Skip to main content

Share: About Scam

Scam Alert: Don’t Fall for Impersonation Tricks

Scammers are increasingly using sophisticated tactics to trick people into giving away personal or financial information. One of the most common methods is impersonation, pretending to be from a trusted source such as a government agency, a well-known business, or even a charity.

They may contact you claiming to represent:

  • The Police Department, Anti-Corruption Agency, or other government bodies
  • A bank, telecommunications provider, or e-commerce platform
  • A charity or emergency service

Some even use technology to spoof phone numbers, making it appear as though the call is coming from a legitimate organisation.

What Scammers Might Say:

  • "You are under investigation," or "You owe money or have committed a crime."
  • "Your account has been compromised. We need to verify your information."
  • "You’ve won a prize, but you must pay a fee to claim it."
  • "Your computer is infected and needs urgent fixing."

These messages are designed to create fear, confusion, or excitement, so you’ll act quickly without thinking.

What Scammers Want:

Scammers will pressure you to:

  • Share personal or financial details
  • Click on malicious links
  • Transfer money urgently
  • Provide card numbers, passwords, or OTPs
  • Allow remote access to your device or account

They may threaten arrest, deportation, lawsuits, or say your account is about to be closed or hacked, all to make you panic.

Protect Yourself:

✅ Never share personal or financial information over the phone, via email, or by SMS.
✅ Legitimate organisations will never ask for passwords, PINs, or card numbers via unsolicited messages.
✅ Do not click on suspicious links or call back unknown numbers.
✅ Contact organisations directly through their official websites or verified phone numbers.
✅ Ignore high-pressure tactics — real businesses give you time to think and respond.
✅ Talk to someone you trust, like a family member, before taking any action.

Remember: If something feels suspicious or too urgent, it’s probably a scam. Stay calm. Stay alert. Stay safe.

Also read:
How-To: Be More Secure Online
How-To: Shop With Confidence

For more information of illegal and suspicious financial entities and activities, please visit Financial Fraud Alert .

Members of the public may also check with other enforcement agencies for verification on related activities:
1. Securities Commission (SC): https://www.sc.com.my/
2. Kementerian Perdagangan Dalam Negeri dan Hal Ehwal Pengguna (KPDNHEP): http://www.kpdnhep.gov.my/
3. Suruhanjaya Koperasi Malaysia: http://www.skm.gov.my/
4. Suruhanjaya Komunikasi dan Multimedia Malaysia (SKMM): https://www.skmm.gov.my/
5. Suruhanjaya Syarikat Malaysia (SSM): https://www.ssm.com.my/
6. PDRM Jab. Siasatan Jenayah Komersil (CCID): https://ccid.rmp.gov.my/semakmule/

Popular posts from this blog

Share: Top 10 Social Media for Business Growth & Ads (2025)

The top 10 social media platforms to improve business traffic and run effective ads, based on 2024–2025 global data, including active users, engagement patterns, ad reach, and cost-effectiveness. These platforms are selected based on their ability to generate leads, brand awareness, conversions, and ROI across different industries. 1. Facebook Monthly Active Users (MAU): ~3.05 billion Ad Reach: 2.2+ billion Best For: Broad reach, retargeting, local businesses, B2C, B2B Key Strengths: Advanced targeting (age, interests, location, behavior) Highly effective for lead gen and eCommerce (via FB Shops & Ads) Strong performance in Southeast Asia, Latin America, Africa Insights: 70% of marketers say Facebook Ads deliver the best ROI (HubSpot 2024). CPM is rising but still cheaper than LinkedIn. 2. Instagram MAU: ~2.2 billion Ad Reach: ~1.6 billion Best For: Fashion, beauty, food, lifestyle, influencers Key Strengths: High visual engagement (Stories, Reels, Shopping) Younger demographic (18...

Share: SSL

SSL stands for Secure Sockets Layer. It is the standard technology to keep an internet connection secure, safeguarding any sensitive data that is being sent between two systems, can be server to server or a server and a client, preventing criminals from reading and modifying any information transferred. SSL uses encryption algorithms to scramble data in transit, makes sure that any data transferred between users and sites, or between two systems remain impossible to read, preventing hackers from reading it as it is sent over the connection. TLS (Transport Layer Security) is an updated, more secure, version of SSL. Not only is TLS more secure and performant, most modern web browsers no longer support SSL 2.0 and SSL 3.0. While SSL is still the dominant term on the Internet, most people really mean TLS when they say SSL. HTTPS (Hyper Text Transfer Protocol Secure) appears in the URL when a website is secured by an SSL certificate. The details of the certificate, including the issuing aut...

Share: Morse Code

Morse code is a method used in telecommunication to encode text characters as standardized sequences of two different signal durations, called dots and dashes or dits and dahs. Morse code is named after Samuel Morse, an inventor of the telegraph. International Morse Code, also known as Continental Morse Code, encodes the 26 English letters A to Z, some non-English letters, the Arabic numerals and a small set of punctuation and procedural signals (prosigns). There is no distinction between upper and lower case letters. Morse code can be transmitted in a number of ways: as electrical pulses along a telegraph wire, as an audio tone, a radio signal with short and long tones, or as a mechanical, audible, or visual signal e.g. a flashing light  or even a car horn. Some mine rescues have used pulling on a rope, a short pull for a dot and a long pull for a dash. Morse code is transmitted using just two states - on and off. Historians have called it the first digital code. Morse code may be...