Time and Date

Tuesday, March 22, 2011

Attention Mudah's Customer!



Attention Mudah's Customer!
Shop safely

1. Never pay in advance to the seller that you do not know. It is always good to deal with COD (Cash on Delivery).
2. Even if the seller discloses their personal information or bank account number, this does not protect you from being cheated.
3. Where possible, request original receipt and a written receipt for the purchase.
4. Never send the goods before payment arrangements have been finalized.
5. Never pay any money in advance, no matter how reliable the seller seems to be.
6. Fraudsters often offer to provide proof of identity (IC, passport, driving license, etc) as a "guarantee". This does not protect you against fraud or being cheated!
7. Some international payment solutions offer built-in security features, such as Paypal, but this is not common. Never use payment services such as Western Union, MoneyGram, or BidPay, as it may be very difficult to control/stop payment with these services. Such services are also popular with fraudsters for the same reasons. Avoid using most international payment services.

Take extra caution when...

1. The offer sounds too good to be true.
2. The other party keeps pushing you to complete the deal.
3. Someone asks for your bank account or credit card number.
4. Paying large amounts to people you don't know. Try to meet up at a shop or at a public place.
5. Buying branded items. It is always advisable to meet up with the buyer at a shop and check the authenticity of the item.

Phishing

PHISHING is the act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. The e-mail directs the user to visit a Web site where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers, that the legitimate organization already has. The Web site, however, is bogus and set up only to steal the user's information.

No comments:

Post a Comment