May Be Phishing?

I have recently begun receiving text messages stating my account is locked (I just logged in without issues) but would like confirmation this is a scam. The messages read "(from Verizon) For security purposes, your VZW account has been locked, visit this http://myvzwphonesupport.id1945.com and confirm data.  It appears with the ID 600070000001, which is similar to another text I received from Verizon. Just want to be cautious!!

The website listed alone says scam to me. Forward it to 7726 (SPAM) and follow the instructions in the reply.

Similar Messages

  • Page appeared on closing my browser claiming that I am not using latest version, am using version 30 may be phishing scam

    see above

    It sounds like phishing. Does this occur every time or could it have been a pop-under page from a random site that doesn't necessarily indicate anything persistent on your computer?
    One of your extensions has been said to often be bundled with other software, so you might check the Windows Control Panel, Add/Remove Programs, to see whether anything unexpected is found there. Click the "Installed on" column heading to group by date, which is helpful in spotting bundle items.
    If you notice any other strange symptoms, see our support article for suggested scanning/cleaning tools: [[Troubleshoot Firefox issues caused by malware]].

  • I clicked on an email that I suspect may be phishing. How should I proceed?

    I clicked on a link on my iPhone. All of my contacts were deleted. How can this further affect my phone? Will whatever messed up my phone be able to firther access it? Thanks!

    nobody here would know as we have no idea what you clicked on, however simply clicking any kind of link on a phone cannot delete your contacts.

  • Apple Mail Evokes "Phishing" Notice on Recipient's PC

    An email correspondent with whom I've exchanged lots of emails recently got a Windows warning that several of my emails may be phishing. In checking the email headers I couldn't see anything amiss, except one of the emails was sent via an alternate smtp address, specifically one my wife uses for her MobileMe account on her IPhone and laptop which is also synched to my IMac.
    Would the use of such an email address trigger Windows to a (false) phishing warning, or might there be a more likely explanation?

    If you send an email from one domain (e.g [email protected]), but use another smtp server (e.g smtp.otherdomain.com), then your emails will often be flagged as suspicious.

  • ClamAV fails to scan for viruses in emails [CLAWS MAIL]

