Wednesday, August 12, 2015

Closing Ceremony of Cyber Safety Campaign

The cyber safety campaign draws to a close on Thursday, 30th of July at 4.30pm after the 3 days of activities and exhibition programs in Canteen 1 Concourse (Red Brick Cafe).

We had preparing this closing ceremony for a long period time to make sure we can give a good and sweet memory for all of you, and of course hope you guys will always remember us -Invisible Trace 

 The closing ceremony of cyber safety campaign was first beginning with the speech given by our campaign President, Mr. Tan Ee Beng.






The ceremony continues by our final activity, “DRAW IT” which is the lucky draw session. Our campaign advisor, Miss Lim Siz Siz was being invited as the prize presenter. 

A very big thank you to  our main sponsor, Micro-Star International (MSI) as they sponsored us all the prizes for this lucky draw. 



Here are few of the lucky draw winners, CONGRATULATIONS and hope you like the prizes that we prepared for you guys !



















 and guess who get the grand prize? 
Congratulations to Steff Chow in winning our grand prize and also don't forget to thank you our main sponsored - MSI. 


Last but not least, we would like to thank you our emcee for hosting our closing ceremony which is Brian Vunn and Helena Liew, well done guys ! 














Written By: 
Ong Mee Hung
Bachelor of Public Relations (Honours)
Tunku Abdul Rahman University College 

How To Create A Password That You Can Remember


Passwords can be a key to many things such as emails, bank account and social media account. Have you ever think that the password you used is safe enough? In fact, there are still many people use passwords like “123456”, “abcde” and their birth date. This could be dangerous to use such simple password for the sake of convenience. Another problem that might be found is that people might use one password for all of their online accounts such as bank account and social media accounts. This is very dangerous as it give crackers a chance to break into the accounts easily. 

Ways to create a strong password

1. Use lower and upper case letters, numbers and keyboard characters.
A password shouldn’t be only in numbers or letters form, it should be a combination from letters, numbers and keyboard characters.
Example: Ilovetoeatprawns à 1l0vet0eatpr@wns

Letter “I” can be changed to number “1” as it looks similar while for the letter “o” can be changed to number “0”. Letter “A” can be changed to characters “@” which makes it difficult to be cracked.

2. Go for length over complexity.
A strong password should consist of more than 10 characters.
Example: ilovedogs à ilovedadandmom

3. Don't use dictionary words, slang, names and email addresses.
These words are easily cracked by the crackers which it might get hacked easily.
Example:

4. Get yourself a password manager.
A password manager will remember all of your passwords, so you don’t have to memorize it hardly or write it down. There are password apps such as LastPass, KeePass or 1Password
Example:

5. Don't disclose your password details to anybody.

6. Password is a personal thing which couldn’t be shared to the friends and families. Never write passwords on a piece of paper and put it somewhere else in the house, it may expose your password to the others. 

7. Stay alert

Always be alert when typing password. Who knows if there is someone looking at your laptop or mobile device screen over your shoulder? Do not simply log in to your account when there are many people staying around you. There is also a chance for someone nearby in a building to steal your data if you are using free Wi-Fi connection, so it is a must to create strong and perfect password!
Example: Do not leave your device alone for any period of time!



Written By:
Sek Yee Cheng
Bachelor of Public Relations (Honours)
Tunku Abdul Rahman University College

Top 10 Tips to Avoid Online Scams


It’s not only the naïve who might probably become the victim; all of us may be vulnerable to scam. Scams succeed because they look like real thing and catch your off guard when you’re not expecting it. Scammers are getting increasingly sophisticated in their attempts to get your personal information and money. So, you have to protect yourself from being scammed by following the tips being shared below! :-


Alert that scams exist
When you are dealing with any uninvited contacts from people or business through any tools, please always consider the possibility that the approach might be a scam. Always remember that it is probably a scam if something looks too good to be true. 





Avoid suspicious texts, pop-up windows or emails
Verify the message through independent source such as phone book or online search. Don’t use the details provided in the message received, or else delete it.




Aware who you’re dealing with
If you’ve only ever met someone online, take time to do a bit more research about her or him. Search internet for others who may have had dealings with them to assure their credibility.


Choose and use strong passwords
Choosing passwords that would be difficult for others to guess where a strong password should include a mix of upper and lower case letters, numbers and symbols. For important accounts, use only secure passwords that are long and difficult to guess but never use the same passwords for every account and don’t share your passwords with anyone.



