Don't Be The Next
Cyber Victim
The best firewall is a human who knows better.
We provide the knowledge you need to stay safe in a digital world.
Latest Scam Tactics
Cybercriminals use "Social Engineering" to manipulate your emotions. Recognize the signs before it's too late.
Phishing Attacks
Fake emails/SMS from "banks" or "LHDN" asking you to click a link. They rely on creating a sense of URGENCY.
Macau Scam Calls
Callers impersonating police or court officials claiming you committed a crime. Real authorities NEVER discuss cases over the phone.
The "Red Flag" Checklist
-
1Is it Urgent?
Scammers want you to act fast so you don't think.
-
2Asking for TAC/OTP?
NEVER share this code. Not even to "officials".
-
3Too Good To Be True?
You won a lottery you never entered? It's a lie.
Secure Your Digital Keys
A strong password is your first line of defense.
Weak Choices
- password123
- admin123
- iloveyou
- 12345678
Cracked instantly by bots.
Passphrase Method
Combine 3 random words:
Easy to remember, hard to guess.
Turn On 2FA
Even if hackers have your password, Two-Factor Authentication stops them. It requires a second code from your phone.
Public WiFi is a
Data Trap
That free coffee shop WiFi? Hackers might be intercepting every keystroke. This is called a "Man-in-the-Middle" attack.
Evil Twin Attack
Fake WiFi names like "Free_Airport_WiFi" set up by hackers.
Safety Checklist
Your Data is Your Property
You have the right to know who stores your data. Under PDPA acts, companies must protect your info. Don't trade your privacy for convenience.
Be A Cyber Advocate
Knowledge is the only tool that cannot be hacked. Share this hub with your family group chat today.