Wednesday, August 12, 2015

Closing Ceremony of Cyber Safety Campaign

The cyber safety campaign draws to a close on Thursday, 30th of July at 4.30pm after the 3 days of activities and exhibition programs in Canteen 1 Concourse (Red Brick Cafe).

We had preparing this closing ceremony for a long period time to make sure we can give a good and sweet memory for all of you, and of course hope you guys will always remember us -Invisible Trace 

 The closing ceremony of cyber safety campaign was first beginning with the speech given by our campaign President, Mr. Tan Ee Beng.






The ceremony continues by our final activity, “DRAW IT” which is the lucky draw session. Our campaign advisor, Miss Lim Siz Siz was being invited as the prize presenter. 

A very big thank you to  our main sponsor, Micro-Star International (MSI) as they sponsored us all the prizes for this lucky draw. 



Here are few of the lucky draw winners, CONGRATULATIONS and hope you like the prizes that we prepared for you guys !



















 and guess who get the grand prize? 
Congratulations to Steff Chow in winning our grand prize and also don't forget to thank you our main sponsored - MSI. 


Last but not least, we would like to thank you our emcee for hosting our closing ceremony which is Brian Vunn and Helena Liew, well done guys ! 














Written By: 
Ong Mee Hung
Bachelor of Public Relations (Honours)
Tunku Abdul Rahman University College 

How To Create A Password That You Can Remember


Passwords can be a key to many things such as emails, bank account and social media account. Have you ever think that the password you used is safe enough? In fact, there are still many people use passwords like “123456”, “abcde” and their birth date. This could be dangerous to use such simple password for the sake of convenience. Another problem that might be found is that people might use one password for all of their online accounts such as bank account and social media accounts. This is very dangerous as it give crackers a chance to break into the accounts easily. 

Ways to create a strong password

1. Use lower and upper case letters, numbers and keyboard characters.
A password shouldn’t be only in numbers or letters form, it should be a combination from letters, numbers and keyboard characters.
Example: Ilovetoeatprawns à 1l0vet0eatpr@wns

Letter “I” can be changed to number “1” as it looks similar while for the letter “o” can be changed to number “0”. Letter “A” can be changed to characters “@” which makes it difficult to be cracked.

2. Go for length over complexity.
A strong password should consist of more than 10 characters.
Example: ilovedogs à ilovedadandmom

3. Don't use dictionary words, slang, names and email addresses.
These words are easily cracked by the crackers which it might get hacked easily.
Example:

4. Get yourself a password manager.
A password manager will remember all of your passwords, so you don’t have to memorize it hardly or write it down. There are password apps such as LastPass, KeePass or 1Password
Example:

5. Don't disclose your password details to anybody.

6. Password is a personal thing which couldn’t be shared to the friends and families. Never write passwords on a piece of paper and put it somewhere else in the house, it may expose your password to the others. 

7. Stay alert

Always be alert when typing password. Who knows if there is someone looking at your laptop or mobile device screen over your shoulder? Do not simply log in to your account when there are many people staying around you. There is also a chance for someone nearby in a building to steal your data if you are using free Wi-Fi connection, so it is a must to create strong and perfect password!
Example: Do not leave your device alone for any period of time!



Written By:
Sek Yee Cheng
Bachelor of Public Relations (Honours)
Tunku Abdul Rahman University College

Top 10 Tips to Avoid Online Scams


It’s not only the naïve who might probably become the victim; all of us may be vulnerable to scam. Scams succeed because they look like real thing and catch your off guard when you’re not expecting it. Scammers are getting increasingly sophisticated in their attempts to get your personal information and money. So, you have to protect yourself from being scammed by following the tips being shared below! :-


Alert that scams exist
When you are dealing with any uninvited contacts from people or business through any tools, please always consider the possibility that the approach might be a scam. Always remember that it is probably a scam if something looks too good to be true. 