    I've recently switched from Thunderbird to Claws Mail and ran into one small, but annoying, problem.
    I want to use ClamAV + the clamav extension for claws mail to scan for viruses, however it does seem to have permission problems.
    clamd is running, user and group clamav all have the relevant permissions as far as I can tell, however upon scanning my mail, I always end up with the following error:
    Scanning error:
    /home/username/.claws-mail/mimetmp/0000000e.mimetmp: lstat() failed: Permission denied. ERROR
    Here's my clamd.conf:
    ## Please read the clamd.conf(5) manual before editing this file.
    # Comment or remove the line below.
    #Example
    # Uncomment this option to enable logging.
    # LogFile must be writable for the user running daemon.
    # A full path is required.
    # Default: disabled
    LogFile /var/log/clamav/clamd.log
    # By default the log file is locked for writing - the lock protects against
    # running clamd multiple times (if want to run another clamd, please
    # copy the configuration file, change the LogFile variable, and run
    # the daemon with --config-file option).
    # This option disables log file locking.
    # Default: no
    #LogFileUnlock yes
    # Maximum size of the log file.
    # Value of 0 disables the limit.
    # You may use 'M' or 'm' for megabytes (1M = 1m = 1048576 bytes)
    # and 'K' or 'k' for kilobytes (1K = 1k = 1024 bytes). To specify the size
    # in bytes just don't use modifiers.
    # Default: 1M
    #LogFileMaxSize 2M
    # Log time with each message.
    # Default: no
    LogTime yes
    # Also log clean files. Useful in debugging but drastically increases the
    # log size.
    # Default: no
    #LogClean yes
    # Use system logger (can work together with LogFile).
    # Default: no
    #LogSyslog yes
    # Specify the type of syslog messages - please refer to 'man syslog'
    # for facility names.
    # Default: LOG_LOCAL6
    #LogFacility LOG_MAIL
    # Enable verbose logging.
    # Default: no
    #LogVerbose yes
    # Log additional information about the infected file, such as its
    # size and hash, together with the virus name.
    #ExtendedDetectionInfo yes
    # This option allows you to save a process identifier of the listening
    # daemon (main thread).
    # Default: disabled
    PidFile /run/clamav/clamd.pid
    # Optional path to the global temporary directory.
    # Default: system specific (usually /tmp or /var/tmp).
    TemporaryDirectory /tmp
    # Path to the database directory.
    # Default: hardcoded (depends on installation options)
    DatabaseDirectory /var/lib/clamav
    # Only load the official signatures published by the ClamAV project.
    # Default: no
    OfficialDatabaseOnly yes
    # The daemon can work in local mode, network mode or both.
    # Due to security reasons we recommend the local mode.
    # Path to a local socket file the daemon will listen on.
    # Default: disabled (must be specified by a user)
    LocalSocket /var/lib/clamav/clamd.sock
    # Sets the group ownership on the unix socket.
    # Default: disabled (the primary group of the user running clamd)
    LocalSocketGroup clamav
    # Sets the permissions on the unix socket to the specified mode.
    # Default: disabled (socket is world accessible)
    #LocalSocketMode 660
    # Remove stale socket after unclean shutdown.
    # Default: yes
    #FixStaleSocket yes
    # TCP port address.
    # Default: no
    #TCPSocket 3310
    # TCP address.
    # By default we bind to INADDR_ANY, probably not wise.
    # Enable the following to provide some degree of protection
    # from the outside world.
    # Default: no
    #TCPAddr 127.0.0.1
    # Maximum length the queue of pending connections may grow to.
    # Default: 200
    #MaxConnectionQueueLength 30
    # Clamd uses FTP-like protocol to receive data from remote clients.
    # If you are using clamav-milter to balance load between remote clamd daemons
    # on firewall servers you may need to tune the options below.
    # Close the connection when the data size limit is exceeded.
    # The value should match your MTA's limit for a maximum attachment size.
    # Default: 25M
    #StreamMaxLength 10M
    # Limit port range.
    # Default: 1024
    #StreamMinPort 30000
    # Default: 2048
    #StreamMaxPort 32000
    # Maximum number of threads running at the same time.
    # Default: 10
    #MaxThreads 20
    # Waiting for data from a client socket will timeout after this time (seconds).
    # Default: 120
    #ReadTimeout 300
    # This option specifies the time (in seconds) after which clamd should
    # timeout if a client doesn't provide any initial command after connecting.
    # Default: 5
    #CommandReadTimeout 5
    # This option specifies how long to wait (in miliseconds) if the send buffer is full.
    # Keep this value low to prevent clamd hanging
    # Default: 500
    #SendBufTimeout 200
    # Maximum number of queued items (including those being processed by MaxThreads threads)
