Skip to main content

Share: About Scam

Scam Alert: Don’t Fall for Impersonation Tricks

Scammers are increasingly using sophisticated tactics to trick people into giving away personal or financial information. One of the most common methods is impersonation, pretending to be from a trusted source such as a government agency, a well-known business, or even a charity.

They may contact you claiming to represent:

  • The Police Department, Anti-Corruption Agency, or other government bodies
  • A bank, telecommunications provider, or e-commerce platform
  • A charity or emergency service

Some even use technology to spoof phone numbers, making it appear as though the call is coming from a legitimate organisation.

What Scammers Might Say:

  • "You are under investigation," or "You owe money or have committed a crime."
  • "Your account has been compromised. We need to verify your information."
  • "You’ve won a prize, but you must pay a fee to claim it."
  • "Your computer is infected and needs urgent fixing."

These messages are designed to create fear, confusion, or excitement, so you’ll act quickly without thinking.

What Scammers Want:

Scammers will pressure you to:

  • Share personal or financial details
  • Click on malicious links
  • Transfer money urgently
  • Provide card numbers, passwords, or OTPs
  • Allow remote access to your device or account

They may threaten arrest, deportation, lawsuits, or say your account is about to be closed or hacked, all to make you panic.

Protect Yourself:

✅ Never share personal or financial information over the phone, via email, or by SMS.
✅ Legitimate organisations will never ask for passwords, PINs, or card numbers via unsolicited messages.
✅ Do not click on suspicious links or call back unknown numbers.
✅ Contact organisations directly through their official websites or verified phone numbers.
✅ Ignore high-pressure tactics — real businesses give you time to think and respond.
✅ Talk to someone you trust, like a family member, before taking any action.

Remember: If something feels suspicious or too urgent, it’s probably a scam. Stay calm. Stay alert. Stay safe.

Also read:
How-To: Be More Secure Online
How-To: Shop With Confidence

For more information of illegal and suspicious financial entities and activities, please visit Financial Fraud Alert .

Members of the public may also check with other enforcement agencies for verification on related activities:
1. Securities Commission (SC): https://www.sc.com.my/
2. Kementerian Perdagangan Dalam Negeri dan Hal Ehwal Pengguna (KPDNHEP): http://www.kpdnhep.gov.my/
3. Suruhanjaya Koperasi Malaysia: http://www.skm.gov.my/
4. Suruhanjaya Komunikasi dan Multimedia Malaysia (SKMM): https://www.skmm.gov.my/
5. Suruhanjaya Syarikat Malaysia (SSM): https://www.ssm.com.my/
6. PDRM Jab. Siasatan Jenayah Komersil (CCID): https://ccid.rmp.gov.my/semakmule/

Popular posts from this blog

Share: Domain Name

A domain name is a website URL, is the address, is your website name where Internet users can find and visit your website. Computers use IP addresses, which are a series of number. However, it is difficult for people to remember. Because of this, domain names were developed and used to identify entities on the Internet rather than using IP addresses.   A domain name can be any combination of letters and numbers, and it can be used in combination of the various extensions, such as .com, .net and more.   The domain name must be registered before you can use it. Every domain name is unique. If someone types in www.yourdomain.com, it will and only go to your website.   Domain names are formed by the rules and procedures of the Domain Name System (DNS). Any name registered in the DNS is a domain name.   "Domain names are organized in subordinate levels (subdomains) of the DNS root domain, which is nameless. The first-level set of domain names are the top-lev...

Share: About Pyramid Scheme

Pyramid Schemes: How to Recognize and Avoid Them A pyramid scheme is an illegal and deceptive business model that relies primarily on recruiting new participants, rather than selling actual products or services. While these schemes may look like legitimate businesses at first glance, they are designed to collapse, often leaving the majority of participants with financial losses. Warning Signs of a Pyramid Scheme Be cautious if you notice any of the following red flags: Income is tied to recruitment, not product sales - You're told that your main earnings come from bringing in new members, not from selling products or services. Often, they downplay or ignore product sales entirely and emphasize, “The more people you recruit, the more money you’ll make.” Mandatory inventory purchases - You’re required to buy and keep a large stock of products, even if there's no real demand or you have no intention of selling them. You’re encouraged to buy things you don’t need or want - Whether ...

How-To: Be More Secure Online

In today’s connected world, safeguarding your online accounts and personal data is more important than ever. Here are six simple but powerful ways to enhance your digital security: 1. Use Unique and Strong Passwords Never reuse passwords across different accounts. For example, if your Facebook account is compromised, a unique password will prevent hackers from accessing your email or other platforms. A strong password should: Be long and unpredictable Include a mix of letters (upper and lowercase), numbers, and symbols Avoid common patterns like password123 or qwerty ✅ Example of a strong password: G89?klz01?8955hjk Consider using a password manager to help you generate and store complex passwords securely. 2. Turn On Two-Factor Authentication (2FA) Two-Factor Authentication (2FA) adds an extra layer of security by requiring a second form of verification, such as: A one-time code sent to your mobile phone An authenticator app Biometric data (fingerprint or face recognition) With 2FA en...