Avoid suspicious texts, pop-up windows or emails
Verify the message through independent source such as phone book or online search. Don’t use the details provided in the message received, or else delete it.




Aware who you’re dealing with
If you’ve only ever met someone online, take time to do a bit more research about her or him. Search internet for others who may have had dealings with them to assure their credibility.


Choose and use strong passwords
Choosing passwords that would be difficult for others to guess where a strong password should include a mix of upper and lower case letters, numbers and symbols. For important accounts, use only secure passwords that are long and difficult to guess but never use the same passwords for every account and don’t share your passwords with anyone.



Be careful when shopping online by phone
Beware of the offers that seem too good to be true and always use the online shopping service that trusted. Even though mobile devices make shopping more convenient, but they often lack protections such as anti-virus software. 




Don’t click on hyperlinks in emails
Scams involve sending emails and ask the recipient to click on a hyperlink or open an attachment then enter their personal details, such as IC and bank account numbers. You should ignore any emails that make these kinds of requests.

Schedule a regular paperwork review
Reviewing credit card and bank statements every month to catch if there are any errors happen. If any charges seem incorrect, please contact and inform the bank or your credit card company.





Beware of any requests for your personal information or money
Never send money, credit card details, online account details or copies of your personal information to anyone you don’t know as they might misuse your details. Don’t simply transfer money or goods for someone else too.




Keep mobile devices and computers secure
Always use passwords protection and update security software to protect your mobile devices and computers. Avoid using public computers or Wi-Fi hotspots to access online banking services which include your personal information.

Don’t friend with strangers
In order to protect and secure yourself from scams, you should avoid accepting friend requests from strangers. It’s easy to just “unfriend” someone after accidentally accepting a request. Start it now!



Written By:
Li Pei Chi
Bachelor of Public Relations (Honours)
Tunku Abdul Rahman University College

How to Avoid Getting Computer Virus or Worm

The internet is an integral part of our lives, and many of us use it constantly throughout the day. However, we are bearing the risk of getting infected by viruses and malware which may lead to potential data loss and identity theft.

How can we avoid getting a computer virus or worm while we are surfing on the internet?
These FOUR easy steps may help you to solve the problem ;)

Step 1: Browse safely
Avoid clicking everything on the internet
You should avoid clicking on banners for offers that are too good to be true.

Beware of misleading popups
These popups attempt to trick the user into thinking their antivirus software has found an infection. When you click the popup, however, the adware is actually installed.

Clear your cache
Popups can store information in your browser's cache, leading to them reappearing constantly. In order to prevent this, clear your browser’s cache regularly.

Consider a different browser
Browsers such as Firefox, Chrome, and Opera are much more secure than older browsers, and more customization. If you don't want to switch browsers, make sure that it is always up to date to help prevent unauthorized attacks.

Step 2: Handling downloaded files carefully
Download files from trusted locations only
If you are downloading a program or other piece of software, it is always advisable to try to download it from the developer's site as opposed to a download service.

Look at the extension
If you normally don't see extensions on your computer and all of a sudden it appears on a file that you've downloaded, you may have downloaded a malicious file that is hiding as something else.

Scan your downloaded files
If you have an antivirus program installed, you should make a habit of scanning files that you've downloaded from unknown locations.

Step 3: Dealing with emails
Don't download attachments from a source you don't know
You should never click an attachment or link in an email from someone you don't recognize.

Don't download attachments from a source you know unless you were expecting it
You can receive email from trusted sources but the email itself is not trustworthy. If the writing is odd or the attachment looks off, do not click it.

Disable image preview
Many email applications can automatically load images for convenience, but this can leave you more vulnerable, as images can contain malicious code.

Beware of odd emails from companies you do business with
A popular phishing technique is to copy the style of a company email and include links that look similar to the regular URL, but instead send you to a fake site ("povver" instead of "power", for example). These sites then collect personal information that you though was going to a trusted server.

