Hacked/Security

I have been hacked.  How can I change my password when I have been hacked. The security questions have been changed on me, as well as the email for notification.

Start here: https://expresslane.apple.com/
Navigate the columns as follows: All Products and Services > iTunes > iTunes Store > Account Management > iTunes Store account security
Answer the questions and if required sign in with your Apple ID and password - same one you used to log in on this support forum.
You will find an option to send an email to Apple on that page. Explain your circumstances and click "Send to Apple".
You should receive automated confirmation email immediately. Check your email spam / junk folder for it because a humanoid should respond in a business day or two, who will require some more security-related information before your questions can be reset.
You may have to wait another day or two for their reply, which will provide instructions for resetting your password and your answers to the security questions.

Similar Messages

  • Oracle 8 tns-listener security

    Hi list,
    premise that an upgrade to a newer Oracle version is recommended... I noticed setting a tns-listener password in Oracle 8.1.7* ("SECURITY=ON"), the SIDs are anyway enumerable (via "Command=status").
    According to you, is firewall filtering the only possible solution?
    As for "Oracle8 tns security" I did not find information on google. For Oracle 9 is different.
    Thanks in advance,
    Al

    user8798619 wrote:
    Using metasploit modules tnscmd and sid_enum (http://www.metasploit.com) or tnscmd (www.jammed.com/~jwa/hacks/security/tnscmd/tnscmd). The request to Oracle 8.1.7.0.0 tns-listener: (COMMAND=STATUS).
    The result (* obscured):
    (DESCRIPTION=(TMP=)(VSNNUM=*********)(ERR=0)(ALIAS=LISTENER)(SECURITY=ON)(VERSION=TNSLSNR for Solaris: Version 8.1.7.0.0 - Production)(START_DATE=********)(SIDNUM=1)(LOGFILE=***********)(PRMFILE=************)(TRACING=off)(UPTIME=321588456)(SNMP=OFF))(ENDPOINT=(HANDLER=(STA=ready)(HANDLER_MAXLOAD=0)(HANDLER_LOAD=0)(ESTABLISHED=0)(REFUSED=0)(HANDLER_ID=**************)(PRE=ttc)(SESSION=NS)(DESCRIPTION=(ADDRESS=(PROTOCOL=ipc)(KEY=TEST123))))),,(ENDPOINT=(HANDLER=(STA=ready)(HANDLER_MAXLOAD=0)(HANDLER_LOAD=0)(ESTABLISHED=0)(REFUSED=0)(HANDLER_ID=**************)(PRE=ttc)(SESSION=NS)(DESCRIPTION=(ADDRESS=(PROTOCOL=ipc)(KEY=EXTPROC))))),,(ENDPOINT=(HANDLER=(STA=ready)(HANDLER_MAXLOAD=0)(HANDLER_LOAD=0)(ESTABLISHED=0)(REFUSED=0)(HANDLER_ID=*********************)(PRE=ttc)(SESSION=NS)(DESCRIPTION=(ADDRESS=(PROTOCOL=tcp)(HOST=testlab)(PORT=1521))))),,(SERVICE=(SERVICE_NAME=TEST123)(INSTANCE=(INSTANCE_NAME=TEST123)(NUM=1)(INSTANCE_CLASS=ORACLE)(NUMREL=1))),,
    Without credentials but with "SECURITY=ON" are obtained:
    Version: TNSLSNR for Solaris: Version 8.1.7.0.0 - Production
    Logfile: *********
    Sid: TEST123
    Hostname: testlab
    Uptime: 321588456
    According to "documentation in internet", with "SECURITY=ON", the password is configured (for example http://www.integrigy.com/files/Integrigy_Oracle_Listener_TNS_Security.pdf).
    I hope I am wrong :)Having no knowledge of how the cited tools work, I'll have to defer ...

  • A timely bit of security news

    Just in time for the Malware & Security Event, MSNBC reports that researchers at Columbia University claim to have "discovered a new class of computer security flaws that could impact millions of businesses, consumers, and even government agencies."  The flaw exists in HP printers, and perhaps others, and the researchers claim it could allow criminals to remotely control the printer with a list of horribles that could follow.
    Original MSNBC article:  http://redtape.msnbc.msn.com/_news/2011/11/29/9076​395-exclusive-millions-of-printers-open-to-devasta​...
    Follow up on InfoWorld: http://www.infoworld.com/t/hacking/security-resear​chers-say-hp-printers-vulnerable-hackers-180253
    ==============================
    Administrator, SpywareHammer.com
    Mentor, SpywareHammer Academy

    HP Press Release:  HP Refutes Inaccurate Claims; Clarifies on Printer Security
    Microsoft MVP, Consumer Security
    Take a walk through the "Security Garden" -- Where Everything is Coming up Roses!
    Twitter: http://twitter.com/SecurityGarden
    Security Information and Malware Removal @LandzDown Forum

  • How do I unsplit the Hard drive?

