Use our website contact facility to send a message or instruction.

News & Updates

09/07/20
https://www.linkedin.com/posts/insuranceinvestigator_thefraudguy-crypto-covid-activity-6686581301899743232-mPcU

There seem to be swathes of (many supposedly US based) people with low numbers of connections and good job titles connecting with folks on LinkedIn.

They soon tell you how they have got through the Covid 19 crisis through forex, alternative investments or bitcoin and they can help you.

Let's work this out. They are making a fortune but they need your £500.00. Why do they need your money if they've got so much of their own?

A big clue is that the genuine companies are checkable, licensed and do not promise huge returns in a week, but the possibility of a good return over a period of time. They also don't tell you it has to be done today or else.

If you are tempted ask for their licences and certificates and send them to me. I will check them out for free as part of some research I am doing.

If you've been stung let me know.

Let's be careful out there.
14/04/20
19/02/20
Whilst Covid 19 is being used as the 'attractor' or 'scare factor' in many scams they are still based on the usual scams and those scams also continue. It is worth reading (okay essential) this easy to use guide from the Met Police. If you've read it before then why not read it again? There are also Covid 19 specific scams around 'cures' 'medication' 'Personal Protective Equipment (PPE), and investment opportunities, as well as bogus grants and payments from HMRC and others.

Have a read and I am sure you will do at least one more thing to be safer from fraud. If anyone would like a bespoke remote assessment of your main fraud risks then contact me directly via LinkedIn or my website. Let's be careful out there and look after others too.

https://www.met.police.uk/SysSiteAssets/media/downloads/central/advice/fraud/met/little-book-of-cyber-scams-2.0.pdf

19/02/20
An interesting article from the About-Fraud website where a fraud expert seems to take reasonable precautions to verify and check information he received by text and email, but still ended up out of pocket. He provides a clear and detailed explanation of what happened and his logic.

If you are in counter fraud please have a read and I'd love to hear what would you have done differently:
1. In real time?
2. With the benefit of hindsight?

Thanks for the article PJ Rohall and About Fraud

https://about-fraud.com/how-a-fraud-expert-fell-for-a-fraud-scam/



07/01/20
In 2017 I commenced a detailed intelligence based research project into cyber crime. It is still being added to. This included speaking to 10 former fraudsters and the intel they have as to what has happened, is happening and will be happening in the next 3 years.

One clear and dominant battleground is identity. So much effort has gone into ways to be more certain about identity and so much work has been done to analyse what happened and the information from victims. The trouble however is that too little time was spent on how the fraudsters planned to beat all this.

Within the next two years (or two minutes) you will see my prediction that the battle will be not about proving who you are but being able to compete with the fraudster who is better at proving he/she is you! If you are involved in counter fraud and want to know more book our cyber-crime upgrade courses coming soon in London and Manchester then contact me.

Go to our contact page
09/11/19
Those that know me well (and some who don't) may know about the detailed intelligence and research I have carried out into organised cyber fraud, how it differs from traditional organised crime, and how the two are now dangerously integrating with each other.

I have had fantastic help from industry experts, techies, former cyber criminals, hackers and others looking at other aspects of cyber crime such as human trafficking.

Having delivered specific training sessions and key note talks on the topic I am being bombarded with requests for information, slides, documents etc. which is great but, why not come along to this free event and hear the story of what I found, what is coming around the corner, and how we can collaborate to contain it?

No-one has all the answers and I don't either. I do have some unique insights though

On 5th December I am discussing cyber crime and identity fraud at Robertson & Co's winter seminar at the Old Library at Lloyds in London. the event runs from 3.00 pm to 6.00 pm and my good friend Mark Heffer will be covering internal fraud. The event is free to attend and includes a relaxed networking​ and drinks opportunity too.​​​​​​

For specific enquiries please use our contact page to message me.

To book directly on the seminar please go to the host's website:

https://info.robertsonandco.com/winter19

29/04/19

I have been researching with former bad guys into what makes them pick your specific website to attack. Most of you will probably roll up for work on Monday without having to start a recovery operation. Everything worked fine didn’t it? Or, did someone else get attacked instead by the serious bad guys.

Bearing in mind though that the typical criminal hacker waits 6-8 months after a hack finding out all about your organisation before hitting you then you might have been hacked but be blissfully unaware. The list of things they look for is not too long and a few of those are:

Slow or clunky running website – if performance isn’t a priority then security will be further down the list

Administrator uses an identifiable name – they can use that to profile the administrator and get passwords from social media and previous breaches

Out of date programs, certificates and patches – easy to exploit with up to date malware.

If you want your website to be hard to compromise rather than easy and want to stop playing Russian Roulette I am happy to share more, so we can make a criminal hacker miserable rather than you.

Enjoy the weekend and let's be careful out there