Step 4: Protecting yourself
Install an antivirus programme
An antivirus program will actively protect your computer from virus infections by scanning active programs and performing scheduled full-system scans.

Install an anti-spyware programme
Most antivirus programs do not scan for or remove spyware and adware. you can have multiple anti-spyware programs installed at once. More programs mean you are more likely to catch offending spyware.

Be careful with USB drives
USB drives are a popular vehicle for virus transmissions, usually without the owner being aware at all.

Keep a good backup
If disaster strikes, you don't want to be left without your important data. A regular backup schedule will mitigate any damage done by a virus, and will allow you to get up and running much quicker.

Have a better idea on how to prevent your computer from getting infected by computer virus of worm? Share it with your friends to make the cyber space a better place to surf! Always remember, if it seems suspicious, it probably is!


Have a nice day surfing the internet ;)



Written By: 
Ong Yun Han
Bachelor of Public Relations (Honours)
Tunku Abdul Rahman University College 

My identity has been stolen?

There have millions ways to steal someone identity and once a thief has your personal information, they can max out your credit cards, drain your bank account, and ruin your credit rating. It is very dangerous for us as a victim of identity theft. Things that you should to do immediately, if you think you are the victim of identity theft.

First of all, we need report to the authorities who are handle about this issue. If we report it to the authorities, maybe they had some ways to help you recover this issue. If the authorities can't help you to recover it, it also can be a record of them. Therefore, they can refer to the record to enhance the tools to avoid the issue happen again.

Furthermore, we need to close the account immediately. When you found that your identity has been stolen you should to close up the account immediately, so that the thief can't to access the to it account again. Especially of the credit card number, you should call to the department who are in-charge on this issue, to freeze you credit card account. Hence, the thief can't to use it.

Lastly, we need to remove all of the information that we had set in our account. It is to prevent the thief use your information to do anythings else that we hard to determine. Especially, your home address, phone number and so on. Those are the personal information, if we did not remove all of the information. The thief can use it for another purpose.
In conclusion, put our personal information online are dangerous for us as a victim of identity thief. We can't determine the thief when they stole our identity. Thus, we need to prevent it happen and also protect our personal information carefully. We also need to take it seriously.

Here has some guideline for you if your identity has been stolen.



Written By: 
Chin Hui San
Bachelor of Public Relations (Honours)
Tunku Abdul Rahman University College 

Cyber Safety top ten tips

Hi everybody, as technology is evolving rapidly these days and mobile phones provide great and fast communicates via internet. At the same time, there are many things that everyone should know. Today we are going to disseminate top ten tips for youth in cyber space.

  1. We must never use weak password such as your identity card number, phone numbers, and so on. Combination of upper and lower case letters, symbols and numbers is recommended.
  2. Not everything that we read online is credible; the information will only be trustable when the source is reliable.
  3. Private information such as details of our family, friends, or other peoples that you know must be kept carefully especially in cyber space.
  4. Be responsible to our behavior and considerate on other cyber user’s feeling. Think twice before pressing the ‘Enter’ button to send a message out cause it’s our responsibility to be oblige when we are in cyber space.
  5. Don’t think you’re safe when you said something offensive to others. If you don’t dare to say the words in front of that person, don’t ever say it in cyber space as well.
  6. We must also be responsible on content we post on the internet, don’t ever post illegal or inappropriate content on the internet.
  7. Social networking profile is recommended to set to private for instance security settings of our Facebook profile.
  8. In social media, lots of strangers will approach and ‘add’ you with unknown intention, so only accept friend requests from people that you really know. Accepting mutual friends will is also not a good idea in social media platform.
  9. Tagging our friends randomly is what we do all the time. In fact, we should inform or even ask for their permission before uploading or tagging them on their social networking profile(s).
  10. Embedded links in emails or any messages might contain harmful virus, it’s better to not click in URL from unknown source, or type the URL into the browser’s OMNIBOX to go from there is a better way.




