Has my iPhone 5 been compromised?

I keep getting texts from Canadian numbers saying "Hydro2 has logged onto the network" ... It's a random (587) number every time and happens often. Any thoughts?

If you're getting text messages, it's usually not your phone that's compromised but the phone number.
Try blocking the messages:
http://support.apple.com/kb/ht5845

Similar Messages

  • Why has the iphone 5 been discontinued??

    Why has the iphone 5 been discontinued? how much can i expect if i sell my current iphone 5?

    Belinda Rodricks wrote:
    Yea i regret buying it now. Worse move made by Apple to discontinue it
    If you believe it was a bad move by Apple to discontinue it, that would seem to indicate you think it's a good phone. So why do you regret buying it? Does it do less today than it did before you found out it was discontinued? Whether or not Apple still sell it actually has no affect on its performance. Hard to believe, I know!

  • Strange behavior on my network... Has my home system been compromised?  A disgruntled employee (sysAdmin) could have full access...worried...

    I have been experiencing a lot of strange behavior on my home network ever since a disgruntled employee was let go.  He was a server admin and had root access to my home network - where I run my business.  I am getting a ton of span now, my websites were all infected with xss hacks, and many of my accounts are blacklisted.  I did a clean install and DoD erase pass on my hardware, but I still see a lot of errors and my hosts file and VMs look very odd.  not to mention the extremely odd loops in my ifconfig...  Any help? 
    Here is an output of 'ifconfig'
    (FYI, I am a software dev, so feel free to speak the jargon and ask for specific things)
    (I hid any identifying info with either xx or my:ma:ca:dd:re:ss or something like that)
    lo0: flags=8049<UP,LOOPBACK,RUNNING,MULTICAST> mtu 16384
        options=3<RXCSUM,TXCSUM>
        inet6 ::1 prefixlen 128
        inet 127.0.0.1 netmask 0xff000000
        inet6 fe80::1%lo0 prefixlen 64 scopeid 0x1
        nd6 options=1<PERFORMNUD>
    gif0: flags=8010<POINTOPOINT,MULTICAST> mtu 1280
    stf0: flags=0<> mtu 1280
    en0: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500
        options=10b<RXCSUM,TXCSUM,VLAN_HWTAGGING,AV>
        ether th:is:ad:dr:es:s1
        inet6 fxxx::xx2a:xxff:fxxx:fxxx%en0 prefixlen 64 scopeid 0x4
        inet 10.xx.xx.x netmask 0xffffff00 broadcast 10.xx.xx.xxx
        nd6 options=1<PERFORMNUD>
        media: autoselect (1000baseT <full-duplex,flow-control,energy-efficient-ethernet>)
        status: active
    en1: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500
        ether th:is:ad:dr:es:n1
        inet6 fe80::e2f8:47ff:fe29:6ec2%en1 prefixlen 64 scopeid 0x5
        inet 10.xx.xx.x netmask 0xffffff00 broadcast 10.xx.xx.xxx
        nd6 options=1<PERFORMNUD>
        media: autoselect
        status: active
    fw0: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 4078
        lladdr 70:cd:xx:ff:fe:xx:xx:xx
        nd6 options=1<PERFORMNUD>
        media: autoselect <full-duplex>
        status: inactive
    en2: flags=8922<BROADCAST,SMART,PROMISC,SIMPLEX,MULTICAST> mtu 1500
        options=60<TSO4,TSO6>
        ether my:wi:fi:ma:ca:dd
        media: autoselect <full-duplex>
        status: inactive
    bridge0: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500
        options=63<RXCSUM,TXCSUM,TSO4,TSO6>
        ether th:is:ad:dr:es:mtu
        Configuration:
            id 0:0:0:0:0:0 priority 0 hellotime 0 fwddelay 0
            maxage 0 holdcnt 0 proto stp maxaddr 100 timeout 1200
            root id 0:0:0:0:0:0 priority 0 ifcost 0 port 0
            ipfilter disabled flags 0x2
        nd6 options=1<PERFORMNUD>
        media: <unknown type>
        status: inactive
    p2p0: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> mtu 2304
        ether th:is:ad:dr:es:p2p0
        media: autoselect
        status: inactive
    vmnet1: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500
        ether 00:50:56:c0:00:01
        inet 192.168.48.1 netmask 0xffffff00 broadcast 192.168.48.255
    vmnet8: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500
        ether 00:50:56:c0:00:08
        inet 192.168.219.1 netmask 0xffffff00 broadcast 192.168.219.255
    ppp0: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 1396
        inet my.ded.vpn.xx --> 192.xxx.xxx.xxx netmask 0xffffff00
    nooooooo:~ cearnhart$ ifconfig
    lo0: flags=8049<UP,LOOPBACK,RUNNING,MULTICAST> mtu 16384
        options=3<RXCSUM,TXCSUM>
        inet6 ::1 prefixlen 128
        inet 127.0.0.1 netmask 0xff000000
        inet6 fe80::1%lo0 prefixlen 64 scopeid 0x1
        nd6 options=1<PERFORMNUD>
    gif0: flags=8010<POINTOPOINT,MULTICAST> mtu 1280
    stf0: flags=0<> mtu 1280
    en0: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500
        options=10b<RXCSUM,TXCSUM,VLAN_HWTAGGING,AV>
        ether th:is:ad:dr:es:s1
        inet6 xxx::xxxx:xxff:xxxx:fxx2%en0 prefixlen 64 scopeid 0x4
        inet 10.xx.xx.x netmask 0xffffff00 broadcast 10.x.x.xxx
        nd6 options=1<PERFORMNUD>
        media: autoselect (1000baseT <full-duplex,flow-control,energy-efficient-ethernet>)
        status: active
    en1: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500
        ether th:is:ad:dr:es:n1
        inet6 fxxx::xxf8:47ff:fxx:6xx%en1 prefixlen 64 scopeid 0x5
        inet 10.x.x.x netmask 0xffffff00 broadcast 10.x.x.xxx
        nd6 options=1<PERFORMNUD>
        media: autoselect
        status: active
    fw0: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 4078
        lladdr xx:xx:xx:ff:fe:xx:5f:xx
        nd6 options=1<PERFORMNUD>
        media: autoselect <full-duplex>
        status: inactive
    en2: flags=8922<BROADCAST,SMART,PROMISC,SIMPLEX,MULTICAST> mtu 1500
        options=60<TSO4,TSO6>
        ether xx:00:1e:xx:xx:xx
        media: autoselect <full-duplex>
        status: inactive
    bridge0: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500
        options=63<RXCSUM,TXCSUM,TSO4,TSO6>
        ether th:is:ad:dr:es:mtu
        Configuration:
            id 0:0:0:0:0:0 priority 0 hellotime 0 fwddelay 0
            maxage 0 holdcnt 0 proto stp maxaddr 100 timeout 1200
            root id 0:0:0:0:0:0 priority 0 ifcost 0 port 0
            ipfilter disabled flags 0x2
        nd6 options=1<PERFORMNUD>
        media: <unknown type>
        status: inactive
    p2p0: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> mtu 2304
        ether th:is:ad:dr:es:p2p0
        media: autoselect
        status: inactive
    vmnet1: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500
        ether 00:50:56:c0:00:01
        inet 192.168.48.1 netmask 0xffffff00 broadcast 192.168.48.255
    vmnet8: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500
        ether 00:50:56:c0:00:08
        inet 192.168.219.1 netmask 0xffffff00 broadcast 192.168.219.255

