advice

share

Imagine going through your Facebook feed and then suddenly seeing your photo and your name on the “People you may know” list. You know you don’t have another Facebook account and you click on your second profile. 

 

You’re shocked by what you see. Photos from your original account are posted. Your friends are on the list and they’ve been commenting on the photos. And the person who’s impersonating you has been responding to the comments as though it was you! 

 

Why would someone create a fake social media account? 

share

Instagram is very popular in Brunei for online sellers to showcase their products for sale. It is also very convenient for the sellers as it cuts costs on renting a space and instead have their customers purchase their products by commenting “book” or “booksis”.  

 

The word “sis” is short for “sister” and it is usually used by ladies when they want to book with the intent to purchase the product.  

 

How is shopping on Instagram done in Brunei?  

 

share

 

When people hear the word addiction, it’s usually associated with drugs, alcohol and gambling. People who suffer from these addictions can see a specialist to help them overcome it. But now in an era defined by techno-gadgets, a new type of addiction has emerged. It’s called Internet addiction or online addiction. However, there is still a debate whether Internet Addiction should be officially recognized as a psychiatric condition. 

 

share

 

A lot of pre-teens and teenagers spend most of their time communicating with friends online. With that, parents are not able to entirely monitor their children’s online activities. 

 

One of the worst things that could happen is if a young teen gets into an online relationship with a complete stranger. To avoid this as much as possible, parents can: 

 

share

 

The social nature of the internet connects people who know each other and offers a way for people to make new friends. But not all these people have good intentions, and the dangers of unwanted contact are on the rise. 

 

What is unwanted contact? 

share

Anyone who is connected to the internet, and especially those who have online accounts such as social networking or email, could get compromised or ‘hacked’.  The faster you respond to a successful attack, the faster you can minimize the damage. 

 

How does an attacker get your password? 

  • From ‘phishing’ sites where you unintentionally gave your credentials 
  • From infected free software that you have installed on your computer 
  • Your online security is weak 
  • Your password is easy to guess 

 

Pages