    # It is recommended to have this value at least twice MaxThreads if possible.
    # WARNING: you shouldn't increase this too much to avoid running out of file descriptors,
    # the following condition should hold:
    # MaxThreads*MaxRecursion + (MaxQueue - MaxThreads) + 6< RLIMIT_NOFILE (usual max is 1024)
    # Default: 100
    #MaxQueue 200
    # Waiting for a new job will timeout after this time (seconds).
    # Default: 30
    #IdleTimeout 60
    # Don't scan files and directories matching regex
    # This directive can be used multiple times
    # Default: scan all
    #ExcludePath ^/proc/
    #ExcludePath ^/sys/
    # Maximum depth directories are scanned at.
    # Default: 15
    #MaxDirectoryRecursion 20
    # Follow directory symlinks.
    # Default: no
    #FollowDirectorySymlinks yes
    # Follow regular file symlinks.
    # Default: no
    #FollowFileSymlinks yes
    # Scan files and directories on other filesystems.
    # Default: yes
    #CrossFilesystems yes
    # Perform a database check.
    # Default: 600 (10 min)
    #SelfCheck 600
    # Execute a command when virus is found. In the command string %v will
    # be replaced with the virus name.
    # Default: no
    #VirusEvent /usr/local/bin/send_sms 123456789 "VIRUS ALERT: %v"
    # Run as another user (clamd must be started by root for this option to work)
    # Default: don't drop privileges
    User clamav
    # Initialize supplementary group access (clamd must be started by root).
    # Default: no
    #AllowSupplementaryGroups no
    # Stop daemon when libclamav reports out of memory condition.
    #ExitOnOOM yes
    # Don't fork into background.
    # Default: no
    #Foreground yes
    # Enable debug messages in libclamav.
    # Default: no
    #Debug yes
    # Do not remove temporary files (for debug purposes).
    # Default: no
    #LeaveTemporaryFiles yes
    # Detect Possibly Unwanted Applications.
    # Default: no
    #DetectPUA yes
    # Exclude a specific PUA category. This directive can be used multiple times.
    # See http://www.clamav.net/support/pua for the complete list of PUA
    # categories.
    # Default: Load all categories (if DetectPUA is activated)
    #ExcludePUA NetTool
    #ExcludePUA PWTool
    # Only include a specific PUA category. This directive can be used multiple
    # times.
    # Default: Load all categories (if DetectPUA is activated)
    #IncludePUA Spy
    #IncludePUA Scanner
    #IncludePUA RAT
    # In some cases (eg. complex malware, exploits in graphic files, and others),
    # ClamAV uses special algorithms to provide accurate detection. This option
    # controls the algorithmic detection.
    # Default: yes
    #AlgorithmicDetection yes
    ## Executable files
    # PE stands for Portable Executable - it's an executable file format used
    # in all 32 and 64-bit versions of Windows operating systems. This option allows
    # ClamAV to perform a deeper analysis of executable files and it's also
    # required for decompression of popular executable packers such as UPX, FSG,
    # and Petite. If you turn off this option, the original files will still be
    # scanned, but without additional processing.
    # Default: yes
    #ScanPE yes
    # Executable and Linking Format is a standard format for UN*X executables.
    # This option allows you to control the scanning of ELF files.
    # If you turn off this option, the original files will still be scanned, but
    # without additional processing.
    # Default: yes
    #ScanELF yes
    # With this option clamav will try to detect broken executables (both PE and
    # ELF) and mark them as Broken.Executable.
    # Default: no
    #DetectBrokenExecutables yes
    ## Documents
    # This option enables scanning of OLE2 files, such as Microsoft Office
    # documents and .msi files.
    # If you turn off this option, the original files will still be scanned, but
    # without additional processing.
    # Default: yes
    #ScanOLE2 yes
    # With this option enabled OLE2 files with VBA macros, which were not
    # detected by signatures will be marked as "Heuristics.OLE2.ContainsMacros".
    # Default: no
    #OLE2BlockMacros no
    # This option enables scanning within PDF files.
    # If you turn off this option, the original files will still be scanned, but
    # without decoding and additional processing.
    # Default: yes
    #ScanPDF yes
    ## Mail files
    # Enable internal e-mail scanner.
    # If you turn off this option, the original files will still be scanned, but
    # without parsing individual messages/attachments.
    # Default: yes
    #ScanMail yes
    # Scan RFC1341 messages split over many emails.
    # You will need to periodically clean up $TemporaryDirectory/clamav-partial directory.
    # WARNING: This option may open your system to a DoS attack.
    # Never use it on loaded servers.
    # Default: no
    #ScanPartialMessages yes
    # With this option enabled ClamAV will try to detect phishing attempts by using
    # signatures.
    # Default: yes
    #PhishingSignatures yes
    # Scan URLs found in mails for phishing attempts using heuristics.
    # Default: yes
    #PhishingScanURLs yes
    # Always block SSL mismatches in URLs, even if the URL isn't in the database.
    # This can lead to false positives.
    # Default: no
    #PhishingAlwaysBlockSSLMismatch no
    # Always block cloaked URLs, even if URL isn't in database.
    # This can lead to false positives.
    # Default: no
    #PhishingAlwaysBlockCloak no
    # Allow heuristic match to take precedence.
    # When enabled, if a heuristic scan (such as phishingScan) detects
    # a possible virus/phish it will stop scan immediately. Recommended, saves CPU
    # scan-time.
    # When disabled, virus/phish detected by heuristic scans will be reported only at
    # the end of a scan. If an archive contains both a heuristically detected
    # virus/phish, and a real malware, the real malware will be reported
    # Keep this disabled if you intend to handle "*.Heuristics.*" viruses
    # differently from "real" malware.
    # If a non-heuristically-detected virus (signature-based) is found first,
    # the scan is interrupted immediately, regardless of this config option.
    # Default: no
    #HeuristicScanPrecedence yes
    ## Data Loss Prevention (DLP)
    # Enable the DLP module
    # Default: No
    #StructuredDataDetection yes
    # This option sets the lowest number of Credit Card numbers found in a file
    # to generate a detect.
    # Default: 3
    #StructuredMinCreditCardCount 5
    # This option sets the lowest number of Social Security Numbers found
    # in a file to generate a detect.
    # Default: 3
    #StructuredMinSSNCount 5
    # With this option enabled the DLP module will search for valid
    # SSNs formatted as xxx-yy-zzzz
    # Default: yes
    #StructuredSSNFormatNormal yes
    # With this option enabled the DLP module will search for valid
    # SSNs formatted as xxxyyzzzz
    # Default: no
    #StructuredSSNFormatStripped yes
    ## HTML
    # Perform HTML normalisation and decryption of MS Script Encoder code.
    # Default: yes
    # If you turn off this option, the original files will still be scanned, but
    # without additional processing.
    #ScanHTML yes
    ## Archives
    # ClamAV can scan within archives and compressed files.
    # If you turn off this option, the original files will still be scanned, but
    # without unpacking and additional processing.
    # Default: yes
    #ScanArchive yes
    # Mark encrypted archives as viruses (Encrypted.Zip, Encrypted.RAR).
    # Default: no
    #ArchiveBlockEncrypted no
    ## Limits
    # The options below protect your system against Denial of Service attacks
    # using archive bombs.
    # This option sets the maximum amount of data to be scanned for each input file.
    # Archives and other containers are recursively extracted and scanned up to this
    # value.
    # Value of 0 disables the limit
    # Note: disabling this limit or setting it too high may result in severe damage
    # to the system.
    # Default: 100M
    #MaxScanSize 150M
    # Files larger than this limit won't be scanned. Affects the input file itself
    # as well as files contained inside it (when the input file is an archive, a
    # document or some other kind of container).
    # Value of 0 disables the limit.
    # Note: disabling this limit or setting it too high may result in severe damage
    # to the system.
    # Default: 25M
    #MaxFileSize 30M
    # Nested archives are scanned recursively, e.g. if a Zip archive contains a RAR
    # file, all files within it will also be scanned. This options specifies how
    # deeply the process should be continued.
    # Note: setting this limit too high may result in severe damage to the system.
    # Default: 16
    #MaxRecursion 10
    # Number of files to be scanned within an archive, a document, or any other
    # container file.
    # Value of 0 disables the limit.
    # Note: disabling this limit or setting it too high may result in severe damage
    # to the system.
    # Default: 10000
    #MaxFiles 15000
    ## Clamuko settings
    # Enable Clamuko. Dazuko must be configured and running. Clamuko supports
    # both Dazuko (/dev/dazuko) and DazukoFS (/dev/dazukofs.ctrl). DazukoFS
    # is the preferred option. For more information please visit www.dazuko.org
    # Default: no
    #ClamukoScanOnAccess yes
    # The number of scanner threads that will be started (DazukoFS only).
    # Having multiple scanner threads allows Clamuko to serve multiple
    # processes simultaneously. This is particularly beneficial on SMP machines.
    # Default: 3
    #ClamukoScannerCount 3
    # Don't scan files larger than ClamukoMaxFileSize
    # Value of 0 disables the limit.
    # Default: 5M
    #ClamukoMaxFileSize 10M
    # Set access mask for Clamuko (Dazuko only).
    # Default: no
    #ClamukoScanOnOpen yes
    #ClamukoScanOnClose yes
    #ClamukoScanOnExec yes
    # Set the include paths (all files inside them will be scanned). You can have
    # multiple ClamukoIncludePath directives but each directory must be added
    # in a seperate line. (Dazuko only)
    # Default: disabled
    #ClamukoIncludePath /home
    #ClamukoIncludePath /students
    # Set the exclude paths. All subdirectories are also excluded. (Dazuko only)
    # Default: disabled
    #ClamukoExcludePath /home/bofh
    # With this option you can whitelist specific UIDs. Processes with these UIDs
    # will be able to access all files.
    # This option can be used multiple times (one per line).
    # Default: disabled
    #ClamukoExcludeUID 0
    # With this option enabled ClamAV will load bytecode from the database.
    # It is highly recommended you keep this option on, otherwise you'll miss detections for many new viruses.
    # Default: yes
    #Bytecode yes
    # Set bytecode security level.
    # Possible values:
    # None - no security at all, meant for debugging. DO NOT USE THIS ON PRODUCTION SYSTEMS
    # This value is only available if clamav was built with --enable-debug!
    # TrustSigned - trust bytecode loaded from signed .c[lv]d files,
    # insert runtime safety checks for bytecode loaded from other sources
    # Paranoid - don't trust any bytecode, insert runtime checks for all
    # Recommended: TrustSigned, because bytecode in .cvd files already has these checks
    # Note that by default only signed bytecode is loaded, currently you can only
    # load unsigned bytecode in --enable-debug mode.
    # Default: TrustSigned
    #BytecodeSecurity TrustSigned
    # Set bytecode timeout in miliseconds.
    # Default: 5000
    # BytecodeTimeout 1000
    My freshclam.conf:
    ## Please read the freshclam.conf(5) manual before editing this file.
    # Comment or remove the line below.
    #Example
    # Path to the database directory.
    # WARNING: It must match clamd.conf's directive!
    # Default: hardcoded (depends on installation options)
    #DatabaseDirectory /var/lib/clamav
    # Path to the log file (make sure it has proper permissions)
    # Default: disabled
    UpdateLogFile /var/log/clamav/freshclam.log
    # Maximum size of the log file.
    # Value of 0 disables the limit.
    # You may use 'M' or 'm' for megabytes (1M = 1m = 1048576 bytes)
    # and 'K' or 'k' for kilobytes (1K = 1k = 1024 bytes).
    # in bytes just don't use modifiers.
    # Default: 1M
    #LogFileMaxSize 2M
    # Log time with each message.
    # Default: no
    #LogTime yes
    # Enable verbose logging.
    # Default: no
    #LogVerbose yes
    # Use system logger (can work together with UpdateLogFile).
    # Default: no
    #LogSyslog yes
    # Specify the type of syslog messages - please refer to 'man syslog'
    # for facility names.
    # Default: LOG_LOCAL6
    #LogFacility LOG_MAIL
    # This option allows you to save the process identifier of the daemon
    # Default: disabled
    #PidFile /var/run/freshclam.pid
    # By default when started freshclam drops privileges and switches to the
    # "clamav" user. This directive allows you to change the database owner.
    # Default: clamav (may depend on installation options)
    #DatabaseOwner clamav
    # Initialize supplementary group access (freshclam must be started by root).
    # Default: no
    #AllowSupplementaryGroups yes
    # Use DNS to verify virus database version. Freshclam uses DNS TXT records
    # to verify database and software versions. With this directive you can change
    # the database verification domain.
    # WARNING: Do not touch it unless you're configuring freshclam to use your
    # own database verification domain.
    # Default: current.cvd.clamav.net
    #DNSDatabaseInfo current.cvd.clamav.net
    # Uncomment the following line and replace XY with your country
    # code. See http://www.iana.org/cctld/cctld-whois.htm for the full list.
    # You can use db.XY.ipv6.clamav.net for IPv6 connections.
    #DatabaseMirror db.XY.clamav.net
    # database.clamav.net is a round-robin record which points to our most
    # reliable mirrors. It's used as a fall back in case db.XY.clamav.net is
    # not working. DO NOT TOUCH the following line unless you know what you
    # are doing.
    DatabaseMirror database.clamav.net
    # How many attempts to make before giving up.
    # Default: 3 (per mirror)
    #MaxAttempts 5
    # With this option you can control scripted updates. It's highly recommended
    # to keep it enabled.
    # Default: yes
    #ScriptedUpdates yes
    # By default freshclam will keep the local databases (.cld) uncompressed to
    # make their handling faster. With this option you can enable the compression;
    # the change will take effect with the next database update.
    # Default: no
    #CompressLocalDatabase no
    # With this option you can provide custom sources (http:// or file://) for
    # database files. This option can be used multiple times.
    # Default: no custom URLs
    #DatabaseCustomURL http://myserver.com/mysigs.ndb
    #DatabaseCustomURL file:///mnt/nfs/local.hdb
    # Number of database checks per day.
