TRENDING NEWS

POPULAR NEWS

Someone Has Been Signing Into My Email From Another State

I received a phone stating someone in another state has been using my email. How can I find out and put a stop to it?

Did you ask the caller HOW THEY WOULD KNOW someone MAY be using your e-mail ??? MAY be a scam to get you to reveal personal information. IMMEDIATELY change your password.

How can i tell if someone logs into my email account other than me?

Depends on what kinda email u have. Most of the time u can b logged in to several different places under the same email account. With messenger programs u cant do it.

The only way u would b able to tell is...

1. install a keylogger on ur computer (providing that its someone in your house)

2. take note to the lil things in email that lets u know its been checked. ex. normally new and unread mail is in bold print, old and read mail will b in normal print.

3. check ur emails trash can to see if any emails are in there that u never seen/read.

Someone is accessing my emails but it isn't showing them logging into my email account. How is this possible?

Most email accounts allow you to forward a copy of incoming emails to another email address. Unless you actually check this setting, it is a subtle way of accessing someone’s emails. To achieve this, they would need access to your email account to set this up. Once setup, no further direct access of your email account would be required, they would automatically receive a copy of everything emailed to you.

Can someone hack your computer through email?

Using email is one of my favorite ways of breaking into an organization!Usually, I will send out 10 emails to different employees. Out of those 10 people, 5 will click the link that I included. Of the 5 people, two or three will tell me their real work username and password. Pretty scary, isn't it?Why are they so interested? Why would they give me their passwords? The email that I send does not look like a scam from a rich prince in an African nation. Instead, it looks like a professional email from a company conducting a survey on behalf of the employee’s organization.Who wouldn’t be interested in filling out a survey about Salary Satisfaction?Once they click on the link, they are taken to a login page. It is then than an average of 25% of the people emailed submit their passwords.This is where the fun begins!If the company is using Microsoft Exchange (email server), I can use their credentials to synchronize a copy of their email onto my computer.Once it is synchronized, I can create a client-side rule that runs a program every time a certain email is received.This rule will synchronize over Exchange across all the computers that use that persons account.Once they receive the special email, my program runs on the victim’s computer.If you are interested in more information, you should check out the original blog post by Nick Landers on the subject: Malicious Outlook Rules | Silent Break SecurityAt this point, it is usually trivial to gain access to the rest of the network.The other option is to send a user a malicious Word document. However, that usually requires building up a context where it would make sense for that attachment to be opened.Recently, I received a very interesting attachment. It was an obvious attempt to break into my computer using a malicious Word document.It came at a time where I was needing a more effective payload to send to my potential victims.I was so greatful to the hacker for introducing me to a new technique that I replied with a thank you note.The Word document contained an embedded object that appeared to be a another document. But in reality, it was a VB Script that would launch a malicious payload. Fascinating!If you are interested in learning more about computer security, check out my other answers: Lucas Gates

Someone logged into my facebook from another state?

Well unfortunately, someone has tried to hack your account, twice, and Facebook is trying to help you out. Maybe your password is too easy. Try changing your password to one with Capitals, Lowercase letters, Numbers, AND symbols. My Facebook password is 20 something characters long because I REALLY don't want someone to hack my account.

Also you might have to be more careful with the links you click on Facebook and other sites. For example one your friend might post "Facebook has a dislike button! Click to get yours now!"
Once you click the link, the virus will hack your account, post the same link on your wall and ALL your friends, and possibly, get your password,

Someone accessed my email account?

One day I was trying to access my yahoo email account but couldn't. I checked into my alternate email address and found a letter from myself! Someone had accessed my account and actually stolen it (changed my password, personal info, etc) and was using it for a scam to get money.
I sent the email and all my info to yahoo security. They had my account straightened out within a few days.
If you are suspicious of someone accessing your account, here is a check list of things you should do: (in my opinion)

1. Change your password.
2. If noone else has access to your pc, put a security seal on it, that everyone who uses your pc has to know, or they cannot get on it.
3. If you are still getting the suspicion that someone is accessing your account (after changing your password), contact the security personell for your particular email provider.
4. Create a new account and have everything transferred from the old one to the new one and delete the old account.

Good luck!

If you forward an email to someone else on Gmail, does the original sender know?

It depends.For a plain text or rich text email, no.However, it’s possible for HTML emails to contain code or external resource calls (such as embedded images) that can allow a third-party to identify if an email has been opened and potentially also provide information about the device being used to view that email. It might then be possible to use this data to determine if the email is likely to have been forwarded or not. It would generally be considered a breach of EU privacy laws to use this information to identify someone who hasn’t given prior consent, however. That’s not to say a malicious user, or someone who wasn’t very familiar with privacy laws, couldn’t work around this, but nowadays most modern email clients will detect these kinds of activities and flag such emails as dangerous or suspicious automatically.As an example, the popular MailChimp email marketing platform gives its users tools to view how many times an email has been opened by a particular individual. If a user appears to have opened a particular email an unusually large number of times, this indicates that person has likely forwarded that email to others. In MailChimp’s system, there is no way to identify if a given email “open” action was by the original recipient, or by someone who received a forwarded copy - to do this would require identifying these people without their consent.If you want to be 100% certain that an email isn’t being tracked externally, then it’s always best to forward it as plain text instead.

How can I tell if someone has blocked my email address?

How can I block someone’s email address?An email sent to you is considered to have reached its destination when it arrives at the email server for your email account. Eventually you will use Outlook, Thunderbird, your web browser, or another program to retrieve and read the email. Or not. Emails generally arrive to an inbox folder. An email can be diverted to a spam/junk or other folder where you may not see it. Eventually all such emails can be deleted manually or automatically. If it winds up in a different folder, it will not be read until someone looks into that folder and selects the email to be read or deleted.You can try flagging an email as spam but it is not guaranteed to work and it may backfire by blocking based on different attributes of the email contents. Yahoo mail also has another menu option to “Block Sender” which is supposed to actually block an email from getting to you.Proper email servers, where your emails are received, can be configured to manage messages. They can be set to hold, drop or reject (return with error) emails based on size restrictions, attachment type, email or subject contents, recipient name or sender name. If your organization/company has its own server, you can request your email administrator to block or reject emails this way so that they never arrive in your inbox or any other folder.

Can someone else sign into my account if I am signed on?

Well yeah someone can hack into your account. it once happened to me. I logged in to get on to here Y! Answers and well it said "this account is already in use" I was so mad. My brother told me to change my password. So...
I suggest you to change your password. This way they can't log in your account...cuz if they do it again, they can easily change your password to some LONG Number or something else.
So Change your password.

Can you tell if someone logs into your twitter?

Twitter will send you an email notification if someone logs into your account and it looks suspicious.You can also set up your Twitter account to send you a text message notification whenever someone attempts to log in. The text message contains a code you’ll need to continue logging in.In other words, if someone tries to log in and does not have access to your phone, they won’t be able to.To set this up:Add a phone to your Twitter accountYou’ll receive a verification code which you should then enter in:Go to Security and privacy from your settings. Tick the box as shown:Follow the steps to complete the process. When you (or someone) next try to log in, you’ll see the following:Check your phone for the text message, and enter the verification code provided to login.NOTE: In setting this up, make sure you also generate a backup code. You’ll need this to log in should you ever change or lose your phone. Without it, logging back in can be very problematic and may take several days or even weeks to resolve.

TRENDING NEWS