How Omundo stole money using ATM cards that were not his This case is about a man who tricked the...
How Omundo stole money using ATM cards that were not his This case is about a man who tricked the...
Pornography is a silent pandemic. It claims one victim at a time. Thanks to the Internet, the problem is very...

The first thing they stole was time. For nearly two years, a group of insiders siphoned money from the bank,...
Smart devices are convenient, but they are also a hacker’s paradise. Your smart TV, speaker, and even refrigerator are potential...
“Your phone is your financial vault. Lose it carelessly, and you’re handing thieves an open door to your money.” Mobile...
“A good con doesn’t need to be clever it just needs a willing victim.” Every few years, a financial institution...
Mr Strategy’s Memo on fraud risk Have you ever been accused of a crime you never committed? Imagine waking up...
There’s a pervasive myth in boardrooms and IT departments alike: that with enough investment, training, and fancy software, a company...
Every fraud starts as a ‘necessary adjustment.’ Then it becomes a habit. Then it becomes the business model. Carter’s, a...
Every company has its secrets. Undue enrichment is usually part of them. Stories about a top honcho who stole large...
we specialize in bridging the gap between knowledge and application.


© 2025 All rights reserved Institute of Forensics and ICT Security | IFIS is the training arm of Summit Consulting Ltd