    If you know or suspect that a hostile intruder has either had physical access to it, or has been able to log in remotely, then there are some steps you should take to make sure that the computer is safe to use.
    First, depending on the circumstances, computer tampering may be a crime, a civil wrong, or both. If there's any chance that the matter will be the subject of legal action, then you should do nothing at all without consulting a lawyer or the police. The computer would be the principal evidence in such a case, and you don't want to contaminate that evidence.
    Running any kind of "anti-virus" software is pointless. If I broke into a system and wanted to leave a back door, I could do it in a way that would be undetectable by those means—and I don't pretend to any special skill as a hacker. You have to assume that any intruder can do the same. Commercial keylogging software—which has legitimate as well as illegitimate uses—won't be recognized as malware, because it's not malware.
    The only way you can be sure that the computer is not compromised is to erase at least the startup volume and restore it to something like the status quo ante. The easiest approach is to recover the entire system from a backup that predates the attack. Obviously, that's only practical if you know when the attack took place, and it was recent, and you have such a backup. You will lose all changes to data, such as email, that were made after the time of the snapshot. Some of those changes can be restored from a later backup.
    If you don't know when the attack happened, or if it was too long ago for a complete rollback to be feasible, then you should erase and install OS X. If you don't already have at least two complete, independent backups of all data, then you must make them first. One backup is not enough to be safe.
    When you restart after the installation, you'll be prompted to go through the initial setup process for a new computer. That’s when you transfer the data from a backup in Setup Assistant.
    Select only users in the Setup Assistant dialog—not Applications, Other files and folders, or Computer & Network Settings. Don't transfer the Guest account, if it was enabled.
    Reinstall third-party software from original media or fresh downloads—not from a backup, which may be contaminated.
    Unless you were the target of an improbably sophisticated attack, this procedure will leave you with a clean system. If you have reason to think that you were the target of a sophisticated attack, then you need expert help.
    That being done, change all Internet passwords and check all financial accounts for unauthorized transactions. Do this  after the system has been secured, not before.