    I am new to mac and i got this mid 2010 model of macbook white. I noticed that my hard drive is split to two parts and as I download apps and all, they all go to the Macintosh HD while the other "untitled" HD always has this yellow exclamation point that says I cant save a file there.. I opened it and there are a lot of stuff in it that I do not recognize but I cant seem to delete them.
    That "untitled" HD is taking up half of my 250GB memory which I will really need so can anyone here tell me how to make it just one part and scrap out the other one?
    thanks!
    Juls

    Glad you got it solved.
    But I really, really recommend erasing everything and reinstalling. With a pre-owned Mac there's no knowing what hacks, security holes, pirated software, keyloggers, credit card sniffers, or other junk that may have been left on it by any previous owners. Using a pre-owned Mac's software as-is, is a Very High Security Risk. I don't even hook a used Mac up to the internet until it's had a reformat and reinstall of all software.

  • How do I TRANSFER CONTACTS (back up contacts) from iPhone 4s to Windows 7

    How do I TRANSFER CONTACTS (back up contacts) from iPhone 4s to Windows 7

    THANK YOU. Sorry for late response. Had to pick someone up. 
    randers4    - I decided to go with the My Contacts Backup app which produced success (I'll know for sure if I need to use the file)
    JoFlo57  - I understand that I could use iCloud but I'm a little on the paranoid side about everybody's data in one location... what with hackers getting into Sony's Playstation accounts and other infamous huge hacking security failures I frankly don't feel safe storing anything on iCloud.

  • System Preferences gone!!!! Noobie

    I recently purchased a G5 without the install disk and the System Preferences is missing in action and no where on the HD's...I looked everywhere!!! I do have an opportunity to purchase Leopard version 10.4, but can I upgrade back to my current version for free? Or is there some way of restoring the System Preferences without buying any new software?

    Boot up from your Leopard install DVD by inserting it, restarting, and holding down C at boot time.
    Then, follow the instructions to do an Erase & Install. This will completely wipe everything from the hard drive and reinstall everything from scratch.
    If that sounds like overkill, keep this in mind: When buying a used Mac, there's no telling what sort of hacks, security holes, pirated software, keyloggers, password sniffers, or other even riskier stuff that may have been left on it by its previous owner. Using such a pre-owned Mac when you don't know its history is a Very High Security Risk. I would never even hook a used Mac up to the internet without a reformat and reinstall from the original install discs.

  • Changing identity of a legally purchesed used MacBook

    Hi folks.
    I have just returned to the Apple wprld after too many years in the Windows netherworlds. I am currently an English teacher in Bandung, West Java, Indonesia.
    I have purchased a used MacBook 2,1. It is running 10.4.11.
    It was a completely legal purchase with bill of sale. Unfortunately the original OS discs were damaged.
    I wish to change the name of the computer (when I bring up About this Mac and more info, the original owner’s name comes up.) Additionally, I’d like to change the registraton at Apple’s database.
    The OS and software are all working great so I am hesitant to reinstall everything and start from scratch. Can I change the identity entered on the original set up?
    Thanks for your tolerance if is a too frequently asked question.
    Bob White

    You should get a set of replacement install discs (Apple might replace the damaged ones for you for a small shipping fee), or a newer retail OS X install disc, and reinstall everything from scratch.
    When acquiring as used Mac, there's no way of knowing what kind of hacks, security holes, malware, pirated software, or any other junk that may have been left on it by any previous owners. That's why it is very important to wipe a used Mac clean and reinstall everything from scratch before using it. Otherwise you are taking a very high security risk. I wouldn't put any personal data on a used Mac, or even connect it to the internet, until a wipe and reinstall.

  • Complete business server/client framework?

