Possible scam/hack!

Ok, I log on skype tonight, and there is a guy on my contact list from Gambia I have never added. I did talk to him, and it is not a bot. But how on earth is he in my contact list, when I have not added him?
Changed my password the first thing I did. But I still feel uneasy. 
His skype name is babucarr42, and he has only 54 contacts.

aLmAnZo wrote:
His skype name is babucarr42, and he has only 54 contacts.
Thanks. Reported to Fraud Unit.
TIME ZONE - US EASTERN. LOCATION - PHILADELPHIA, PA, USA.
I recommend that you always run the latest Skype version: Windows & Mac
If my advice helped to fix your issue please mark it as a solution to help others.
Please note that I generally don't respond to unsolicited Private Messages. Thank you.

Similar Messages

  • I wonder if it is possible to hack the iphone. because a friend received a bad message me and I never send the messenger .. Is  someone please help me understand?

    I wonder if it is possible to hack the iphone? because a friend received a bad message me and i never send the messenger. is someone please help me

    It wasn't your iPhone that was hacked, but your email account (or
    messaging account) that was hacked. Immediately change all your
    passwords for such accounts.

  • I lost my ipod touch at school. i used find my ipod on icloud but it keeps saying offline. when i try to imessage myself i says it cant deliver. is it possible someone hacked it and reset my ipod? and how would i be able to find it if thats the case?

    i lost my ipod touch at school. i used find my ipod on icloud but it keeps saying offline. when i try to imessage myself i says it cant deliver. is it possible someone hacked it and reset my ipod? and how would i be able to find it if thats the case? PLEAES HELP !!!!!!!!!!!!!!!!!!

    Anything is possible.
    it could be off or not connected to wi-fi. 
    It could have been found and restored.
    In any of these cases you will not be able to find it.

  • Is it possible someone hacks my iphone and steal info when i am in wifi network ??

    I am an iPhone users and i am fearing of someone at workplace , they know technology more than i do , i posted the question above if someone can answer my question plz.
    i am worrying there is an application that allows people hack my iphone and have been known it at workplace when i am in wifi network ?
    thanks for your feedback
    tonytran365

    Is your device jailbroken?  If so, it's possible.
    If the device is not jailbroken, it is not possible for the device to be hacked.

  • Is it possible to hack into someone's iPhone 4 and see there text messages

    Is it possible to see hack into someone's iphone4 and view there text messages!

    Sure, anything can be hacked...but they would need physical possession of your phone to do so.

  • HT1212 Possible iPhone Hack.

    Hello, my sister thinks her black iPhone 4S has been hacked. She origianlly had a 7 digit passcode on the lock screen, and while it was in her hand the phone went black and automatically turned into a 4 digit passcode for the lock screen. She is quite worried. We would like to know how to get into the iPhone without having to wipe the entire phone blank. Please get back to us as soon as possible. Thank you.
    P.S. The iPhone is also with Virgin mobile.

    READ the article from which the question was posted.  It clearly details how to deal with the situation.
    Passcodes do not magically change.
    Unless the iPhone has been jailbroken it cannot be hacked.

  • Is it possible to hack an iPhone 4 remotely using only a laptop?

    My fiance' had a strange interaction with a person at McDonalds today.  She was on her iPhone 4, on Facebook, and a person came and sat near her, opened a laptop and started to hit on her.  He had no food, and proceeded to pester her for a few minutes before he finally got the message and left.  He got right up, closed his laptop, went to his car and left. 
    Can an iPhone be hacked in a scenario like that?  There has been no unusual activity, but having already been the victim of identity theft, I'm very paranoid.
    So, what do you think?  Creep or crook?

    There is a possible explanation for what he was doing. McDonalds hotspots are not secure. There is software available that can record the traffic going over the hotspot. If you record a few minutes worth of packets you can find the user IDs and passwords for the email accounts of anyone using the hotspot to check or send email if they have not set up SSL or TLS for their email accounts. Likewise for logging in to web sites. Just about all banks and other financial institutions require SSL to log in, but many smaller retail sites many not. So this is another source of data that can be used for identity theft.

  • Possible remote hack?

