insert_link Business / Economics Know the most common types of bank frauds By Bank Windhoek’s Forensics Services Manager, Johnny Truter. International law states that any illegal act involving deception to obtain money from a financial institution or a bank's depositors is categorised as bank fraud. Like other fraud offences, bank fraud involves using a trick to obtain money illegally. Nowadays, fraudsters are continuously coming up with different ways to steal people’s hard-earned money. The following looks at the most common trends used […] todayFebruary 27, 2024 23
insert_link Science & Technology Phishing scams: 7 safety tips from a cybersecurity expert Phishers are crafty and their scams are always evolving. weerapatkiatdumrong Thembekile Olivia Mayayise, University of the Witwatersrand Recently, one of my acquaintances, Frank, received an email late on a Monday afternoon with the subject line, “Are you still in the office?” It appeared to come from his manager, who claimed to be stuck in a long meeting without the means to urgently purchase online gift vouchers for clients. He asked […] todayDecember 15, 2023 10
insert_link South Africa The Big Issue might have to shut down after R600,000 cyber scam By Ashraf Hendricks via GroundUp The Big Issue is battling to survive after scammers robbed it of R600,000. Photos: Ashraf Hendricks The Big Issue may have to close early next year if enough money doesn’t come in to cover the R600,000 lost in a cyber scam. “If we don’t get funds from the public now, it will kill us,” says Derek Carelse, managing director of The Big Issue. The Big Issue […] todayDecember 1, 2023 27
insert_link Press Releases When should you ignore an instruction from your boss? As organisations around the world spend even more on cybersecurity tools, cybercriminals are increasingly using a simple, yet effective ways to access organisations’ data or money through business email compromise (BEC) or CEO fraud. International security awareness organisation, KnowBe4, explains that BEC is a type of scam in which cybercriminals gain access to – or convincingly replicate – the email address of a senior staff member. They then mail a […] todayOctober 30, 2023 14