    We would like to know which free and well-documented solutions we can use for:
    - persistence framework
    - business data object distribution from server to clients including change notification, server and client side caching and client side locking per user.
    - (hacker) security for the above
    - User/group based rights.
    - Swing MVC framework
    - Creating Swing data entry component with default functionality such as save, undo/redo and change checking.
    Details below...
    We have made an in-house client/server banqueting program from the ground up in (almost) pure Java. It is NOT web based, and we don't have any experience in using J2EE technologies (except for connecting to a mail server). What started out small became a quite large application that works nicely but is hard to maintain. It is time to do some major refactoring.
    I dare to claim that almost all the problems we are facing (see below) can be found in any serious client/server business application.
    Having said that, I find it quite difficult to find the right solutions for our project in the large place that is the internet. It would be a waste to spend days learning something only to find out it is not the way to go.
    So I hope some of you can kindly suggest the right Java frameworks to solve our problems and reduce our ad hoc spaghetti code... Preferably, these frameworks should be used by many other developers and be well documented.
    Current architecture:
    Server:
    Connects to a MSSQLServer database, creates POJO data objects (mapped mostly 1 on 1 with DB tables) and can provide these objects and simple reporting services (PDF, Word XML) to multiple clients over RMI.
    The "writable" objects that clients request can be locked by a client before saving. When a client saves, or when the status of the lock changes, an event is pushed to all clients.
    Client:
    Connects to the server with username + password.
    Uses Swing to show components like: a calendar with reservations, a reservation entry screen (including products), a customer entry screen, a product screen, etc...
    Internally our system is much more complicated than it should be.
    Some of the current major flaws:
    1) adding a new table/object requires adaptation of at least 4 classes on the server and one HUGE data access class on the client and the creation of 4 different MSSQL stored procedures (selecting, saving = inserting, updating).
    2) logging in over RMI is not done over an encrypted channel.
    We have some concerns with the security over RMI (and our use of it).
    * Is it possible for a hacked client to inject code into the server?
    * It may be possible in our design that clients can spoof being another user.
    * When a client saves an object, the server pushes this object to
    all the other clients using remote method calls from server to the other clients. If I'm not mistaken we have to be very careful with RMI that one of these clients cannot block the code execution by not returning from this call...
    3)We would like to have user groups that have rights for specific
    objects such as allow nothing, allow read, allow write, etc...
    4) our client side data access class does not automatically provide caching requiring us to create more or less ad hoc caches
    5) Swing does NOT have a strict (enforced) model-view-controller architecture. Our client has severely mixed application logic with representation logic.
    6) We have a few Swing components for data entry in data Objects we request from the server. They share functionality (and buttons) such as save, reload and popping up messages like "do you wish to save the changes?" none of these default functionalities have been abstracted, so it's often a matter of copy/paste and cluttered code.
    When properly abstracted to a model undo/redo functionality might also automatically possible without extra programming...
    To overcome point 1) we could use an Object to Relational mapping framework such as Hibernate or Cayenne.
    To overcome point 2) and 3) we would like to be able to distribute the objects to the clients on the clients demand. The framework for this should include client side cache and the possibility for locking an object and receiving notifications from the server when another client changes the object.
    (It would also be nice if all logged in clients can listen to a collection of objects (e.g. Products) and get notified when some client adds a new product without needing the lock on the Product collection.)
    Preferably this framework should be hacker proof.
    To overcome point 4) we would like to have an MVC framework for Swing with which we can bind fields in a data object or model to a view. When data is entered in the view the model is automatically updated and other views are updated, without the need of all those Swing specific listeners. Whenever the data is updated programmatically the views are also automatically updated.
    For this I found JStaple as part of Cayenne, but I don't know if this is a mature and well-documented system.

    After a day of checking out the Cayenne tool I have discovered that it works very well for creating a client/server "persistent" application (including web support through Servlets/JSP).
    There is no such thing as "pessimistic locking" of objects and notifications of other clients though... This is a major drawback, so the quest for a great framework isn't over yet...
    Edit: Spring Framework!!!
    After a lot of time researching I am coming to the conclusion that (at least) using the Spring framework is the best bet.
    The Spring Rich Client Project has a sample client application which can be run on top of their sample webserver application (PetClinic example).
    http://spring-rich-c.sourceforge.net/
    Spring can integrate with just about any Java libraries, frameworks and API's available, and has thought about almost all of the concerns I have.
    The beauty is, that many concerns can be configured transparently using XML files and do not clutter your code (think about Acegi security, transaction management, etc...). This also enables you in easily switching many technologies. (e.g. if you use Hibernate/JPA switching a db is as easy as changing a few lines of settings.)
    There are however a few things I am still missing:
    * Undo/redo support in the client (preferably transparent to your code)
    * Pessimistic locking at the application level. For this I might work together with people from the Terracotta "distributed virtual machine" (which also looks like a very good solution for scaling existing applications), or check the Spring forums if something like that has already been implemented.
    Edited by: Strider80 on Nov 22, 2007 6:05 PM