    Hi there,
    I've noticed something strange today while connecting to my home Mac remotely via usual screen sharing session.
    After connecting to my desktop, I've noticed that Safari AutoFill preferences for my credit cards were displayed on screen. I have two of my cards stored in there...
    Firstly, I thought I had accidently pressed a shortcut to that screeen but I couldn't find a shortcut that activates this particular window.
    Also, I've checked my security prefs and the firewall was turned off. I don't remember precisely but I am 99% sure it was turned on before...
    Would that be at all possible that someone remotely hacked to my Mac to steal my credit card details? I know that sometimes even the last four digits (that are visible in that window together with expiration date) can be used for phishing techniques.
    I've turned the firewall on in stealth mode but am not sure what else should I do? Delete card details form AutoFill prefs in Safari? Anything else?
    Many thanks.

    The firewall won't help at all, so you should leave it off.
    In general, there's no reliable way to tell whether a network intrusion has taken place. An intruder could cover his tracks.
    If you know or suspect that a hostile intruder has either had physical access to your computer, or has been able to log in remotely, then there are some steps you should take to make sure that the computer is safe to use.
    First, if there's any chance that the incident will be the subject of legal action, then you should do nothing at all without consulting a lawyer or the police. Your computer would be the principal evidence in such a case, and you don't want to tamper with it.
    Running any kind of software to scan for "viruses" or "rootkits" is worse than useless. If I broke into your system and wanted to leave a back door, I could do it in a way that would be undetectable by those means — and I don't pretend to any special skill as a hacker. You have to assume that any intruder can do the same. The "anti-virus" software itself will slow down and destabilize the computer with no offsetting benefit.
    The only way you can be sure that the computer is not compromised is to erase at least the startup volume and restore it to something like the status quo ante. The easiest approach is to recover your entire system from a backup that predates the attack. Obviously, that's only practical if you know when the attack took place, and it was recent, and you have such a backup. You will lose all changes to your data, such as email, that were made after the time of the snapshot. Some of those changes can be restored from a later backup.
    If you don't know when the attack happened, or if it was too long ago for a complete rollback to be feasible, then you should erase and install OS X. If you don't already have at least two complete, independent backups of your data, then you must make them first. One backup is not enough to be safe.
    When you reboot after the installation, you'll be prompted to go through the initial setup process for a new computer. That’s when you transfer the data from one of your backups in Setup Assistant.
    Select only users in the Setup Assistant dialog — not Applications, Other files and folders, or Computer & Network Settings. Don't transfer the Guest account, if it was enabled.
    Reinstall your third-party software from original media or fresh downloads — not from a backup, which may be contaminated.
    Unless you were the target of an improbably sophisticated attack, this procedure will leave you with a clean system. If you have reason to think that you were the target of a sophisticated attack, then you need expert help.
    That being done, change all Internet passwords and check all financial accounts for unauthorized transactions. Do this  after your system has been secured, not before.

  • Buyer requesting username and password after I performed factory reset.  Possible scam?

    So on my iphone 4s operating iOS 7, I performed a factory reset using itunes.  I then sold my phone to someone online, and they are now asking me for a username and password to unlock the phone.  I thought that factory resetting would clear out all data? Is it possible he legitimitely needs my usename and password after a factory reset?
    Do you think the buyer is scamming me?  Should I give him my username and password?

    It does not. They need your Apple ID and password to use the phone. If Find My Phone is turned on then you can remotely erase the phone so it will restore as New. You would do this by logging into icloud.com with your Apple ID and password. Click on the Find My Phone icon. Then select your device under the Apple Devices list. When selected a small window dialog opens. Click on the Erase iPhone link.

  • Is it possible to hack FaceTime video

    I'm afraid of hackers

    Anything is possible. However, many things are unlikely enough that it's a waste of energy to worry about them. This would be one of those things.
    Clowns, however, are scary and all too commonplace.

  • Is it possible for hacker to hijack remote files ?

    I have a iMac running OS X 10.4.9. I have a 50 MB of important file. I want to know if there are ways hackers can grab that file ? If it is possible, how long does it take them to successfully get their hand on that file ?(i.e. copy the file to their computer over the internet)
    Also, i would love to hear some advice on how setting up the security on my iMac to prevent unauthorized access (i.e. set up firewall, block unwanted port, etc ... )
    How do i know if my computer is compromised ?
    Thanks for reading.
    iMac 20' inch   Mac OS X (10.4.9)  