Written By: 
Vicky Tham Chun Leong
Bachelor of Public Relations (Honours)
Tunku Abdul Rahman University College 

SPOT IT

Hello peeps!

If you could remember that Invisible Trace campaign have various kinds of exciting activities. One of them was SPOT IT and I feel it’s the most awesome activities prepared for people to participate!
Now, let me explain how this activity called SPOT IT actually works. First of all, we set up a table and on the table itself; we set a partition to make it looks like a mirror kind of image. The scenario is set up in an office table setting. Basically SPOT IT is the concept of “Spot the difference” but this time, we make it into a reality so called spot the difference. Sounds quite easy right??

Here’s where we make it more challenging.

There will be a significantly 10 differences between both sides of the mirror. The overall time limit set on this activity is only 1 minute and 60 seconds. Participants are given 30 seconds to look at the scene of only the left side of the partition. After 30 seconds has passed, they will come to the other side and will be given 30 seconds to find the answer. Another 30 seconds will be given for them to tell the committee what’s the answer.

They can only see but not allowed to touch those display items on the table. Participants are not allowed to refer to the other side of the partition for answers. In short, participants have to actually memories what they see.




Participants are memorizing in details of everything they can see in 30 seconds.




This group managed to find all 10 significant differences after numeral number of trials =D


The message behind this activity is to tell people to be aware when they are using the internet. An example is Wi-Fi. People will think Wi-Fi is a Wi-Fi, as long can connect than its okay but they did not know that there are two types of Wi-Fi. One is private Wi-Fi and the other is public Wi-Fi. There are differences in these two types. Private Wi-Fi is secured with security password which is save to use but private Wi-Fi is free for all users which is can be very dangerous for hackers to retrieve a person’s privacy data.



Written By: 
Foong Kee Wah
Bachelor of Public Relations (Honours)
Tunku Abdul Rahman University College 

Ways they used to hack your Facebook account and ways for you to keep your Facebook account ‘Hacked-free’

Did you know?

Facebook actually allows people to get into someone else's Facebook account without knowing their password with only two simple steps.
First, you choose three friends to send a code to.
Next, you type in the three codes and yes! you’re in!
How did they actually do it and what can you do to prevent your Facebook account from being hacked?

  • Reset the Password

They do:
Resetting the victim’s password by clicking ‘Forgotten your password’
Type in the victim’s Facebook email login simply by looking it up on their Facebook page in the Contact Info section

You do:
Use an email address specifically for your Facebook and don't put that email address on your profile.
Set a difficult security question and answer
Learn about recovering your account from friends

  • Use a Key logger

They do:
A software key logger is a program that records each stroke on the keyboard that the user makes, without their knowledge.
It is downloaded manually on the victim's computer and will automatically start capturing keystrokes when the computer is turned on and remain undetected in the background.


A hardware keylogger works the same way as the software keylogger, except that a USB drive with the software needs to be connected to the victim's computer.


You do:
  1. Use a firewall.
  2. Install a password manager.
  3. Update your software.
  4. Change passwords


  • Phishing

They do:
Creates a fake login page where it can be sent via email to the victim looking exactly like the Facebook login page.


You do:
·         Don't click on links through email.
·         Don't click on any sketchy looking links that ask for your information.
·         Use anti-virus & web security software.


  • Stealing Cookies

They do:
·         Allows a website to store information on a user's hard drive and later retrieve it.
·        Contains important information used to track a session that a hacker can sniff out and steal if they are on the same Wi-Fi network as the victim.

You do:
·    On Facebook, go to your Account Settings and check under Security. Make sure Secure Browsing is enabled.
  1. ·         Full time SSL.
  2. ·         Log off a website when you're done.
  3. ·         Use only trustworthy Wi-Fi networks.
  4. ·         Use a VPN.