  • Why has my iphone 4g been crashing in apps and camera wont open?

    I will be playing in an app and it will randomly crash and the camera once open it shows the shutters closed and i can leave it open for as long as it takes for my phone to relock and it still wont open. I need to know whats wrong. thanks all.

    did you get the most recent update? also you might have a lot of apps you need to update, or have too many apps open. to update apps just go to the app store and update all, and to close appls double click your home button and press down on one of the apps that comes up until it starts to wiggle and a - comes up, then touch that to close all your apps.

  • I'm afraid my iPhone 4S might have a virus/be hacked.  Is this possible and if so, how can I find out if it has been compromised?

    I'm afraid my iPhone 4S has a virus or has been hacked.  Just in the last day or so my battery life gets used up a lot faster and I have all of a sudden started receiving a lot of spam email.   How can I find out if my phone has been compromised?

    Unless you left the iPhone in the possession of another person it could not be hacked...and unless it has been jailbroken it cannot get a virus.
    An email account can be hacked at the service provider's end...this has happened a number of times with gmail. 
    Do a reboot, hold both the power and home buttons until the apple logo appears and it restarts, ignoring the red slider if that appears.
    If that does not help the battery situation, make a backup of your content and then restore to factory condition, Settings > General > Reset > Erase All Content and Settings, and then restore from the backup you just made.
    Contact your email service provider and let them know you are getting material that could mean they have been hacked.

  • I am trying to change my primary email address for it has been compromised. the email address I am trying to change it to is my rescue email address? how do I change my primary email address?

    I am trying to change my primary address for it has been compromised. The email address I am trying to change it to is my "rescue" email address. How do I change my primary email address to my rescue email address? can I delete my rescue email address so I can use it as my primary?

    You will have to delete your rescue email address first, then go back and change your primary.
    Source: http://support.apple.com/kb/ht5312
    You can edit or delete your rescue email address at My Apple ID. To edit your rescue email address:
    Navigate to My Apple ID using your web browser.
    Click "Manage your account"
    When prompted, sign in using your Apple ID and password.
    Click Password & Security
    You'll be asked to answer 2 of your 3 security questions before you can make any modifications. If you are unable to remember your answers, you can choose to send an email to your rescue email to reset your security questions.
    Note: The option to send an email to reset your security questions and answers will not be available if a rescue email address is not provided. You will need to contact iTunes Store support in order to do so. 

  • I got a text message which had a link attached to it, i did click on the link, basically some job scam but on the link. Now i just want to find out if my phone has been compromised in anyway and what are the tell tell signs.

    I got a text message which had a link attached to it, i did click on the link, basically some job scam but on the link. Now i just want to find out if my phone has been compromised in anyway and what are the tell tell signs.

    your phone has not been compromised.  There have been no viruses, worms or trojan horses ever reported.

  • I think my account has been compromised. I just got a receipt for $10.69 today that I didn't spend. How do I get my money back?

    I think my account has been compromised. I just got a receipt for $10.69 today that I didn't spend. How do I get my money back?
    I've already submitted my problem to PayPal and they are investigating it. I need to get this reversed and my money back. It's hard enough saving for formula without some ******* buying **** with my information.
    Anyone else have this problem?

