Technology Frauds

Troubled Social Media Accounts-Toolkit

Whether you're reading this on Linkedin/Facebook/Instagram/Twitter. It means both you & I have online tools to access what's published in the web-PUBLIC domain & if we happen to be...

Blockchain Forensics: The Intersection of Technology and Investigations

Blockchain forensics is the study of investigating criminal activities on the blockchain. It involves the use of analytical tools and techniques to trace, analyze,...

Cryptocurrency Forensics: The Ultimate Guide to 6 Important Aspects

Cryptocurrency forensics, also called crypto forensics or blockchain forensics, is a specialized field within digital forensics. Its main focus is investigating and analyzing transactions...

Uncovering the Challenges of IoT Forensics: 5 Critical Considerations

Internet of Things (IoT) devices have become ubiquitous in our daily lives, from smart home appliances to industrial sensors. With the increasing number of...

Man who leads the digital forensic journey of India

Fondly known as the “Digital Forensic Man of India”, Venkatesan Subramanian, founder, and Managing Director of Lab Systems talked to Indiaforensic about his journey...

API Forensics: Understanding the Importance of API Security

APIs, or Application Programming Interfaces, have become a critical component of modern software development. They allow different software applications to interact with each other,...

The Mechanics of Fraud Investigation

Nirav Modi and Mehul Choksi are household names now, but for all the wrong reasons. The issue of fraud in corporates, especially in the...

Call Center Frauds and its different variations

There have been numerous instances of call center frauds in India in past decade. These frauds have evolved with the time. Initially, these frauds...

Possible Fraud Risks for Loyalty Program

Loyalty points are equivalent to currency. They can be used for real world financial transactions ranging from retail to travel and even a slight...

Friendly Frauds is nightmare for Etailing boom

Etailing has been successfully operational since two decades and can be traced back to when Dell Computer reported multi million dollar orders taken at...

Smishing is alternate to Phishing

What is Smishing? Smishing stands for ‘SMS phishing’. Just like email phishing, SMS phishing is an attempt at a security attack in which the phone user is tricked...
error: