
MCMC's Safe Internet Campaign aims to help educate society to protect privacy, browse safely
JOHOR BARU: The Malaysian Communications and Multimedia Commission's (MCMC) Safe Internet Campaign will help educate society in protecting their privacy and money from irresponsible parties online, says Teo Nie Ching.
The Deputy Communications Minister added that the campaign was launched last month to educate the public, in particular future generations, on how to properly use the Internet and social media including apps safely
'This is a new programme by MCMC, which was launched for the first time in April. So far, we have held the campaign in nine primary schools including vernacular schools across the country.
'We are hoping to enter secondary schools and public universities to hold the Safe Internet Campaign by next month to create awareness on becoming a responsible Internet user,' she said.
Teo, who is also the Kulai MP, said this to pressmen after officiating at the Kita Madani carnival held at PPR Sri Stulang here on Saturday (May 17).
She added that to ensure that the campaign able to reach out to as many people as it can, MCMC was in the midst of training individuals to become trainers.
Teo also said that through the campaign, the government was aggressive in tackling issues such as cyber bullying, protecting data and personal information online and not abusing technology such as artificial intelligence.
'The campaign will also help educate the public on not to fall prey to any get rich schemes they found online, which has become very serious lately.
'Based on the records by police, until April, which is the first four months, almost RM800mil in losses have been recorded with more than half of those cases are non existing investment schemes,' she added.
Teo said scam cases should be looked upon seriously not only by authorities but by everyone including members of the public so that people would not lose their savings anymore.
She added that the Safe Internet Campaign would be held during the sidelines of Rakyat Madani Program (PMR) 2025, which will be held at Toppen Shopping Centre here for three days from May 23 and May 25.
'Prime Minister Datuk Seri Anwar Ibrahim will be launching the event on next Friday (May 23) at around 3pm.
'Many agencies will set up booth during the PMR 2025 where it would provide an opportunity for the people to have a better understanding on the Madani government's policies and initiatives for them,' she said.
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


The Star
3 hours ago
- The Star
This is the phishing scam that gets an identity theft expert in the US 'really, very angry'
Digital thieves are nothing if not persistent and innovative. They keep finding new ways to try to part you from your money. Phishing – where thieves pose as trusted entities or send legitimate looking emails or messages to trick you into giving them access to your accounts – is a widespread method. And it is constantly evolving. 'We've seen phishing go through the roof,' said Eva Velasquez, the CEO of the Identity Theft Resource Center, a San Diego-based national nonprofit. But knowledge is power. So here are three emerging phishing threats to look out for, according to Internet safety experts. All three threats target key parts of people's digital lives: email attachments that lead to fake login pages, multi-factor authentication trickery and deceptive calendar invites. Spending a few minutes reading these pointers could help you avoid getting your ID or money stolen and save you countless hours of dealing with the fallout. HTML attachments that open fake login pages Imagine a busy professional who is in email action mode. In the past 30 minutes on a Saturday morning, he has filled out emailed liability waivers for his seven children's summer camps, filed an expense report for work, answered a secure portal message from the veterinarian about his sick puppy's prescription, skimmed 182 email subject lines and paid five bills from his email inbox, including a car insurance premium and his beloved cheese-of-the-month club. Amid this flurry of inbound emails, ads, invoices and secure messages, he is working on autopilot: opening messages, skimming, clicking and signing in. What a perfect opportunity. Scammers are taking advantage of user distraction – and their trust – by sending emails with HTM or HTML attachments. When clicked, those open a browser file that looks like secure, familiar login page. These pages might look like secure invoice viewers, file-sharing services like DocuSign or Dropbox, or sign-in pages to platforms including Microsoft 365. 'Once the user enters their credentials, they are sent surreptitiously to the attacker's server,' said Vlad Cristescu, the head of cybersecurity with ZeroBounce, a Florida company that helps businesses lower their rate of bounced marketing emails. Why this method is especially insidious: 'There isn't a clickable link in the email, so standard email security filters (which scan for malicious URLs or attachments like PDFs and ZIPs) may not catch it,' Cristescu added. To prevent this, he added, companies should 'restrict HTML attachments unless essential, and users should treat unfamiliar HTML files the same way they'd treat a suspicious link – don't open it unless you're absolutely sure of the sender.' If you do receive incoming communication with an HTML link or attachment, don't engage, said Velasquez, with the ITRC. 'Don't click on links, people. That's the big, overarching message,' she said. Instead, go to the source: call the phone number on the back of your credit card, visit the bank in person. Multifactor authentication tricks If you are one of the many people who uses multifactor authentication, take note. Multifactor authentication is still very helpful and should be used. But Cristescu flagged one way that scammers are taking this tool – which is designed to make people's online accounts more secure – and using it to slither in. As a refresher, multifactor authentication is an added layer of protection that prevents data thieves from logging into your accounts if they have your username and password. It helps ensure that you're the one who typed in your password when you log in, and not some scammer in the Philippines or Poughkeepsie. To use multifactor authentication, you typically download an app, such as Google Authenticator or Microsoft Authenticator. You register your sensitive online accounts, such as Facebook, bank or email, with that app. Then, every time you log into a registered website, the authenticator app generates a new, random code that you enter after your password as a second layer of verification. With the rise of this protection, a new threat has emerged: Scammers who have your username and password can send log-in requests to your authenticator app. Next, the scammer can pose as an IT expert from your workplace and ask you to approve the log-in request. If you fall for it, then boom – the scammer is in. This technique 'exploits a user's frustration and trust in IT. If you're receiving multiple (authenticator) prompts you didn't initiate, that's not a glitch – it's an attack,' Cristescu said. He recommends pausing, never approving these unexpected requests and flagging the interaction with IT. Velasquez added that if you get an authenticator notification and you didn't just log in yourself, 'That is a huge red flag. Stop and address it. Don't ignore it.' Anytime you interact with IT, be sure you're the one initiating that contact, she added. If someone from IT calls or emails you, disconnect and reach back out using a trusted method, such as the same phone number you always dial. Fake calendar invites A third technique data thieves are using is calendar invites. 'I just get really very angry about this one,' Velasquez said. 'It is super hard to detect.' Here's what to look out for. If you use an online calendar like Google calendar or the native iPhone calendar app, you might receive an invitation to an event you didn't see coming. Sometimes these meetings are legitimate. Sometimes, they are not. Scammers 'are now sending meeting requests with malicious links embedded in the invite or 'join' button. These invitations sync directly into calendars and often go unquestioned,' according to ZeroBounce. Scammers use calendar invites because they have 'built-in credibility – they're not usually scrutinised like emails,' Cristescu said. Look for meeting requests from unknown senders and vague event names like 'Sync' or 'Project Review,' he added. In some jobs or roles, meetings routinely get added to calendars by other people –clients, prospects, coworkers, bosses, peers. 'I have gotten these repeatedly,' said Velasquez, with the ITRC. 'Depending on your lifestyle and your job and how you work, these are going to be particularly challenging. They are real calendar invites. The problem is they have malicious software embedded in them – so when you click on portions of them, 'Click to join,' it's like opening an attachment (or) clicking on a suspicious link. It's the same principle.' Cristescu, with ZeroBounce, shared this tip: 'Treat those just like a phishing email. Disable auto-accept where possible and review every invite manually before clicking anything.' Never stop questioning what lands in your inbox or calendar, Cristescu added. 'Always verify the sender's email address, ensure that any link you click matches the legitimate domain, and look out for subtle red flags like spelling errors or unusual formatting.' A big picture pointer 'All three of these (scams) are so common that it has probably happened to every single person reading the article – at least one of them. That's how ubiquitous these are,' Velasquez said. She shared this broader thought: It's less important to know how to respond to each scenario and more important to pause, be skeptical, double check. It's important to be ever more sceptical, because AI makes it easier and easier for thieves to create convincing ruses, Cristescu and Velasquez both said. AI 'really helps with making these phishing offers look and sound so much more legitimate,' Velasquez said. 'And with the amount of data that is out there from public sources and from data breaches, it's very easy to see what relationships people have.' Where you bank, where you do business – that is all fodder for someone to create a copycat page designed to trick you into logging in. Adopt an 'investigator mindset,' Velasquez said. Use this helpful reminder: the acronym STAR, which stands for Stop. Think. Ask questions or ask for help. Reassess. – The San Diego Union-Tribune/Tribune News Service


