Category : Cybercrime


Billionaire 'Table Tennis Terrorist' Mastermind Exposed

EXCLUSIVE: Wealthy financier and table tennis fanatic Shezad Chowdhury is unmasked as the alleged mastermind behind a sophisticated 'Ping Pong' phishing campaign targeting UK victims, raising serious questions about cyber security and the exploitation of

Cyber Slavery Epidemic: Brutal Scam Centres Exposed

Exclusive investigation reveals a shocking rise in forced online fraud, with victims lured by fake job ads and held captive in brutal compounds across Kenya, Uganda, Ethiopia, and Southeast Asia.

Netflix's 'Tinder Swindler' Stuns UK Viewers

UK Netflix subscribers are hailing 'The Tinder Swindler' as one of the most shocking true crime documentaries ever made. This gripping series exposes the astonishing story of a charismatic conman who used the dating app to defraud millions from women acro

182% Surge in Online Child Exploitation in Australia

Australia faces a devastating epidemic of online child sexual exploitation, with new data revealing an unprecedented 182% increase in reports. Authorities and charities issue urgent warnings to parents.

UK Police on Alert After Hoax 'Active Threat' Calls

British police, including forces in Norwich and Cleveland, have issued statements confirming they are not dealing with real incidents after a spate of sophisticated hoax calls, known as 'swatting', targeted American cities like Boston and Florida. The for

Five Arrested as UK Smashes £100m Illegal Streaming Ring

A major international investigation has smashed a global pirate streaming network, with five UK arrests. The sophisticated operation, which illegally broadcast Premier League football and top-tier sports, is believed to have defrauded broadcasters of over

Selfie Scam: Fraudsters Exploit NAB's Facial Recognition

Exclusive: A sophisticated criminal syndicate exploited a major flaw in National Australia Bank's 'selfie' identity verification, stealing over $1.5 million in a high-tech fraud that raises serious questions about biometric security.

Page 2 of 2