Be careful when shopping online by phone
Beware of the offers that seem too good to be true and always use the online shopping service that trusted. Even though mobile devices make shopping more convenient, but they often lack protections such as anti-virus software. 




Don’t click on hyperlinks in emails
Scams involve sending emails and ask the recipient to click on a hyperlink or open an attachment then enter their personal details, such as IC and bank account numbers. You should ignore any emails that make these kinds of requests.

Schedule a regular paperwork review
Reviewing credit card and bank statements every month to catch if there are any errors happen. If any charges seem incorrect, please contact and inform the bank or your credit card company.





Beware of any requests for your personal information or money
Never send money, credit card details, online account details or copies of your personal information to anyone you don’t know as they might misuse your details. Don’t simply transfer money or goods for someone else too.




Keep mobile devices and computers secure
Always use passwords protection and update security software to protect your mobile devices and computers. Avoid using public computers or Wi-Fi hotspots to access online banking services which include your personal information.

Don’t friend with strangers
In order to protect and secure yourself from scams, you should avoid accepting friend requests from strangers. It’s easy to just “unfriend” someone after accidentally accepting a request. Start it now!



Written By:
Li Pei Chi
Bachelor of Public Relations (Honours)
Tunku Abdul Rahman University College

How to Avoid Getting Computer Virus or Worm

The internet is an integral part of our lives, and many of us use it constantly throughout the day. However, we are bearing the risk of getting infected by viruses and malware which may lead to potential data loss and identity theft.

How can we avoid getting a computer virus or worm while we are surfing on the internet?
These FOUR easy steps may help you to solve the problem ;)

Step 1: Browse safely
Avoid clicking everything on the internet
You should avoid clicking on banners for offers that are too good to be true.

Beware of misleading popups
These popups attempt to trick the user into thinking their antivirus software has found an infection. When you click the popup, however, the adware is actually installed.

Clear your cache
Popups can store information in your browser's cache, leading to them reappearing constantly. In order to prevent this, clear your browser’s cache regularly.

Consider a different browser
Browsers such as Firefox, Chrome, and Opera are much more secure than older browsers, and more customization. If you don't want to switch browsers, make sure that it is always up to date to help prevent unauthorized attacks.

Step 2: Handling downloaded files carefully
Download files from trusted locations only
If you are downloading a program or other piece of software, it is always advisable to try to download it from the developer's site as opposed to a download service.

Look at the extension
If you normally don't see extensions on your computer and all of a sudden it appears on a file that you've downloaded, you may have downloaded a malicious file that is hiding as something else.

Scan your downloaded files
If you have an antivirus program installed, you should make a habit of scanning files that you've downloaded from unknown locations.

Step 3: Dealing with emails
Don't download attachments from a source you don't know
You should never click an attachment or link in an email from someone you don't recognize.

Don't download attachments from a source you know unless you were expecting it
You can receive email from trusted sources but the email itself is not trustworthy. If the writing is odd or the attachment looks off, do not click it.

Disable image preview
Many email applications can automatically load images for convenience, but this can leave you more vulnerable, as images can contain malicious code.

Beware of odd emails from companies you do business with
A popular phishing technique is to copy the style of a company email and include links that look similar to the regular URL, but instead send you to a fake site ("povver" instead of "power", for example). These sites then collect personal information that you though was going to a trusted server.

Step 4: Protecting yourself
Install an antivirus programme
An antivirus program will actively protect your computer from virus infections by scanning active programs and performing scheduled full-system scans.

Install an anti-spyware programme
Most antivirus programs do not scan for or remove spyware and adware. you can have multiple anti-spyware programs installed at once. More programs mean you are more likely to catch offending spyware.

Be careful with USB drives
USB drives are a popular vehicle for virus transmissions, usually without the owner being aware at all.

Keep a good backup
If disaster strikes, you don't want to be left without your important data. A regular backup schedule will mitigate any damage done by a virus, and will allow you to get up and running much quicker.

Have a better idea on how to prevent your computer from getting infected by computer virus of worm? Share it with your friends to make the cyber space a better place to surf! Always remember, if it seems suspicious, it probably is!


Have a nice day surfing the internet ;)



Written By: 
Ong Yun Han
Bachelor of Public Relations (Honours)
Tunku Abdul Rahman University College 

My identity has been stolen?

There have millions ways to steal someone identity and once a thief has your personal information, they can max out your credit cards, drain your bank account, and ruin your credit rating. It is very dangerous for us as a victim of identity theft. Things that you should to do immediately, if you think you are the victim of identity theft.