Malay Mail
4 hours ago
- Malay Mail
MCMC clarifies mobile phone data collection for national statistics, says no identifiable user information involved
KUALA LUMPUR, June 7 — The Malaysian Communications and Multimedia Commission (MCMC) has clarified its collection of mobile phone data (MPD) from Mobile Network Operators (MNOs), assuring that no Personally Identifiable Information (PII) is accessed, processed, or disclosed. The clarification comes amid recent media reports regarding the matter. In a statement today, MCMC said MPD was used strictly for the generation of official statistics to support evidence-based policymaking in two key domains, namely the ICT Sector and the Tourism Sector. For the ICT Sector, MPD helps produce granular statistics, such as the number of active mobile broadband subscriptions and penetration rates at the state, district, mukim, parliamentary constituency, state legislative assembly (DUN), and local authority levels. For the Tourism Sector, it generates indicators such as the number of visitors and domestic tourism trips. 'The MPD data requested from MNOs is anonymised and contains no PII. 'In addition, MNOs are given the option to either process the MPD data within their own secure environment and submit the required anonymised and aggregated output to MCMC, or, for MNOs without in-house processing capabilities, to submit the anonymised data to MCMC for processing. 'In both cases, no individual subscriber can be identified through the data collected,' it said. MCMC further clarified that the use of MPD as a new source of national statistics was a strategic direction set by the government to strengthen the quality and timeliness of statistical outputs for policy and planning purposes. Implementation of MPD is through collaboration with the International Telecommunication Union (ITU) and the UN Committee of Experts on Big Data and Data Science, it added. Over the past two years, MCMC said extensive engagement with all MNOs had been carried out to ensure mutual understanding of the data requirements, processes, and privacy safeguards. These included the MPD National Workshop held from Sept 2 to 5, 2024, attended by representatives from the Department of Statistics Malaysia (DOSM), International Telecommunication Union (ITU), Ministry of Communications, Ministry of Tourism, Art and Culture, and MNOs (CelcomDigi, Maxis, TM Tech, U Mobile, and YTL). 'This initiative aligns with international best practices. It mirrors similar projects already implemented in countries such as Indonesia and Brazil, where anonymised telecommunications data is used to enhance national statistics while fully safeguarding user privacy,' it said. — Bernama


The Sun
4 hours ago
- The Sun
MCMC clarifies mobile phone data collection amid media reports, ensures privacy
KUALA LUMPUR: The Malaysian Communications and Multimedia Commission (MCMC) has clarified its collection of mobile phone data (MPD) from Mobile Network Operators (MNOs), assuring that no Personally Identifiable Information (PII) is accessed, processed, or disclosed. The clarification comes amid recent media reports regarding the matter. In a statement today, MCMC said MPD was used strictly for the generation of official statistics to support evidence-based policymaking in two key domains, namely the ICT Sector and the Tourism Sector. For the ICT Sector, MPD helps produce granular statistics, such as the number of active mobile broadband subscriptions and penetration rates at the state, district, mukim, parliamentary constituency, state legislative assembly (DUN), and local authority levels. For the Tourism Sector, it generates indicators such as the number of visitors and domestic tourism trips. 'The MPD data requested from MNOs is anonymised and contains no PII. 'In addition, MNOs are given the option to either process the MPD data within their own secure environment and submit the required anonymised and aggregated output to MCMC, or, for MNOs without in-house processing capabilities, to submit the anonymised data to MCMC for processing. 'In both cases, no individual subscriber can be identified through the data collected,' it said. MCMC further clarified that the use of MPD as a new source of national statistics was a strategic direction set by the government to strengthen the quality and timeliness of statistical outputs for policy and planning purposes. Implementation of MPD is through collaboration with the International Telecommunication Union (ITU) and the UN Committee of Experts on Big Data and Data Science, it added. Over the past two years, MCMC said extensive engagement with all MNOs had been carried out to ensure mutual understanding of the data requirements, processes, and privacy safeguards. These included the MPD National Workshop held from Sept 2 to 5, 2024, attended by representatives from the Department of Statistics Malaysia (DOSM), International Telecommunication Union (ITU), Ministry of Communications, Ministry of Tourism, Art and Culture, and MNOs (CelcomDigi, Maxis, TM Tech, U Mobile, and YTL). 'This initiative aligns with international best practices. It mirrors similar projects already implemented in countries such as Indonesia and Brazil, where anonymised telecommunications data is used to enhance national statistics while fully safeguarding user privacy,' it said.