Today’s society is technology, or a technological driven one and ICT dependent enhanced by educational learning. As it revolves and evolves, we have now arrived at the age of the ‘Big Data’, ‘Internet of Things ( IoTs)’, ‘Automation’, ‘Cyber Security’, ‘Cloud Computing’, etc. All these were acquired through education and to proffer solutions to problems including insecurity. It is pervasive, affecting all areas of human existence. The internet and computer users, is at the heart of office activities, and thus use these technologies to a very large extent in carrying out their functions. Concerns about digital security and other related issues abound. This review paper highlights some of these ICT tools used via computer, and fears regarding cyber security threat. Most importantly, the researcher, who is also ICT expert undergoing a Ph.D study on Computational Intelligent, raised alarm on the need for us all to examine our individual roles, and tread on the side of caution while using these technological tools. Internet plays a huge part in the daily performance of every user of ICT to carry-out their functions which could be bad or good. For official, personal and family transactions, computer users’ uses for daily collections and stores a wide range of confidential information on computers and transmit to other computers across different networks. Although, the internet offers wide range of opportunities for the users to communicate with ease, socialize, achieve, improved job performance and maintain close relationship with others across the globe but there are also risks in other hand. Internet fraud, one of the evils of our time, is becoming a big threat to the society and individuals whose daily activities depend on the use of the computer technology. Online criminals have developed a number of sophisticated ways to defraud the unsuspecting. Official and personal information shared by the cyber operators on the internet can be hijacked and inappropriately deployed. The exponential increase of this crime in the society has become a strong issue and the cyberspace becoming unsafe. The cyber fraudsters also use the ICT to monitor gas and chemical plants on a safe ground to them for the sales of petroleum products on illegal marketing of the products known as bunkery. The activities of the perpetrators in the oil industries have resulted a negative effect and considerable distress to the nations’ economy and international reputation of the nation. This article provides information that will help the computer and cyber users to be security conscience and as well to understand different methods internet fraudsters adopt their strategies.