- Inside Southeast Asia’s scam compounds: A trafficked worker tells of fraud, coercion and tortureby Randall Hansen, Professor, Canada Research Chair in Global Migration & Director of the Global Migration Lab, University of Toronto on April 15, 2026 at 1:04 pm
Not all victims of scam compounds are unwilling —and that’s what makes the system so hard to dismantle.
- Fake QR codes make for easy scams – be careful what you scan out thereby Meena Jha, Head Technology and Pedagogy Cluster CML-NET, CQUniversity Australia on April 9, 2026 at 1:07 am
QR codes are so familiar and widespread, we tend to trust them without question. That’s exactly what scammers rely on.
- From joyrides to assault, ‘crimefluencer’ networks are coercing young people into breaking the lawby Xanthe Weston, Criminologist, CQUniversity Australia on April 8, 2026 at 4:00 am
Young people are being coerced into performing violent acts on themselves, family members or their pets, with vision of these crimes often shared online.
- Human traffickers are using football dreams to lure young Ghanaian men to Nigeria – how to stop itby Suleman Lazarus, Visiting Fellow, Mannheim Centre for Criminology, London School of Economics and Political Science on March 15, 2026 at 8:10 am
Intra-African trafficking, particularly through digital deception and aspirational manipulation, remains largely invisible.
- Afrobeats celebrates cybercrime and it’s becoming a global problemby Suleman Lazarus, Visiting Fellow, Mannheim Centre for Criminology, London School of Economics and Political Science on March 12, 2026 at 3:01 pm
Some Afrobeats songs use moral language that softens and normalises cybercrime.
- Crime is no longer just a local issue – that’s why a national police force is neededby Estelle Marks, Assistant Professor in Criminology, University of Sussex; King’s College London on February 2, 2026 at 4:33 pm
Even crime we think of as ‘local’ can exploit force boundaries.
- Ransomware: what it is and why it’s your problemby Thembekile Olivia Mayayise, Senior Lecturer, University of the Witwatersrand on January 18, 2026 at 5:57 am
Ransomware is a growing threat on the continent. There are a number of steps companies can take to combat it.
- Forensic linguistics: how dark web criminals give themselves away with their languageby Emily Chiang, Research Associate, Aston Institute for Forensic Linguistics, Aston University on November 14, 2025 at 4:59 pm
Unmasking dark web criminals isn’t easy, but researchers are figuring out how to use their own language against them.
- Online age checking is creating a treasure trove of data for hackersby Mark Tsagas, Senior Lecturer in Law, Cybercrime & AI Ethics, University of East London on November 11, 2025 at 5:19 pm
Selfies with passports or drivers’ licences can open users to sophisticated forms of fraud.
- As long as the cybercriminals’ business model works, companies are vulnerable to attackby Ayman El Hajjar, Senior Lecturer & Head of the Cyber Security Research Group, University of Westminster on October 7, 2025 at 3:46 pm
Cybercrime is now a service that crooks can pay for to target businesses for extortion.
- Tanzania’s social media clampdown and the elections – what’s at riskby Leah Mwainyekule, Lecturer, University of Westminster on September 25, 2025 at 1:36 pm
Tanzania favours information control over transparency and accountability.
- What are ShinyHunters, the hackers that attacked Google? Should we all be worried?by Jennifer Medbury, Lecturer in Intelligence and Security, Edith Cowan University on September 2, 2025 at 11:58 pm
With cyber crime groups constantly shifting tactics and getting creative, we all must stay vigilant – especially if we work at large companies.
- Cyber crime and real-world crime are converging in a dangerous new way – here’s how to stay safeby Jongkil Jay Jeong, Senior Fellow, School of Computing and Information System, The University of Melbourne on July 10, 2025 at 12:56 am
What happens next when your data is leaked in a data breach like the one at Qantas? Cyber criminals have creative ways to get what they want.
- Archetyp was one of the dark web’s biggest drug markets. A global sting has shut it downby Elena Morgenthaler, PhD Candidate, School of Criminology and Criminal Justice, Griffith University on June 23, 2025 at 8:08 pm
Shutdowns like this have become a recurring feature of the dark web. They are usually not a significant turning point.
- Airbnb scams: new book explores thriving criminal activity on big tech platformsby Julie Reid, Professor, University of South Africa on June 1, 2025 at 7:15 am
A new book draws on over 600 cases of users tricked by fake listings and fake reviews, scammed out of money or placed in physical danger.
- M&S cyberattack: how can retailers regain customers’ trust after a hack? A marketing expert explainsby Kokho Jason Sit, Senior Lecturer in Marketing; Associate Head (Global), University of Portsmouth on May 20, 2025 at 4:39 pm
Honesty is the best policy when planning a crisis response.
- Fraudulent crowdfunding after the Lapu Lapu tragedy highlights the need for vigilance and oversightby Jeremy Snyder, Professor, Health Sciences, Simon Fraser University on May 8, 2025 at 1:49 pm
Fraudulent crowdfunding can cause distractions and further distress for victims of a tragedy.
- In terms of violence, what’s the difference between classic ‘real’ porn and deepfake porn platforms?by Andreanne Bergeron, Affiliate Professor, Criminology, Université de Montréal on April 3, 2025 at 12:24 pm
How do pornographic deepfakes perpetuate gender-based violence? How is the violence in it different from that of conventional content?
- Fake online shops rely on tech skills: what drives Cameroon’s web developers to assist online fraudstersby Suleman Lazarus, Visiting Fellow, Mannheim Centre for Criminology, London School of Economics and Political Science on April 2, 2025 at 1:51 pm
Some website developers in Cameroon assist fraudsters but distance themselves from the crime.
- Online romance scams: who Nigeria and Ghana’s fraudsters are, how they operate, and why they do itby Suleman Lazarus, Visiting Fellow, Mannheim Centre for Criminology, London School of Economics and Political Science on February 11, 2025 at 3:49 pm
Romance fraud is a popular crime in Ghana and Nigeria.
- Cloud-based computing: routes toward secure storage and affordable computationby Robert Deng, AXA Chair Professor of Cybersecurity, and Professor of Information Systems School of Information Systems / Professor of Information Systems – School of Information Systems, Singapore Management University, AXA Research Fund on February 9, 2025 at 3:59 pm
Storing data in the cloud still comes with security risks. Researchers are developing new methods to address them.
- DeepSeek: why the hot new Chinese AI chatbot has big privacy and security problemsby Mohiuddin Ahmed, Senior Lecturer of Computing and Security, Edith Cowan University on January 29, 2025 at 5:11 am
Sending your personal information to be stored in China is a risky proposition.
- Using your own laptop or phone for work? Why it’s a security hazard for businessesby Thembekile Olivia Mayayise, Senior Lecturer, University of the Witwatersrand on January 21, 2025 at 1:20 pm
Letting employees use their own devices for work has many benefits – and many risks, too.
- How can you stay safe from cyber attacks? Here are 2 simple checklists from expertsby Jing Jia, Senior Lecturer, Business School, University of Newcastle on December 16, 2024 at 11:15 pm
Cyber attacks can cost you tens of thousands of dollars. Expert advice can help you stay safe – and it’s not complicated.
- From bean-counters to cyber-sleuths: how accountants are a frontline defence against online crimeby Zhongtian Li, Senior Lecturer, Business School, University of Newcastle on December 10, 2024 at 2:30 am
As the keepers of sensitive data, tax records and payroll information, accountants play a key role in protecting businesses from cybercrime.
Cybercrime
We are an ethical website cyber security team and we perform security assessments to protect our clients.






























