Skip to main content

How-To: Shop With Confidence

Smart & Safe Online Shopping: Tips to Protect Yourself

Online shopping has become part of everyday life — convenient, fast, and often more affordable. However, it's important to stay alert and shop wisely to avoid scams and fraud. Here are some essential tips to help you shop safely online:

1. Shop Only on Trusted Platforms

Always use reputable and established platforms like Shopee, Lazada, eBay, Amazon, or official brand websites. These platforms typically offer:

  • Buyer and seller protection
  • Clear refund/return policies
  • Reliable dispute resolution processes

Avoid purchasing from unknown sources such as forums, random social media posts (e.g., Facebook, Instagram), or shady websites. A legitimate online store should provide clear information including:

  • Business or owner identity
  • Company background
  • Contact details
  • Physical store address or registered office
  • Customer support options

🔍 Tip: If something seems too good to be true, it probably is. If you're unsure, don't buy.

2. Choose Verified and Reliable Sellers

Before making a purchase, always:

  • Visit the seller's profile or store page
  • Browse their full product list
  • Read their terms & conditions, especially return, refund, or warranty policies
  • Most importantly: check customer reviews and ratings

🚩 Be cautious of:

  • New sellers with no reviews
  • Products with no transaction history
  • Vague or overly generic listings

Would you trust someone who has no sales record and no feedback? Neither should your money.

3. Ensure the Website Is Secure (SSL Encryption)

Whenever you shop online, especially when entering credit card or personal information — make sure the website is secured by SSL (Secure Sockets Layer) encryption.

Here’s how to check:

✔️ The website URL starts with https://
✔️ A lock icon 🔒 appears in the browser address bar
✔️ Some sites display security badges (e.g., "SSL Secured" or "Secure Checkout")

This ensures that your sensitive information, like payment details and passwords, is encrypted and protected from cybercriminals.

Always trust your instincts. If you're unsure about a product, platform, or seller, pause, research, or ask someone you trust. Shopping online should be easy, enjoyable, and most importantly, safe.

4. Check if a number or bank account is reported / suspicious / scammer on Royal Malaysia Police website | https://ccid.rmp.gov.my/semakmule/ .

Also read:
How-To: Be More Secure Online .

Popular posts from this blog

How-To: Use A.I.

Using A.I. tools like ChatGPT and Gemini is often compared to having a conversation with a person, but that’s not entirely accurate. In reality, it’s more like working with a highly brilliant, lightning-fast intern who has read every book in the library but has zero common sense. To get the best out of A.I., you don’t just "use" it, you guide it. Here is how to "train" and "teach" your A.I. to grow alongside you. 1. Stop "Searching," Start "Briefing" Most people use A.I. like Google, typing in short keywords. To "train" it for a specific task, you need to provide a brief. A great prompt usually follows the R-C-G framework: Role: Tell it who to be. "Act as a senior marketing consultant with 20 years of experience." Context: Give it the background. "I am launching a small bakery that specializes in sourdough in a busy urban neighborhood." Goal: Tell it exactly what you want. "Write three Instagram captio...

Share: Two-Factor Authentication (2FA)

Understanding Two-Factor Authentication (2FA): How It Works and Why It Matters Two-Factor Authentication (2FA) adds an extra layer of security to your online accounts by requiring not just a password, but a second method of verification. This makes it significantly harder for unauthorized users to gain access, even if they know your password. How 2FA Works When 2FA is enabled, logging into your account requires two things: Something you know – e.g. your password Something you have or are – e.g. a mobile device, fingerprint, or security key This second factor provides an additional checkpoint that only the real account owner should be able to pass. Common Types of 2FA Text Message (SMS) - A one-time code is sent to your registered phone number, which you must enter during login. Authenticator App - Apps like Google Authenticator, Microsoft Authenticator, or Authy generate time-sensitive verification codes, often considered more secure than SMS. Biometric Verification - Physical characte...

How-To: Code

Coding is the process of creating instructions for a computer to perform a specific task. The language you choose to use depends on what you want to achieve, as different programming languages are suited to different types of tasks. Here is a general guide to getting started with coding: 1. Choose a Programming Language: * Popular languages for beginners include Python, JavaScript, and Ruby. * Python is often recommended for its readability and versatility. * JavaScript is essential for web development. * Choose a language based on your goals and the type of applications you want to build. 2. Set Up Your Development Environment: * Install a code editor like Visual Studio Code, Atom, or Sublime Text. * Install the necessary tools and libraries for your chosen language. 3. Learn the Basics: * Familiarize yourself with basic programming concepts such as variables, data types, control structures (if statements, loops), and functions. * Understand how to use the syntax of your chosen langua...