Categories

  • Cyber Security
  • Threat Intelligence
  • Cryptocurrency
  • Technology
    • IppSec Videos
    • John Hammond
    • All Cyber Security Videos
  • How-to
  • Our Mission
  • Ten Cyber Security Tips for 2022
  • Cyber Threat Maps
  • Online Streamers
  • Contact
  • Home
  • Contact
  • Our Mission
  • Ten Cyber Security Tips for 2022
  • Cyber Threat Maps
  • Online Streamers
#1 Source for Cyber Security News, Reports and Threat Intelligence
Categories
  • Cyber Security
  • Threat Intelligence
  • Cryptocurrency
  • Technology
  • Cyber Security Videos
    • IppSec Videos
    • John Hammond
    • All Cyber Security Videos
  • How-to
Home /
Cyber Security /
Jail for prolific romance fraudster who fleeced besotted lonely hearts

Jail for prolific romance fraudster who fleeced besotted lonely hearts

Jan 20, 2022 04:00 pm Cyber Security 44

To his victims, he was “Tony Eden,” a middle-aged white man looking for romance online while working overseas for a drilling company. In reality, he was a school caretaker named Osagie Aigbonohan. Originally from Lagos, Nigeria, he was part of a criminal gang with links to the notorious “Black Axe” group. Southwark Crown Court in […]… Read More


The post Jail for prolific romance fraudster who fleeced besotted lonely hearts appeared first on The State of Security.



Support the originator by clicking the read the rest link below.
prolific romance fraudster fleeced besotted lonely hearts
  • E-Mail
  • Facebook
  • LinkedIn
  • Twitter
  • Google+
  • Pinterest
  • VK
  • WhatsApp
Read The Rest from the original source
tripwire.com
Red Cross Begs Attackers Not to Leak 515K People’s Stolen Data
Prev
Red Cross Begs Attackers Not to Leak 515K...
Cheap malware is behind a rise in attacks on cryptocurrency wallets
Next
Cheap malware is behind a rise in attacks on...

Related News

  • Jail for man who hacked the email of female students, stole and traded their private photos
    Jail for man who hacked the email of female...
  • Top financial scams: Imposter scams, romance scams, and prizes
    Top financial scams: Imposter scams, romance...
  • Smashing Security podcast #275: Jail for Bing, and mental health apps may not be good for you
    Smashing Security podcast #275: Jail for Bing,...
  • Terra ecosystem collapses, Sam Bankman-Fried buys Robinhood stock and crypto trader receives jail sentence for Ponzi scheme: Hodler’s Digest, May 8-14
    Terra ecosystem collapses, Sam Bankman-Fried...
  • Crypto romance scams steal victims' life savings
    Crypto romance scams steal victims' life savings
  • Smashing Security podcast #272: Going ape over the Kardashians, and the face of romance scams
    Smashing Security podcast #272: Going ape over...
  • Online fraudster nabbed
    Online fraudster nabbed
  • UK: Fraudster Steal over $75m in 2021 Via Remote Access Tools
    UK: Fraudster Steal over $75m in 2021 Via...
  • Jail Releases 300 Suspects Due to Computer
    Jail Releases 300 Suspects Due to Computer...
  • iPhone, Android users lose life savings to romance fraud, cryptocurrency operation
    iPhone, Android users lose life savings to...
1 How to develop competency in cyber threat intelligence capabilities
How to develop competency in cyber threat intelligence capabilities
Coinbase offers 'thousands of tokens' in expanded swap service
2 Coinbase offers 'thousands of tokens' in expanded swap...
Japan exchange Coincheck lists SAND, the crypto asset of The Sandbox metaverse
3 Japan exchange Coincheck lists SAND, the crypto asset of...
PIXM Mobile provides real-time protection from phishing attacks on mobile devices - Help Net Security
4 PIXM Mobile provides real-time protection from phishing...
BlackBerry partners with NXP Semiconductors to help companies prepare for post-quantum cyber attacks - Help Net Security
5 BlackBerry partners with NXP Semiconductors to help...

Newsletter

Be in Touch


Current News Sources: 60

Information about Cyber Security and Threat Intelligence should spread as fast as possible. Our goal is to collect these sources and place them all in one area for quick reading. If the information is important to the viewer and they want more information, we forward them to the direct source. The more people talking about cyber security and the more people sharing the information, the better!

If you have a resource that should be added, please let us know via the contact form. We will review the information and get back to you.

  • Incident Response Tool List
  • Blue Team Tool List
  • Privacy Policy
All Rights Reserved #1 Source for Cyber Security News, Reports and Threat Intelligence
Powered By The Internet!!!!