Skip to main content

Share: About Scam

Scam Alert: Don’t Fall for Impersonation Tricks

Scammers are increasingly using sophisticated tactics to trick people into giving away personal or financial information. One of the most common methods is impersonation, pretending to be from a trusted source such as a government agency, a well-known business, or even a charity.

They may contact you claiming to represent:

  • The Police Department, Anti-Corruption Agency, or other government bodies
  • A bank, telecommunications provider, or e-commerce platform
  • A charity or emergency service

Some even use technology to spoof phone numbers, making it appear as though the call is coming from a legitimate organisation.

What Scammers Might Say:

  • "You are under investigation," or "You owe money or have committed a crime."
  • "Your account has been compromised. We need to verify your information."
  • "You’ve won a prize, but you must pay a fee to claim it."
  • "Your computer is infected and needs urgent fixing."

These messages are designed to create fear, confusion, or excitement, so you’ll act quickly without thinking.

What Scammers Want:

Scammers will pressure you to:

  • Share personal or financial details
  • Click on malicious links
  • Transfer money urgently
  • Provide card numbers, passwords, or OTPs
  • Allow remote access to your device or account

They may threaten arrest, deportation, lawsuits, or say your account is about to be closed or hacked, all to make you panic.

Protect Yourself:

✅ Never share personal or financial information over the phone, via email, or by SMS.
✅ Legitimate organisations will never ask for passwords, PINs, or card numbers via unsolicited messages.
✅ Do not click on suspicious links or call back unknown numbers.
✅ Contact organisations directly through their official websites or verified phone numbers.
✅ Ignore high-pressure tactics — real businesses give you time to think and respond.
✅ Talk to someone you trust, like a family member, before taking any action.

Remember: If something feels suspicious or too urgent, it’s probably a scam. Stay calm. Stay alert. Stay safe.

Also read:
How-To: Be More Secure Online
How-To: Shop With Confidence

For more information of illegal and suspicious financial entities and activities, please visit Financial Fraud Alert .

Members of the public may also check with other enforcement agencies for verification on related activities:
1. Securities Commission (SC): https://www.sc.com.my/
2. Kementerian Perdagangan Dalam Negeri dan Hal Ehwal Pengguna (KPDNHEP): http://www.kpdnhep.gov.my/
3. Suruhanjaya Koperasi Malaysia: http://www.skm.gov.my/
4. Suruhanjaya Komunikasi dan Multimedia Malaysia (SKMM): https://www.skmm.gov.my/
5. Suruhanjaya Syarikat Malaysia (SSM): https://www.ssm.com.my/
6. PDRM Jab. Siasatan Jenayah Komersil (CCID): https://ccid.rmp.gov.my/semakmule/

Popular posts from this blog

Share: SSL

SSL stands for Secure Sockets Layer. It is the standard technology to keep an internet connection secure, safeguarding any sensitive data that is being sent between two systems, can be server to server or a server and a client, preventing criminals from reading and modifying any information transferred. SSL uses encryption algorithms to scramble data in transit, makes sure that any data transferred between users and sites, or between two systems remain impossible to read, preventing hackers from reading it as it is sent over the connection. TLS (Transport Layer Security) is an updated, more secure, version of SSL. Not only is TLS more secure and performant, most modern web browsers no longer support SSL 2.0 and SSL 3.0. While SSL is still the dominant term on the Internet, most people really mean TLS when they say SSL. HTTPS (Hyper Text Transfer Protocol Secure) appears in the URL when a website is secured by an SSL certificate. The details of the certificate, including the issuing aut...

Share: Artificial Intelligence, The Pros And Cons

Artificial Intelligence (A.I.) has become a major part of everyday life. From search engines and voice assistants to recommendation systems and smart tools, A.I. has changed how people learn, work, and communicate. While it brings many benefits, A.I. also has limitations and risks. Understanding both sides helps us use A.I. wisely and responsibly. Pros of A.I. 1. Increases Efficiency and Productivity A.I. can complete tasks faster than humans, especially repetitive or data-heavy work. Businesses use A.I. to automate routine processes, saving time and reducing mistakes. For students, A.I. tools can help summarise information, organise notes, or check grammar, making learning more efficient. 2. Enhances Learning and Creativity A.I. makes learning more personalised. Students can get instant explanations, examples, and feedback on almost any topic. Creative tools also allow people to design images, write stories, brainstorm ideas, and explore new possibilities that might be difficult to ac...

Share: API

An API (Application Programming Interface) is a set of rules and protocols that allow one software application to interact with another. It defines the methods and data formats that applications use to request and exchange information. APIs are used to allow different systems, services, or components to communicate with each other. APIs typically work by defining endpoints (URLs) where one system can send requests, and the system receiving the request processes it and sends a response back. Here's a basic overview of how the process works: 1. Client (Requester): The system (or program) that initiates the request. This could be a user interacting with an app, or a program that needs to fetch data from another service. 2. API Endpoint: An endpoint is a specific URL or URI (Uniform Resource Identifier) on the server that defines where the request should be sent. 3. Request: The client sends an HTTP request to the API endpoint. This can be one of several types: GET: Retrie...