First of all, we need report to the authorities who are handle about this issue. If we report it to the authorities, maybe they had some ways to help you recover this issue. If the authorities can't help you to recover it, it also can be a record of them. Therefore, they can refer to the record to enhance the tools to avoid the issue happen again.

Furthermore, we need to close the account immediately. When you found that your identity has been stolen you should to close up the account immediately, so that the thief can't to access the to it account again. Especially of the credit card number, you should call to the department who are in-charge on this issue, to freeze you credit card account. Hence, the thief can't to use it.

Lastly, we need to remove all of the information that we had set in our account. It is to prevent the thief use your information to do anythings else that we hard to determine. Especially, your home address, phone number and so on. Those are the personal information, if we did not remove all of the information. The thief can use it for another purpose.
In conclusion, put our personal information online are dangerous for us as a victim of identity thief. We can't determine the thief when they stole our identity. Thus, we need to prevent it happen and also protect our personal information carefully. We also need to take it seriously.

Here has some guideline for you if your identity has been stolen.



Written By: 
Chin Hui San
Bachelor of Public Relations (Honours)
Tunku Abdul Rahman University College 

Cyber Safety top ten tips

Hi everybody, as technology is evolving rapidly these days and mobile phones provide great and fast communicates via internet. At the same time, there are many things that everyone should know. Today we are going to disseminate top ten tips for youth in cyber space.

  1. We must never use weak password such as your identity card number, phone numbers, and so on. Combination of upper and lower case letters, symbols and numbers is recommended.
  2. Not everything that we read online is credible; the information will only be trustable when the source is reliable.
  3. Private information such as details of our family, friends, or other peoples that you know must be kept carefully especially in cyber space.
  4. Be responsible to our behavior and considerate on other cyber user’s feeling. Think twice before pressing the ‘Enter’ button to send a message out cause it’s our responsibility to be oblige when we are in cyber space.
  5. Don’t think you’re safe when you said something offensive to others. If you don’t dare to say the words in front of that person, don’t ever say it in cyber space as well.
  6. We must also be responsible on content we post on the internet, don’t ever post illegal or inappropriate content on the internet.
  7. Social networking profile is recommended to set to private for instance security settings of our Facebook profile.
  8. In social media, lots of strangers will approach and ‘add’ you with unknown intention, so only accept friend requests from people that you really know. Accepting mutual friends will is also not a good idea in social media platform.
  9. Tagging our friends randomly is what we do all the time. In fact, we should inform or even ask for their permission before uploading or tagging them on their social networking profile(s).
  10. Embedded links in emails or any messages might contain harmful virus, it’s better to not click in URL from unknown source, or type the URL into the browser’s OMNIBOX to go from there is a better way.




Written By: 
Vicky Tham Chun Leong
Bachelor of Public Relations (Honours)
Tunku Abdul Rahman University College 

SPOT IT

Hello peeps!

If you could remember that Invisible Trace campaign have various kinds of exciting activities. One of them was SPOT IT and I feel it’s the most awesome activities prepared for people to participate!
Now, let me explain how this activity called SPOT IT actually works. First of all, we set up a table and on the table itself; we set a partition to make it looks like a mirror kind of image. The scenario is set up in an office table setting. Basically SPOT IT is the concept of “Spot the difference” but this time, we make it into a reality so called spot the difference. Sounds quite easy right??

Here’s where we make it more challenging.

There will be a significantly 10 differences between both sides of the mirror. The overall time limit set on this activity is only 1 minute and 60 seconds. Participants are given 30 seconds to look at the scene of only the left side of the partition. After 30 seconds has passed, they will come to the other side and will be given 30 seconds to find the answer. Another 30 seconds will be given for them to tell the committee what’s the answer.

They can only see but not allowed to touch those display items on the table. Participants are not allowed to refer to the other side of the partition for answers. In short, participants have to actually memories what they see.




Participants are memorizing in details of everything they can see in 30 seconds.




This group managed to find all 10 significant differences after numeral number of trials =D


The message behind this activity is to tell people to be aware when they are using the internet. An example is Wi-Fi. People will think Wi-Fi is a Wi-Fi, as long can connect than its okay but they did not know that there are two types of Wi-Fi. One is private Wi-Fi and the other is public Wi-Fi. There are differences in these two types. Private Wi-Fi is secured with security password which is save to use but private Wi-Fi is free for all users which is can be very dangerous for hackers to retrieve a person’s privacy data.



Written By: 
Foong Kee Wah
Bachelor of Public Relations (Honours)
Tunku Abdul Rahman University College