Investigations are always exciting when you find a lead. You want to find out more and more. Around 2012, I was almost kidnapped at Nakumatti parking at Oasis Mall. I was following up on an investigation lead. People came in a Prado. As I approached to talk to the driver, a man opened a passenger door and started pulling me inside. A CID detective on my team pulled a pistol on the suspect. His alertness was able to save me for yet another day. I have handled so many forensic and fraud investigations. It’s so engaging to connect one dot…
Uninvited guests in the dead of the night
May 10th 2022 has become a key date in our family life. For the wrong reasons. At about 1:30 am, thugs cut through our perimeter wall fence. They were captured on the front security cameras wearing white clothes like those worn by doctors when taking care of Coronavirus patients before they proceeded to climb up and adjusted the security cameras. Some cameras are hidden in different locations including at the neighbours. They did not see them which helped us to see the entire break-in in action. The thugs can be seen walking around the compound, taking stock of everything around.…
Spyware on the rise – be careful of mobile gadget gifts
We like to gift or be gifted. Sometimes, such devices have installed spyware that monitors all your activities on the phone. Marriages have broken up as a result of one of the partners spying on the other. We have had many cases of marriage partners complaining about spying on them. One of the most outstanding cases is a woman who met a fiancée online via a Facebook networking app. The man happened to be from Uganda but had travelled to Canada for work and studies. After some good years of online dating while abroad, he returned to Uganda for an…
The cybercriminals are collaborating, what about you?
If you are a cybersecurity researcher, you have probably heard of increasing cybercrime collaborations and partnerships to fast-track skills development, increase reach and capabilities to target deep pocket prospects and advanced governments. The power is in partnerships. Different ransomware developers have partnered up to share hacking techniques, malware codes, tech infrastructure and target lists. Different hackers are trying to specialise at each phase of the hacking process. Others are focusing on footprinting and reconnaissance. They then pass on the information to another cartel to scan, and another to gain access etc which deepens their capabilities and fast tracks success. The…
Free webinar on cybersecurity hygiene to improve your security
“Our systems are very secure. We cannot be hacked. We lose 0% of our annual revenue to fraud and cybersecurity annually.” These are some of the common assurances many leaders get. However, without ongoing cybersecurity awareness efforts, and independent cybersecurity tests (both black box and white box penetration testing), such assurances may be misleading and could land the organization into disaster. If you are not yet hacked, it is because no one is interested in hacking you yet. But that does not mean that you are secure. As part of our corporate social investment, Summit Consulting in partnership with the…
Case Name 01/2021: Intellectual Property Crimes
The increasing uptake of virtual working and service delivery has created opportunities and challenges for all. For the cybercriminals, more doors and attack vectors have been opened. At Summit Consulting Ltd and the Institute of Forensics & ICT Security, we shall be highlighting some of the common cybercrime cases to watch out for. Due to client confidentiality, we shall use pseudo names and make references to international cases, where possible. In the following cybercrime series, we shall highlight actual cases with real victims. In this first case, we highlight how cybercriminals steal intellectual property and monetize it. According to the…