    It was a genuine email from iTunes, not a phishing attempt trying to get your account and payment details ?
    Viewing your account's purchase history : See your purchase history in the iTunes Store - Apple Support (on an iOS device you can view the last 90 days purchases via http://reportaproblem.apple.com)
    Phishing and similar emails : Phishing & Other Suspicious Emails
    Phishing emails : Identifying fraudulent "phishing" email - Apple Support
    Genuine iTunes emails : Identifying legitimate emails from the iTunes Store - Apple Support
    If it's a genuine email and it shows on your account's purchase history then contact iTunes Support : http://www.apple.com/support/itunes/contact/ - click on Contact iTunes Store Support on the right-hand side of the page, then Purchases, Billing & Redemption . And change your account's password e.g. by logging into it via the Store > View Account menu on your computer's iTunes, or via http://appleid.apple.com
    If it is a phishing email then forward it to Apple : [email protected] , and then delete it.

  • How to learn if the security on my 2009 macbook pro has been compromised?

    how to learn if the security on my 2009 macbook pro has been compromised?

    just my curiosity if there is a way to check this question out?

  • Has anyone else's iPhone battery been ruined by the IOS 8.2 update?

    Has anyone else's iPhone battery been ruined by the IOS 8.2 update?

    When fully charged I get about 5hrs in idle mode before the battery dies. When actively using, I'm lucky to get 1hr. I've changed all my settings to use as little battery as possible as suggested by many a website. I've also spent an hour on chat to an Apple 'Genius' who basically went through the settings with me. Also it now takes forever to charge my 5s. All was working fine, quick charge and decent battery life, before I updated to 8.2.

  • Why has the Facetime application been removed from the iphone in dubai.

    Why has the Facetime application been removed from the iphone  in dubai??

    You will have to contact the government to find out why they ordered it removed.  An iPhone purchased there can never have it added back in, even in a country where FaceTime is legal.

  • HT1766 my email has been compromised by a worm, can my ipad be infected. I do not use a computer only the tablet. My aol account is the email address that is going out with the evil emails. Help.Please....

    Hi, my Ipad 2 address book has been compromised by a worm....sending out weird messages using my aol account. Any ideas how to get rid of this?

    My email was hacked twice in March.
    The only way to avoid the problem is to add two step verification on your email accounts. 
    It's a pain to set up, but it prevents anyone from signing in to your account on another device you don't authorize.
    This is not an iPad virus, it is an email hack....

  • My safari has been compromised by a malware infection

    My safari 5 has been compromised by a malware infection and I need to reinstall but it will not reinstall from install disc and will not install from internet, any ideas? My service provider has solved the problem from his end but safari will not allow me access to my mail.

    Uninstalling and reinstalling Safari won't rid the hard drive of malware.
    Read here > http://www.reedcorner.net/guides/macvirus/
    safari will not allow me access to my mail.
    This is why setting up web based mail via your Mac Mail app is a better way to go. That way if you can't access your mail via a browser, you can access it via Mac Mail.
    I'm going by your profile: v10.6.8. See if you can reinstall Safari from here >  Safari 5.1

  • Has my iPhone been hacked? NEED HELP PLS

    I called a number in my contacts and as it was dialing, different strangers answer the call and I have no idea who they are. When they hang up, the dial tone resumes until another stranger picks up the phone. This happened once and after that it was back to normal. Has my iPhone been hacked?

    If your iPhone has not been jailbroken or out of your possession, it cannot be hacked.
    Sounds more like a problem with the phone service, especially since it was a one time thing.

  • TS1424 I believe the credit card online has been compromised and someone has purchased from iTunes without my permission. What can I do?

    What can I do if my credit card has been compromised and someone has used it to buy from the itunes Store?

    Wpgjets wrote:
    ... What does iTunes do to track the ones who steal CC numbers and use them to make iTunes purchases?
    What they do is up to them, but loss prevention may include suspending that Apple ID for purchases until such time the fraud is rectified. They may pursue the thief for chargebacks and fines from the issuing bank and take whatever other legal action they deem appropriate. In any event none of that involves you, presuming it's not your job to investigate criminal activity. As long as your payment method continues to be accepted by Apple, you don't have to do anything else.
    Changing your Apple ID password once in a while is a good idea though, and if Apple wants to compel you do so you will find out when you attempt to log in here or make a purchase. Be wary of "phishing" and never click on any links in an email that may appear to be from Apple, as authentic as it may seem. This is a popular way of stealing Apple IDs and all that it entails.

Maybe you are looking for