  • IPhoto missing after reinstalling leopard

    After reinstalling Leopard on my new macBook, iPhoto is missing from the Applications. Has anyone any ideas how to solve this? I can't find the individual install for iPhoto either on the install disks.
    Thanks

    Terence Devlin wrote:
    so I'm buying my own copy of Leopard
    Why?
    Because the copy of Leopard she has is unlicensed if she doesn't have the install disc.
    Do I have to erase the installed one before I install my new copy?
    If 10.5 is working why are you going to re-install?
    Well, security for one. I would never, never, never use a pre-owned Mac without completely erasing and reinstalling everything from scratch. Who knows what hacks, security holes, pirated software, or other junk may have been left on it by its previous owner. We already know that the seller included a stolen copy of Leopard. Maya would be doing everything right by buying a fresh copy of Leopard and reinstalling.
    And if iphoto is going to be missing, could I install it from the Tiger disk that came with my desktop?
    System Restore Disks are particular to the model they come with. Also, it's a breach of the licence.
    That's wrong. Software on a system restore disc may be transferred to a different Mac as long as the software is no longer installed on the first Mac. And while some have reported difficulty getting OS X to install on a different model, I think it's likely that the iLife apps will work.
    If Maya has no system restore CDs for her iBook at all, she should contact the seller and demand them. If the seller told Maya that Leopard or any other Apple software is included, and then included no install discs, the seller defrauded Maya.

  • Changed file viewing settings for Guest account, now iMac won't boot :(

    I'll start this off by mentioning that I'm not really a techie type person, but I'll do my best to describe what I did as accurately as possible. And I'm pretty good at following layman's terms troubleshooint advice!
    I recently decided to move my iMac into the living room of my apartment. I have never found the need to create a Guest account, but I figured it might be convenient for..well, a guest every now and then. But when I created the guest account I discovered very quickly that they would have access to all of my photos, documents, movies, etc. via the "view all documents" "view all photos" tabs on the left-hand side of the Finder window. I googled what to do and people were saying that it is best to change the viewing options of particular folders via the "get info" tab when you right-click on a folder. There were three categories, the first one I believe was Admin or the main user, the second is "wheel" and the third says "Everyone". I changed the "Everyone" access on the folders I wanted private from read-writable to "none". I left the "wheel" and "admin" categories alone. I also did this to the utilities folder, and the library under the assumption it would only affect guest access to these files, not admin access!
    Also, under the Account Preferences tab in the Apple menu I disabled the viewing of shared folders for the guest. I also disabled automatic login.
    Next thing I know, while I'm under the guest login trying to test out my security updates, I see I can't click on anything! Or open anything! I can't open the finder at all, I can't open the internet, I can't even get to the Apple drop-down menu. I couldn't even log out of guest. I had to turn off my computer without shutting it down. I turned it back on, and it went through the motions of booting up until the blue screen with the grey dashed loading circle (no beach ball, thank god). It acts like it will proceed beyond that point, the grey circle disappears for a moment, but then nothing happens and that process starts over. Like it's stuck and can't find it's own files. I also notice a tiny white square in the upper left-hand corner of the blue screen if that means anything.
    I don't know what the heck I did. I think I somehow managed to block my own admin access (is that even possible??).
    -Shayna

    You need to get the install discs, erase the hard drive, and reinstall all the software from scratch. When acquiring a used Mac there's no way to know what condition its software is in... there might be hacks, security holes, pirated software, keyloggers, credit card sniffers, or other even riskier stuff on it. Using a pre-owned Mac's software as-is is a Very High Security Risk. Your Mac's software is obviously distressed. What's more, you are not licensed to use any Apple software unless you own and are in possession of the install discs.
    Get the discs and reinstall. Apple will send you new ones that match your model for a small shipping fee. Call them and provide your Mac's serial number.

  • Adding sounds on MMS

    hi
    i just bought the iphone 3gs n i was wondering how do i add sounds on my mms attatchment besides pictures.....
    I`m running my iphone 3gs on 3.01
    thx

    i agree, but you cant blame apple since this thing is an iPOD that has a phone feature, not the other way arround
    but it would have been great if apple had included all of the basic phone features on os 3.01, not just the sms hack security
    maybe we can get it on the future os upgrade....