    Don't run windows, don't share, and don't hookup to the internet. Otherwise, read the help files and browse http://www.apple.com/macosx/features/security/ If you really want to get into the business, download and read: Mac OS X Security Configuration Guide (OPTION-click on the link and it'll download to your download folder).
    G4 450 MP Gigabit   Mac OS X (10.4.9)  

  • ITunes email - possible scam - need help

    I have been sent an email stating someone has placed an order on my iTunes Account and if I need to cancel to go to a specific cancellation page asking for my bank details. Is this a scam ?
    The email address is [email protected]
    I cannot find a contact number for Apple UK so am trying here.
    Thank you

    It's a phishing email to try and get your account and payment details, forward it to Apple : [email protected] , and then delete it.
    If you went to the site and entered your account id and password then change your password e.g. by logging into the account via the Store > View Account menu option on your computer's iTunes, or by logging in via the 'manage your apple id' button on http://appleid.apple.com
    Phishing and similar emails : Phishing & Other Suspicious Emails
    Phishing emails : Identifying fraudulent "phishing" email - Apple Support
    Genuine iTunes emails : Identifying legitimate emails from the iTunes Store - Apple Support

  • Is it possible someone hacked my husband's ipad and had an entire conversation using his photos?????

    has anyone had this problem???? I figured out that because my husband updated my phone using his apple id, I received an entire conversation between "him" and someone else.... He says his ipad must have been hacked... can someone do this? can they use his photos in the message? any help would be appreciated!

    You'll probably have seen the answers to similar queries which have popped up.  The only likely alternative to it actually being him is that someone else has got hold of his appleid and password, and is sending and receiving imessages, and accessing photos in his Photostream.

  • Possible scam Flash Player download site.

    While using Google search to find the download site for Adobe
    Flash Player and entering "Free Flash Player" in the search box, I
    was directed to this site >
    http://flashplayer.10-downloadcenter.com/index.asp?aff=103&camp=gg_flash_us&se=google
    <, where I was asked for my name, e-mail address and then my
    credit card information. Since I always understood that Flash
    player is free, this site looks like it is a phishing scam to me.
    Is Adobe aware of it?

    Further information regarding suspicious actions of this site.
    The site had been asked to cancel the transaction within two hours of it taking place.  Some of the charges involved extra "premium" software sold along with the "Flash Player 10" download.  An extra ~$10 for software that would supposedly increase download speeds greatly.  The software all turned out to be PC only, with no mention of there being no Mac version, and no place to check.  The site indicated that Flash Player 10 would be downloaded, but all that was available was Flash Player 9 - which was probably already on the machine.  One also has to wonder whether their versions don't have zombie payloads.
    An archive of the the purchase confirmation page was fortunately kept to save the confirmation numbers and other information.  Among the information on the page was the way the charge would appear on the charge card.  Checking the card company's invoice, no charge by that name existed.  But there was a charge with a completely different label for about the right amount.  Calling the (866) number got us to a phone center in India.  Sure enough, the mis-labeled charge was the charge in question. The customer service person said that the amount will be refunded within 7 days.  We'll see.
    Note that an immediate request for cancellation had been made, so the charge shouldn't even have appeared.  The site boasts a 7-day money-back guarantee.
    I hope that someone, somewhere, will look into this site.  I was looking for some kind of complaint link at Google, but haven't found one yet.  The site appears not only in the search results, but they run an ad at the top of the Google search page - very visible.
    Once again, I hope Adobe will take a look at this highly questionable site.

  • Possible scam call

    I just received a Skype call telling me to go to www.mrrhelp.com because my "security" was in jeopardy.  Has anyone else received such a call and can you tell me if it's from Skype or if it is a scam.
    Barry
    * mod edit to remove hot link *
    Solved!
    Go to Solution.

    This is a known scam.
    You can adjust your privacy to, Change Allow Calls from... "anyone" to "people on my Contact list only".
    http://community.skype.com/t5/Windows/Does-anyone-know-what-quot-sys-help-bn3-quot-is/m-p/967658#M71...
    You may also block and report the scammers.
    https://support.skype.com/en/faq/FA10488/how-do-i-block-or-report-a-contact
    Regards,
    Tamim
    Location - Dhaka | Bangladesh - Standard Time Zone: GMT/UTC + 06:00 hour
    If one of my replies has adequately addressed your issue, please click on the “Accept as Solution” button. If you found a post useful then please "Give Kudos" at the bottom of my post, so that this information can benefit others.

Maybe you are looking for