Headlines
  • At least five ballistic missile launches from Iran have been detected by the Israelis since midnight.
  • Mehrabad Airport in Tehran is hit by strikes
  • The Prince Sultan Air Base was the target of a ballistic missile that Saudi Arabia's military intercepted and destroyed, according to the country's defense ministry.
  • Heavy gunfire on Friday injured three peacekeepers from the United Nations Interim Force in Lebanon inside their base in southwest Lebanon.
  • To put an end to the bloodshed, UN Secretary-General António Guterres urged serious diplomatic negotiations..
  • In a social media post, President Trump said that "no deal" other than "unconditional surrender" will be with Iran.
  • Iran reportedly receives intelligence from Russia on US targets.

More Details

Non-Governmental Organizations: A New Paradigm for Cybercriminals

By Saron Messembe Obia

The proliferation of non-governmental organizations (NGOs) in developing countries has increase the living standard in some communities, but also increased the rate of deviant behavior in relation to white collar crimes.

Cybercriminals have gone beyond the sale of pets, to operation of non-governmental organization online to solicit funds from top institutions and philanthropists. They expose images of natives or underprivileged persons and persons with disability via social networking sites, appealing for support. 

Cybercriminal grab information of individuals  on social networking sites, produces attestation of lost or scans ID card edit an establish new ones (even biometric identification cards) to withdraw the money from banks

Some use images of spiritual leaders or clerics to solicit funds for crusade, providing an account similar to the bank post on the website of the church or organization. Most of these posts on social networking sites usually call for subscribers to type ‘AMEN’ or donate using account similar to that of prominent churches.

Despite the creation of international and regional commissions for financial crimes, the challenge keeps persisting. Financial institutions lost huge amount of money every month, money transfer are been hacked and withdrawn by cybercriminal in partnership with dishonest staffs.

Drawing from an interview with a victim of financial fraud, she explains her ordeal; when she got to the bank to withdraw money transferred from the U.S, she was told the fund had already been withdrawn, her name was shown on the computer, her phone number, but what was not correct on that information was the date and place of birth, parents name and id card number.

Cybercriminal grab information of individuals  on social networking sites, produces attestation of lost or scans ID card edit an establish new ones (even biometric identification cards) to withdraw the money from banks .

The question of staff dishonest in financial crimes is strategically linked to inadequate training be it on financial agent or law enforcement officer. As such, criminal and forensics investigations bare usually oriented to the wrong target in some African countries. This is also due to inadequate cooperation between the police and the victim sometimes considered as the suspect.

In conclusion, it’s now evident that the cold war amongst super powers demonstrates the necessity of cyber warriors for developing countries for future. As cybercrime is not limited to individuals but extend to states; the Nigeria secret service database attack is a typical example.

There is need for cooperation with security experts to better understand the tools, tactics and procedure used by criminals to protect their identity and even apprehend them.

( The Writer is a security expert and consultant, specialist in cyber security, counter terrorism and jihadists tendencies)

Identify the Dog Breed

Identify dog and cat breeds using pictures.ideal match for you.Consider about these facts before purchasing or adopting a pet.
Read More

Fileless Malware

A type of malicious software known as “fileless malware” infects a computer by using reliable apps. As it doesn’t rely on files and leaves no trace, it is difficult to detect and remove.
Read More

Ragdoll Cats

Large and sturdy, ragdoll cats have a soft, semi-long coat and blue eyes originated in Maine, United States. Coat colors are gold, silver, white, and tortoiseshell.
Read More

Process Hollowing

Using the covert malware injection technique known as “process hollowing,” an attacker suspends a legitimate process, removes its original code, and replaces it with malicious code before the process resumes. Due to this, the virus can operate as a legitimate process and avoid being discovered by security programs.
Read More

Subscribe Our You Tube Channel

Fighting Fake News

Fighting Lies




Related Article

“Iranian Authorities Use Live Fire, Arbitrary…

In response to the nationwide protests that started on December 28, Iranian authorities have drastic ...
January 7, 2026

UN Urges Iran to Stop Executing…

Despite years of physical and sexual abuse during her marriage as a child bride, Goli Kouhkan, a 25- ...
December 4, 2025

Myanmar Junta Says it Seized 30…

Myanmar’s junta said on Monday it raided one of the country’s most notorious cyberscam centers a ...
October 21, 2025

Myanmar Junta Admits it’s Unable to…

The European Union’s Special Representative for Human Rights Kajsa Ollongren said on Thursday that ...
October 17, 2025

South Korea Issues Travel Ban After…

South Korea issued a “code-black” travel ban for parts of Cambodia on Oct. 15 and dispatched a t ...
October 16, 2025

US, UK Sanction Cambodian Conglomerate, Alleging…

The U.S. and British governments on Tuesday announced a sweeping crackdown on cyber-scam networks in ...
October 15, 2025

Other Article

Pick of the Day

UN Permanent Representative of Iran Briefs…

Amir Saeid Iravani, Permanent Representative of the Islamic Republic of Iran to the United Nations, ...
March 7, 2026
Bizzare News

Malaysian Man Holds Record for Having…

Malaysian Prathab Muniandy has ten more teeth than the typical human. This indicates that he has the ...
March 6, 2026
Pet Corner

Identify the Dog Breed

Identify dog and cat breeds using pictures.ideal match for you.Consider about these facts before pur ...
Prevent Cyber Crime

Fileless Malware

A type of malicious software known as "fileless malware" infects a computer by using reliable apps. ...
Pick of the Day

UN Security Council Meets on Energy,…

Chris Wright, Secretary of Energy of the United States and President of the United Nations Security ...
Bizzare News

Just Before it Collapses, New Jersey…

A horrifying collapse happened minutes after four Jersey Shore police officers were captured on came ...
March 5, 2026

Top