405
Old and new fraud on trust. iPhone, iOS, chat, SMS, electromail
Popular blogger Anton Spout published a remarkable and useful post fraud. Editorial hurry to warn you. So, that's how come moshennikiVladeltsu iPhone writes (in the social networks or SMS) unknown beauty, asks for her help to block just stolen from her pipe. Where does beauty come from the contacts database owners unfamiliar iPhone - author of a history is silent, but in principle there are many options, both related and unrelated to the service access various technical support and repair workers to customer data.
The girl asks her stranger "savior" to log into her account iCloud, and there to change the password to the thief did not get access to the files.
The man agreed to comply with the request and having had the imprudence to use for this purpose its own iPhone / iPod / iPad, razloginivaetsya of your account Apple and translates your device under the control of someone else, the password is known by fraudsters. With this knowledge, one immediately gets remote access to the victim device includes on it the lock mode, and then I was sent from the account password conditional "Ksenia».
As a result of this simple combination in the hands of the victim remains locked unit, which can not revive any resetting, and only require support Apple's purchase of the pipe supporting documents. Then, of course, scammer may extort money for opening the device
The way to counter elected Nizhny Novgorod programmer Artem Kulikov, was graceful and effective: it is logged in iCloud not through iOS mobile devices and through a browser desktop, and saw that the phone that you want to "save", owned by the swindler called "hacker Seryoga" and He blocked his first, as long as he was waiting for attacking the new device.
It should be noted that this method did not work would be so impressive, if conditional, "Xenia" on behalf of hacker Seryoga was not such an idiot, and also be used for hunting Loja web interface. That is Kulikov lucky with the opponent.
And in general, the principle is very simple. If you with any emergency, please contact the Internet or via SMS the person whose identity you do not know and can not be understood methods of verification, you just need to proceed from the understanding that it is likely a scammer
By the way, if you suddenly drawn a familiar person with an equally urgent request, but not the voice on the phone and via e-mail, chat or social network - there is also very likely that the name of a friend you are trying to mislead someone stole his password or forge the sender's address or login. This is true of the 100% letters like "Honey, I'm in Cyprus, stole a purse, mobile phone and documents immediately went money by Western Union». The effectiveness of this very ancient species Nigerian wiring provided that such letters are usually sent on behalf of the close friends have sent people - sender and forge quite carefully (if it is a fake, not hacking)
Well, of course do not need to open any of your friends suddenly sent photos, videos, documents and links, without first making sure of voice that they did send them to you
Forewarned - is forearmed.
via dolboeb.livejournal.com/2880485.html
The girl asks her stranger "savior" to log into her account iCloud, and there to change the password to the thief did not get access to the files.
The man agreed to comply with the request and having had the imprudence to use for this purpose its own iPhone / iPod / iPad, razloginivaetsya of your account Apple and translates your device under the control of someone else, the password is known by fraudsters. With this knowledge, one immediately gets remote access to the victim device includes on it the lock mode, and then I was sent from the account password conditional "Ksenia».
As a result of this simple combination in the hands of the victim remains locked unit, which can not revive any resetting, and only require support Apple's purchase of the pipe supporting documents. Then, of course, scammer may extort money for opening the device
The way to counter elected Nizhny Novgorod programmer Artem Kulikov, was graceful and effective: it is logged in iCloud not through iOS mobile devices and through a browser desktop, and saw that the phone that you want to "save", owned by the swindler called "hacker Seryoga" and He blocked his first, as long as he was waiting for attacking the new device.
It should be noted that this method did not work would be so impressive, if conditional, "Xenia" on behalf of hacker Seryoga was not such an idiot, and also be used for hunting Loja web interface. That is Kulikov lucky with the opponent.
And in general, the principle is very simple. If you with any emergency, please contact the Internet or via SMS the person whose identity you do not know and can not be understood methods of verification, you just need to proceed from the understanding that it is likely a scammer
By the way, if you suddenly drawn a familiar person with an equally urgent request, but not the voice on the phone and via e-mail, chat or social network - there is also very likely that the name of a friend you are trying to mislead someone stole his password or forge the sender's address or login. This is true of the 100% letters like "Honey, I'm in Cyprus, stole a purse, mobile phone and documents immediately went money by Western Union». The effectiveness of this very ancient species Nigerian wiring provided that such letters are usually sent on behalf of the close friends have sent people - sender and forge quite carefully (if it is a fake, not hacking)
Well, of course do not need to open any of your friends suddenly sent photos, videos, documents and links, without first making sure of voice that they did send them to you
Forewarned - is forearmed.
via dolboeb.livejournal.com/2880485.html
15 masterpiece photographs of the Russian winter, you can not help liking
5 facts about sugar that food manufacturers are trying to hide