Written By: 
LIEW ZER CHEUN HELENA
Bachelor of Public Relations (Honours)
Tunku Abdul Rahman University College 

WiFi can be used as a Tools of Hackers?

Well, most of the time we always think that virus and spyware, or perhaps malware is the “agent” of hackers. Those viruses obtain our information from our PC.  Actually there is another tool that loves by hackers which is WiFi.  Yes you are not wrong.  Hacker can stole information from the gadgets that is connected to WiFi.  However the good news is that, not all WiFi are dangerous. 

Out of many WiFi that we are connected around the cities, airports, even the Mamak Stores there are some WiFi or Hotspots that is connected or closely observed by hackers.  They are always waiting for the chance to strike. Frequently, they will breakthrough our online account, collecting important data such as passwords, banking account information, email, and even our computer’s IP address for many purposes, ranging from monetary lost to information abuse.  Literally the hacker is just like entering your sweet home and snap photos around.   However, the more dangerous things is that the connected computers under a WiFi network can be communicated in both ways.  This is to say that our computers or phones may be infected with different type of viruses when another device that is using the same network contains these bad boys.  Those viruses will irritate us by eating up our important files and even disturb the system and freeze the device.  In a more extreme case, we need to send it to the IT or smartphone experts and we know what happen next.  Who likes formatting their devices frequently anyway? 

We need internet connection in various tasks such as entertainment, watching movies, listening and downloading music and playing Dota 2.  And a high-speed WiFi is more than desirable.  But don’t forget, this is one of the ways for the hackers to bring their victims close.  It is better to be more aware of the WiFi that you are going to connect rather than connecting it blindly. 

Here, we share some tips to prevent from the WiFi Hackers by taking the following precaution.
Keep your devices updated with the latest security apps such as firewall, antivirus and of course browsers and software’s. 

DO NOT perform online transaction and use email while connecting to the WiFi that you are not sure of its security level.

  • Change the default setting of our computers so we have to manually select the Wi-Fi network before connecting.
  • Always turn off the WiFi detector whenever it is not used.
  • If you are interested to more tips about cyber threats, don’t forget to like the Invisible Trace Campaign on Facebook and read the previous entries posted here.  You also can find out more about our campaign that was ended last 30 July 2015. 


Stay Tune



Written By: 
Tan Ee Beng
Bachelor of Public Relations (Honours)
Tunku Abdul Rahman University College 

Block IT

Figure 1 – Players are getting ready to start the game!

Block IT is a game “invented” by Invisible Trace activity department members. It is inspired by the dodge ball game that everyone knows. Anyhow, something new has been implemented into this game where a shield is given to the player(s) in the game in order for them to protect themselves.
The core message of the game is to let people know that as long as we imply antivirus software in our laptop or computer, we can be protected from getting unneeded harms in the cyber world.

Why “Block IT”
In this game, tennis balls and shields are provided. Tennis balls represent the viruses in the cyber world while shields represent the antivirus software. The shields are meant to block the tennis balls from hitting the players during the game. “IT” refers to “Invisible Trace” and also “it”, a pronoun for an object. Hence, this is why the game is named as “Block IT”

How To Play
The game requires minimum 4 persons and maximum 8 persons in a game which consists 3 rounds of match. The people will be divided into 2 teams equally to start the game. Players are allowed to pick up the tennis balls from the basket or on the floor and “attack” the opposite side. At the same time, players are required to protect themselves by using the shield provided. Whenever players get hit by the tennis ball, the player is out from the game and has to wait for the next round to join again. The players in the team with more wins in a game will be able to collect more “traces” from the Invisible Trace crew member and entitle for lucky draw.


This game had successfully delivered the core message to all the players during our on ground event. Hopefully everyone can always remember the message and protect yourselves with reliable antivirus software in your laptop or computer!



Written By: 
Pang Jia Xin
Bachelor of Public Relations (Honours)
Tunku Abdul Rahman University College