    # Default: 12 (every two hours)
    #Checks 24
    # Proxy settings
    # Default: disabled
    #HTTPProxyServer myproxy.com
    #HTTPProxyPort 1234
    #HTTPProxyUsername myusername
    #HTTPProxyPassword mypass
    # If your servers are behind a firewall/proxy which applies User-Agent
    # filtering you can use this option to force the use of a different
    # User-Agent header.
    # Default: clamav/version_number
    #HTTPUserAgent SomeUserAgentIdString
    # Use aaa.bbb.ccc.ddd as client address for downloading databases. Useful for
    # multi-homed systems.
    # Default: Use OS'es default outgoing IP address.
    #LocalIPAddress aaa.bbb.ccc.ddd
    # Send the RELOAD command to clamd.
    # Default: no
    NotifyClamd /etc/clamav/clamd.conf
    # Run command after successful database update.
    # Default: disabled
    #OnUpdateExecute command
    # Run command when database update process fails.
    # Default: disabled
    #OnErrorExecute command
    # Run command when freshclam reports outdated version.
    # In the command string %v will be replaced by the new version number.
    # Default: disabled
    #OnOutdatedExecute command
    # Don't fork into background.
    # Default: no
    #Foreground yes
    # Enable debug messages in libclamav.
    # Default: no
    #Debug yes
    # Timeout in seconds when connecting to database server.
    # Default: 30
    #ConnectTimeout 60
    # Timeout in seconds when reading from database server.
    # Default: 30
    #ReceiveTimeout 60
    # With this option enabled, freshclam will attempt to load new
    # databases into memory to make sure they are properly handled
    # by libclamav before replacing the old ones.
    # Default: yes
    #TestDatabases yes
    # When enabled freshclam will submit statistics to the ClamAV Project about
    # the latest virus detections in your environment. The ClamAV maintainers
    # will then use this data to determine what types of malware are the most
    # detected in the field and in what geographic area they are.
    # Freshclam will connect to clamd in order to get recent statistics.
    # Default: no
    #SubmitDetectionStats /path/to/clamd.conf
    # Country of origin of malware/detection statistics (for statistical
    # purposes only). The statistics collector at ClamAV.net will look up
    # your IP address to determine the geographical origin of the malware
    # reported by your installation. If this installation is mainly used to
    # scan data which comes from a different location, please enable this
    # option and enter a two-letter code (see http://www.iana.org/domains/root/db/)
    # of the country of origin.
    # Default: disabled
    #DetectionStatsCountry country-code
    # This option enables support for our "Personal Statistics" service.
    # When this option is enabled, the information on malware detected by
    # your clamd installation is made available to you through our website.
    # To get your HostID, log on http://www.stats.clamav.net and add a new
    # host to your host list. Once you have the HostID, uncomment this option
    # and paste the HostID here. As soon as your freshclam starts submitting
    # information to our stats collecting service, you will be able to view
    # the statistics of this clamd installation by logging into
    # http://www.stats.clamav.net with the same credentials you used to
    # generate the HostID. For more information refer to:
    # http://www.clamav.net/support/faq/faq-cctts/
    # This feature requires SubmitDetectionStats to be enabled.
    # Default: disabled
    #DetectionStatsHostID unique-id
    # This option enables support for Google Safe Browsing. When activated for
    # the first time, freshclam will download a new database file (safebrowsing.cvd)
    # which will be automatically loaded by clamd and clamscan during the next
    # reload, provided that the heuristic phishing detection is turned on. This
    # database includes information about websites that may be phishing sites or
    # possible sources of malware. When using this option, it's mandatory to run
    # freshclam at least every 30 minutes.
    # Freshclam uses the ClamAV's mirror infrastructure to distribute the
    # database and its updates but all the contents are provided under Google's
    # terms of use. See http://code.google.com/support/bin/answer.py?answer=70015
    # and http://safebrowsing.clamav.net for more information.
    # Default: disabled
    #SafeBrowsing yes
    # This option enables downloading of bytecode.cvd, which includes additional
    # detection mechanisms and improvements to the ClamAV engine.
    # Default: enabled
    #Bytecode yes
    # Download an additional 3rd party signature database distributed through
    # the ClamAV mirrors. Here you can find a list of available databases:
    # http://www.clamav.net/download/cvd/3rdparty
    # This option can be used multiple times.
    #ExtraDatabase dbname1
    #ExtraDatabase dbname2
    Any help is much appreciated.

