deals and other business situations, should always contact an expert to discuss certain needs and assist in a professional due diligence investigation. At the TCG Digital Forensic Division in Cape Town, we offer all forms of digital forensic services, including due diligence investigations – do not hesitate to give us a call on 087 001 0523 or email contact@tcgforensics.co.za if you wish to have a confidential discussion around your particular requirements.

Our digital forensic services can bring to your attention any past dealings and behaviour which can give you an inside look into what you can expect from your business dealings in the future.

Here are some of the most important benefits of due diligence investigations….

> Reduced risk
> Minimised possible embarrassing situations
> Complete peace of mind
> Ensured reliability
> No hidden surprises
> It is a vital part of your business practice

Related image

If you fail to do a due diligence investigation, you may be inviting certain issues and even business disasters – get your due diligence investigation done and you will be able to spot and eliminate the problems.

Wednesday, 23 August 2017

The Forensic Division

Digital Forensics (cellular & computer based) requires much more than a well-developed software that can be purchased over the internet. It requires a thorough understanding of the investigative process, the law of evidence, excellent problem solving skills, a strong attention to detail as well as an appropriate background to criminal and civil investigations. 

Image result for digital forensics

We combine the experience of seasoned investigators with both criminal and civil backgrounds with the latest technologies to achieve the results that you require. 

Cellular phones all carry data on them – often more than we realize. Cellular forensics is the science of retrieving what is seen as well as what has been erased. We are able to achieve full recovery of deleted text messages, WhatsApp conversations and images.

Computers hold a wealth of information unseen. To the untrained eye, data may well be gone, deleted forever. This is however most commonly not the case.

Using state-of-the-art software and hardware processes we are able to recover e-mails, conversation threads, photographs, files and related data to show traces of what has been done when and how on computers, laptops and tablets.

Our forensic services are designed around the needs of attorneys, investigators and forensics audits, but also cover a wider scope. Some of the digital forensic and cellular forensic services we provide, in Cape Town and nationally, are:

      -          Cellular Forensics (Full profile)
      -          Data Recovery
      -          SMS Recovery
      -          Recovery of Chat History
      -          Recovery of WhatsApp History
      -          Digital Suspect Profiling
      -          Digital Image Verification
      -          Image Enhancement
      -          CCTV Footage Enhancement
      -          Password Recovery
      -          Mail Recovery


Related image


Should you require our assistance with forensic assessment of a cellular device, tablet, computer, laptop or server, please don’t hesitate to contact us at any time. Our offices are based in Cape Town; however we have reach to the rest of the country as required.

Contact The TCG Forensic Division today to discuss your requirements - call 079 691 0138 or email craig@tcgforensics.co.za

Wednesday, 21 October 2015

What is a forensic audit, and why do they require digital forensic services?

Here at DLA, some of our top clients include forensic auditors, as they require our digital forensic services for their forensic audits. But what exactly is a forensic audit and what does it mean?

Read on to explore and find out what a forensic audit is, when they are used and how they are used in court…


A forensic audit may sound like something quite exciting that you’ve probably heard on crime dramas like CSI and Law and Order, but the truth is, it is a little more boring.

A forensic audit is the process of reviewing person’s or companies financial statements to determine if they are correct and lawful. Forensic accounting is most commonly associated with tax audits, but can also be commissioned by private companies for digital forensic investigations.

So, when are forensic audits used? Forensic audits are used wherever an entity’s finances present a legal concern. For example, it is used in cased of suspected embezzlement, fraud, to investigate a spouse during divorce proceedings and so much more. This is where digital forensics comes in; our services are specifically designed to help forensic auditors in these cases.

Forensic audits are performed by a class of professionals with skills in both criminology and accounting, so they specialize in following a money trail, keeping track of fraudulent and actual balance sheets and checking for mistakes in income reports and expenditures. If they find any discrepancies, it may be the forensic auditor’s job to investigate and determine the reason for it, with the help of a digital investigator if digital evidence is needed!


How are forensic audits used in court? They are presented as evidence by a prosecutor or by a lawyer representing an interested party. Because finance is so complicated, the way a forensic auditor will describe a company’s financial position is often very precise. Because of this a prosecutor or lawyer will call an expert witness to explain the forensic audit in simpler terms in order to build a case.

Forensic audits cover a wide range of activities, and they can be a part of many different investigations, digital forensic investigations being one of them.

Wednesday, 16 September 2015

Emergency Guide: The Do’s and Do Not’s of Computer Forensic Emergencies

Read this vital guide on saving evidence in Computer Forensic Emergencies…

DO – Make detailed noted on all activities
> Collect data that would otherwise be lost by removing the power supply.
> If the device is switched on, record what is on the screen by taking photos or by making a written note of the content.
> Ensure that actions or changes made to the system are recorded. > Ask the user about the setup of the system. E.g. Passwords, usernames etc.

DO NOT – Switch on the computer
> Every time a computer is switched on data can be changed
> Make sure that the computer is switched off
> Look for activity. E.g. lights may indicate power/activity. Remove the main power source battery from laptop computers

DO – Unplug the device to ensure information cannot be overwritten
> A computer in sleep mode may be accessed remotely, allowing the alternation or deletion of files.
> Remove the power supply from the back of the computer without closing down any programs. This avoids any data being written to the hard drive with power loss.
> Remove all other connection cables leading from the computer, and make notes.

DO NOT – Continue to use the computer device
> After an incident has been established, continued usage of the computer device could prove devastating to the existing evidence.
> Deleted data can still be present on the machine, but marked as ready to over-write. Use of the computer overwrites existing data on the hard drive which could hold important evidence.

DO – Secure or seal the system in a locked cupboard or container
> By securing the computer, this can restrict any unauthorized access to the computer, which minimizes potential data loss.
> This also provides a level of protection from natural hazards or accidents that may occur around the device and cause damage to the system.

DO NOT – Let your IT department or computer specialists “have a quick look”
> Without the use of special digital forensic software and tools, tampering with the evidence can cause data to be lost or corrupt.
> Commercial “Data Recovery” software does not work for evidential purposes and could result in data loss

DO – Call us right away
DLA has grown to become a great provider of digital forensic services in Cape Town and nationwide. We pride ourselves on offering the highest quality digital forensics and delivering thorough, detailed and accurate results.  Contact us today and we can provide you with the digital evidence that you need.