  • Resetting the original administrator account password

    Hi All
    Is there a way to Reset the original administrator account password if I do not have any install media (IE: No Leopard Install DVD).
    I bought a Mac Mini and cannot get hold of the seller to get the password and I have no DVD to boot from.
    Thanks
    Garry

    Király wrote:
    V.K. is exactly right; if the seller advertised this Mac as including Leopard, and then gave you no install disc, then you were defrauded. Contact him and ask for the disc, or ask him to refund some of the money so you can obtain a new set.
    An additional thing to consider: When acquiring a used Mac, there's no telling what sort of hacks, security holes, pirated software, password sniffers, or other even riskier junk that may have been left on it by any previous users. A complete reformat and reinstall from the original install discs is the only prudent thing to do with a used Mac. I don't even hook a used Mac up to the internet until after a fresh reformat and reinstall. Anything less is a Very High Security Risk™.
    +1 on all of that. I would never even consider running a second hand mac without doing an erase and install.

  • Quick leopard/tiger question

    Okay my macbook came with tiger since then the hard drive has broken, a have been sold a hard drive that has leopard installed on it. I would like to reset the OS back to how it came with leopard, can i do this without the disks, I only have tiger disks not leopard. If not can the programs such as i photo be reset as the seller even left family photos on it which i don't want.
    thanks andy

    No, if you have a copy of Leopard installed, but have never owned the installation DVD, then you have an unlicensed copy. You should delete Leopard right away and go back to Tiger. Put in your Tiger install disc and do an Erase & Install.
    After doing that, If you want to go back to using Leopard, look around for an authentic Leopard install disc. Apple might still have some available for sale over the phone, or look for old copies on eBay.
    In any case, when you buy any used hardware, like a hard drive, from an unknown previous owner, you should not trust or use any software that may be installed on it. Especially an operating system. There's no way to tell what sort of hacks, security holes, pirated software, or other junk may have been left on it by any previous users. Using such software is a very high security risk. A reformat and fresh install from original install discs that you legally own is the only right and safe thing to do.

  • Is my new Macbook Pro really NEW?

    I bought a previous gen Macbook Pro from Amazon (new, instock) on January 23, 09. I burned my first DVD a week later. Wanting to check burn speed I checked the DiskBurning log and found three attempts at CD burning in October, November and December...BEFORE I ordered the system. Multiple files liked "HIKING"and HTML files. I know these are not mine.
    I immediately checked my serial number on Apple's website. It showed that my warranty was due to expire in November. Once again...I ordered and received this Macbook Pro in January. Apple tech support told me she "thought" the warranty started when Amazon bought the machine for resale...hence November. She extended the warranty to January of 2010.
    Does this seem strange to you? I had a couple friends check their newer systems and these files are not there.

    Your MacBook Pro is definitely not "new". At some point it was booted up, configured, and used for a time before being repackaged. Perhaps it was ordered by a different customer and then returned.
    In any case, I would reformat the hard drive and reinstall OS X and all your software from the original install discs or from fresh downloads, and then restore your personal data from backup. With a used Mac, there is no way of knowing what kinds of hacks, security holes, or other junk may have been left on it from any previous usage.

  • How can I make my Apple ID security? It has been hacked three times in a week!

    Just in a week, I found my apple id(this id) has been hacked for three times!
    When I was trying to login in to the ITunes Connect, it returned following error,
        Your Apple ID or password was entered incorrectly.
    I'm sure I entered the password correctly that I checked it many times and it's never happens before. So every time it happens, I use the forget password tool to reset the password. Just in a week, the incorrect password occurred 3 TIMES and I have reseted my password 3 TIMES to get control back.
    I'm a developer so first time it happens I did aware of there might be hacker. So I cleared all password cache in my machine, scan virus and reset the password of Apple ID and my mailbox in a more complex letters.
    However, ever I did so, my password still goes wrong and the error happens again and again.
    And one thing I can't understand in this story is,
         - Every time I reset my password I got an email notification, it always works, during my 3 resets.
         - When my password is hacked (I can just assume it's a hack), there's no email notification. I can almost sure the email is not deleted, because no matter how fast it's delete, my mobile should receive a popup anyway.
    Now I have tried everything I can but my account is still not safe. I want report this issue to Apple that they can figure out the problem, to avoid a bigger security disaster. But I could not find a contact from apple for this problem, I sent a mail [email protected] but no reply. It's so terrible...
    So i ask for help in this forum, I'd appreciate if anybody can help either security suggestion to me or help find the contact of apple.

    account disabled for security reasons: http://support.apple.com/en-us/TS2446

Maybe you are looking for