    MatejLach wrote:
    clamd is running, user and group clamav all have the relevant permissions as far as I can tell, however upon scanning my mail, I always end up with the following error:
    Scanning error:
    /home/username/.claws-mail/mimetmp/0000000e.mimetmp: lstat() failed: Permission denied. ERROR
    Seems like a permissions error to me... maybe check the actual file it is attempting to scan... I know it is in your home folder, but just to be sure, you might want to check that everything is sane.

  • How do you know an email is authentic?

    How do you know if an email from Apple is authentic?

    Were you expecting an email from Apple?
    Is the email asking for private information?
    Are there grammer and spelling errors in the email?
    Do the email headers show the email is not from Apple?
    Is the email offering a get rich scheme?
    Is the email asking for money?
    Is the email asking for your password?
    If you were expecting an email from Apple and it is not asking for private information it may be a legitimate email. Otherwise it may be phishing.

  • Account password reset too often

    I have a strange situation here.
    Every one week I'm receiving an e-mail notification that my Apple ID has been reset and I'm 100% sure that nobody except me is using my ID. It might be ridiculous but I suspect that someone is trying to hack my password.
    Is there any chance to check who or what is forcing me to change my password every week?
    Please help. I'm running out of ideas for the new passwords .

    If you are receiving e-mail messages that indicate that someone is trying to reset your Apple ID password, they may be phishing scams. Do not click any links in those e-mail messages, and if you make the mistake of doing so, do not provide your current Apple ID password on the page you are directed to.
    Unfortunately, in this case, there's nothing to be done except treat those messages the same way you would any other spam.
    The other possibility is that someone is actually trying to reset your Apple ID password. This may be due to a malicious attack, but more likely, it's just someone who thinks your Apple ID is actually theirs (due to a typo, faulty memory or something similar) and is trying to "regain" access. In any case, this is merely an annoyance, but you can put an end to it by enabling two-factor authentication on your Apple ID. This will require an additional piece of information that only you will possess in order to even start the password reset process.
    If you are actually seeing your password getting changed, and are having to reset it yourself to regain access, you are being hacked. This could be because your password is not strong enough to withstand a brute-force attack by a botnet. It could also be because the attacker already has access to your e-mail address, and is able to intercept the reset e-mail and complete the reset process. Because of that danger, you should change the password for the e-mail account associated with your Apple ID. You should also change the password for your Apple ID, making sure that it is a strong password, and enable two-factor authentication as mentioned above.

  • How/why is my iPhone being repeatedly hacked

    I don't usually post on this sort of thing but this has been annoying me for quite some time now.
    I have read countless posts about 'how the iphone cannot be hacked unless the hacker physically possess the phone' but I tend to believe that isnt true after my phone appleid account was hacked ....7 or 8 times? I've actually lost count now.
    Over the last 5 months I repeatedly got those 'How to reset your apple ID password' emails which hinted someone was punching in my username and clicking the 'I forgot password' button. But a few times now amongst the many, many "I forgot" emails there is one in the list of unread emails saying 'Your Apple ID password has been reset.'
    Its pretty odd cause whoever is hacking me has nothing I can think of to gain - no credit card details and once they hack into my account, I answer security quetions and gain the account back into my own hands (albeit with a new password. I'm starting to run out of password ideas now as you can't use the same one or even similar again).
    All the hackings are happening (from the time I get the emails) I'm guessing somewhere in the northern hemisphere due to the fact it always happens about 2-3am local time for me.
    Is there anything more I can do to stop this ****wit hacking into my account? I seriously thought this idiot would have given up by now.
    And for anyone thinking it -  no he's not guessing my passwords. I've had so many different ones now with uppercase and numbers there's no way anyone could guess them all (or any for that matter!!).
    Any help would be appreciated!!

    If you are receiving e-mail messages that indicate that someone is trying to reset your Apple ID password, they may be phishing scams. Do not click any links in those e-mail messages, and if you make the mistake of doing so, do not provide your current Apple ID password on the page you are directed to.
    Unfortunately, in this case, there's nothing to be done except treat those messages the same way you would any other spam.
    The other possibility is that someone is actually trying to reset your Apple ID password. This may be due to a malicious attack, but more likely, it's just someone who thinks your Apple ID is actually theirs (due to a typo, faulty memory or something similar) and is trying to "regain" access. In any case, this is merely an annoyance, but you can put an end to it by enabling two-factor authentication on your Apple ID. This will require an additional piece of information that only you will possess in order to even start the password reset process.
    If you are actually seeing your password getting changed, and are having to reset it yourself to regain access, you are being hacked. This could be because your password is not strong enough to withstand a brute-force attack by a botnet. It could also be because the attacker already has access to your e-mail address, and is able to intercept the reset e-mail and complete the reset process. Because of that danger, you should change the password for the e-mail account associated with your Apple ID. You should also change the password for your Apple ID, making sure that it is a strong password, and enable two-factor authentication as mentioned above.

  • Anyone know what this means? warning.cpu.alert.b5 it came through skype

    Anyone know what this means? warning.cpu.alert.b5
    It came as a skype call........very strange.  I can't find anything on google search

    Anyone else questioning this?  the info from Skye is:
    Do not repond to the call or go to any suggested website.
    "This link or website may be "phishing" sites, where it will ask for personal information which they will be using in their personal interest. Furthermore, this link may also contain viruses that could damage your computer. "
    Hope this helps others out there.........

  • HT5622 seems like every 3-4 days I get an email from Apple saying your password has been reset,if you didn't change it go to etc'

    ipad 4
    ALmost every few days I get an email from Apple saying your password has been changed.... if you didn't change please go to Apple and change your id password
    I have had to do this for the 7th time in 4 weeks

