Skip to main content

Share: About Scam

Scam Alert: Don’t Fall for Impersonation Tricks

Scammers are increasingly using sophisticated tactics to trick people into giving away personal or financial information. One of the most common methods is impersonation, pretending to be from a trusted source such as a government agency, a well-known business, or even a charity.

They may contact you claiming to represent:

  • The Police Department, Anti-Corruption Agency, or other government bodies
  • A bank, telecommunications provider, or e-commerce platform
  • A charity or emergency service

Some even use technology to spoof phone numbers, making it appear as though the call is coming from a legitimate organisation.

What Scammers Might Say:

  • "You are under investigation," or "You owe money or have committed a crime."
  • "Your account has been compromised. We need to verify your information."
  • "You’ve won a prize, but you must pay a fee to claim it."
  • "Your computer is infected and needs urgent fixing."

These messages are designed to create fear, confusion, or excitement, so you’ll act quickly without thinking.

What Scammers Want:

Scammers will pressure you to:

  • Share personal or financial details
  • Click on malicious links
  • Transfer money urgently
  • Provide card numbers, passwords, or OTPs
  • Allow remote access to your device or account

They may threaten arrest, deportation, lawsuits, or say your account is about to be closed or hacked, all to make you panic.

Protect Yourself:

✅ Never share personal or financial information over the phone, via email, or by SMS.
✅ Legitimate organisations will never ask for passwords, PINs, or card numbers via unsolicited messages.
✅ Do not click on suspicious links or call back unknown numbers.
✅ Contact organisations directly through their official websites or verified phone numbers.
✅ Ignore high-pressure tactics — real businesses give you time to think and respond.
✅ Talk to someone you trust, like a family member, before taking any action.

Remember: If something feels suspicious or too urgent, it’s probably a scam. Stay calm. Stay alert. Stay safe.

Also read:
How-To: Be More Secure Online
How-To: Shop With Confidence

For more information of illegal and suspicious financial entities and activities, please visit Financial Fraud Alert .

Members of the public may also check with other enforcement agencies for verification on related activities:
1. Securities Commission (SC): https://www.sc.com.my/
2. Kementerian Perdagangan Dalam Negeri dan Hal Ehwal Pengguna (KPDNHEP): http://www.kpdnhep.gov.my/
3. Suruhanjaya Koperasi Malaysia: http://www.skm.gov.my/
4. Suruhanjaya Komunikasi dan Multimedia Malaysia (SKMM): https://www.skmm.gov.my/
5. Suruhanjaya Syarikat Malaysia (SSM): https://www.ssm.com.my/
6. PDRM Jab. Siasatan Jenayah Komersil (CCID): https://ccid.rmp.gov.my/semakmule/

Popular posts from this blog

The "Dark System" Ranked: Mobile MOBAs with the Most (and Least) Manipulation

In 2026, the mobile MOBA landscape has stabilized into a few "titans" and several niche survivors. Using the pattern of analyzing manipulation, fairness, and mechanics, here is the comprehensive guide to the current mobile MOBA market. 1. League of Legends: Wild Rift Manipulation: Near zero. There are no "pity bots" in ranked play once you leave the introductory tiers. Pay-to-Win: None. Skins are visual only; there are no stat-boosting items or emblems to buy. Mechanics: The highest "skill ceiling" on mobile. Requires active warding and manual aiming for almost every ability. 2. Onmyoji Arena Manipulation: Zero mechanical manipulation. It uses the "Onmyodo" system where all power-ups are free and unlocked for everyone from level one. Pay-to-Win: None. It is strictly cosmetic. Mechanics: Traditional 4-skill kits (rather than the mobile-standard 3). It features a complex "Fog of War" that rewards tactical map awareness. 3. Honor of Kings ...

How-To: Google Authenticator: Guide to Setup, Backup, and Safe Usage

What is Google Authenticator? Google Authenticator is a free security app from Google that provides two-factor authentication (2FA) codes. Instead of just entering a password, you’ll also need to input a time-based code from the app. This extra step greatly reduces the risk of your account being hacked, even if someone knows your password. Unlike SMS codes, which can be intercepted, Google Authenticator works offline and generates unique codes every 30 seconds directly on your device. Why Use Google Authenticator? Stronger security: Protects against password leaks or phishing. Offline usage: Works without mobile data or Wi-Fi. Multi-account support: You can store codes for multiple accounts (Google, Facebook, Instagram, banking apps, etc.). Free and lightweight: No subscription fees, minimal storage needed. How to Set Up Google Authenticator Step 1: Install the App Download Google Authenticator from:  Google Play Store (Android) Apple App Store (iOS) Step 2: Enable 2FA on Your Acco...

How-To: Use A.I.

Using A.I. tools like ChatGPT and Gemini is often compared to having a conversation with a person, but that’s not entirely accurate. In reality, it’s more like working with a highly brilliant, lightning-fast intern who has read every book in the library but has zero common sense. To get the best out of A.I., you don’t just "use" it, you guide it. Here is how to "train" and "teach" your A.I. to grow alongside you. 1. Stop "Searching," Start "Briefing" Most people use A.I. like Google, typing in short keywords. To "train" it for a specific task, you need to provide a brief. A great prompt usually follows the R-C-G framework: Role: Tell it who to be. "Act as a senior marketing consultant with 20 years of experience." Context: Give it the background. "I am launching a small bakery that specializes in sourdough in a busy urban neighborhood." Goal: Tell it exactly what you want. "Write three Instagram captio...