No, not my computer, as I use a hack proof Apple Mac!
Just yesterday, I received a message from a very dear friend of mine in a language that I did not understand. I used Google translate and found it was in Portuguese.
The message had as the Subject Fotos. 15/12 and was
Cuidado com essas pessoas falsas.
Salvei essas fotos pra você ver
Olha só o que aconteçeu...
This translates as
Beware of these fake people..
I saved these pictures for you to see
Look what happened ...
Download 219.5 Kb
If one clicked on the attachment, the hacker could get into a computer running Windows. On a Mac, as this is an .exe file, I got a warning about it and was able to stop the download. Although, even if I had saved it, the .exe file would not have been able to run on my Mac.
I immediately emailed my friend asking for an explanation.
He replied that the email had not been sent by him.
Exactly as he was sending me that message, I got another email from him with a repeat of the earlier message, which meant the hacker or his software was at that precise moment operating inside his account.
Also, the hacker managed to send 3 messages to our Seventh Heaven Google Group.
The minute I marked those messages as spam, my friend's email ID would have been banned from the Google Group.
I got his alternate email ID, subscribed him and then marked the messages as spam. Within seconds Google had banned the old email ID.
In the Google Gmail, at the bottom of the page you can see a note
Last account activity: 8 hours ago on this computer. Details
When you click on the word "Details" it gives the last 5 log ins along with the IP address from where you have logged in. If it is not from your computer, you know you have a hacker and from where.
I do not know whether other email providers have this facility.
As I use a Mac and have used one for the last 25 years, I do not even have to have virus protection software installed on my computer. It has saved me much hassle, time and money!!!
Now my friend has to change all his sensitive information as the hacker had access to all his emails, passwords, and probably credit card numbers, expiry dates, etc.