    If you are receiving e-mail messages that indicate that someone is trying to reset your Apple ID password, they may be phishing scams. Do not click any links in those e-mail messages, and if you make the mistake of doing so, do not provide your current Apple ID password on the page you are directed to.
    Unfortunately, in this case, there's nothing to be done except treat those messages the same way you would any other spam.
    The other possibility is that someone is actually trying to reset your Apple ID password. This may be due to a malicious attack, but more likely, it's just someone who thinks your Apple ID is actually theirs (due to a typo, faulty memory or something similar) and is trying to "regain" access. In any case, this is merely an annoyance, but you can put an end to it by enabling two-factor authentication on your Apple ID. This will require an additional piece of information that only you will possess in order to even start the password reset process.
    If you are actually seeing your password getting changed, and are having to reset it yourself to regain access, you are being hacked. This could be because your password is not strong enough to withstand a brute-force attack by a botnet. It could also be because the attacker already has access to your e-mail address, and is able to intercept the reset e-mail and complete the reset process. Because of that danger, you should change the password for the e-mail account associated with your Apple ID. You should also change the password for your Apple ID, making sure that it is a strong password, and enable two-factor authentication as mentioned above.

  • Just got an email saying my Apple ID was updated

    I just received an emailed saying my applied had been updated, and if this wasn't the case click on the links provided to update. Is this a hack?

    If you are receiving e-mail messages that indicate that someone is trying to reset your Apple ID password, they may be phishing scams. Do not click any links in those e-mail messages, and if you make the mistake of doing so, do not provide your current Apple ID password on the page you are directed to.
    Unfortunately, in this case, there's nothing to be done except treat those messages the same way you would any other spam.
    The other possibility is that someone is actually trying to reset your Apple ID password. This may be due to a malicious attack, but more likely, it's just someone who thinks your Apple ID is actually theirs (due to a typo, faulty memory or something similar) and is trying to "regain" access. In any case, this is merely an annoyance, but you can put an end to it by enabling two-factor authentication on your Apple ID. This will require an additional piece of information that only you will possess in order to even start the password reset process.
    If you are actually seeing your password getting changed, and are having to reset it yourself to regain access, you are being hacked. This could be because your password is not strong enough to withstand a brute-force attack by a botnet. It could also be because the attacker already has access to your e-mail address, and is able to intercept the reset e-mail and complete the reset process. Because of that danger, you should change the password for the e-mail account associated with your Apple ID. You should also change the password for your Apple ID, making sure that it is a strong password, and enable two-factor authentication as mentioned above.

  • Potential scam? AT&T Wifi survey offering "deals"

    I'm staying at Homewood Suites which uses AT&T Wifi. I got a popup that said, "Rate our service and get up to $70 in offers".
    When the offers came up, it had comments that said how great it was (too few and too positive made me suspicious). 
    The offers were mostly for snake oil products (anti-aging, anti-wrinkle, weightloss --- another suspicious).
    2015rewardoffer {Inappropriate content removed}
    That's the site link. Looked up domain and all the registrant information is hidden. So unlikely an AT&T.
    So letting wifi customers and AT&T know someone is posing as AT&T and may be phishing or scamming people.
     

    Hi 
    Nice catch. This is definitely not a legitimate offer and should be avoided.
    Thanks for posting!
    Dmitriy

  • How to get rid of adobe popups that say adobe wants permission

    How do I remove the adobe popups that ask me to decline or accept adding something to my system?  I can't watch any news videos or online movies.  Does anyone know how to remove them.  Neither of the buttons work.

    Go directly to Adobe and update your version of Flash:  http://www.adobe.com/products/flashplayer.html  Do not use the popup windows from other websites as they may be phishing for personal information.

  • I clicked on a link from an email that may be spam/phishing.  How can I scan my mac book pro for any viruses?

    I clicked on a link in an email that may be spam/phishing.  How can I scan my mac book pro for viruses?

    You can just download the free ClamXav and scan your entire drive - but as there are no known viruses for OS X (although there is malware - see Thomas Reed's excellent Mac Malware Guide) it's very unlikely that you have a virus.
    The best source against malware is OS X itself and common sense. Don't click on links in suspicious emails and be careful of anything that wants to install something on your computer that is not from a reputable source.
    Clinton

  • Hi ive received what i think may be a phishing email can anybody help?

    hi ive received what i think may be a phishing email can anybody help?

    this is a copy of the e-mail i received is there someone i can report it to if it isnt legitimate
    thanks for any help
    From: "Apple Store" <[email protected]>
    Date: 6 January 2014 04:15:58 GMT
    To: Recipients <[email protected]>
    Subject: Important
    Dear Customer apple.
    We have recently determined that different computers connect to your apple account, Password and multiple failures were present before the login.
    We now need to confirm again the apple of your account information.
    If it does not activate within 48 hours, we will be forced to suspend your account indefinitely, because it can be used in a fraudulent purposes.
    Thank you for your understanding in this way.
    To confirm your account online:
    >>> Click here<<<

Maybe you are looking for