-
All replies
-
Helpful answers
-
Jan 15, 2016 3:15 PM in response to Uwillgetgot!!by LACAllen,That email could be a bluff. I can't imagine Apple has the resources to detect very iCloud email user who forwards their email for whatever reason.
What did it suggest or ask you too do to resolve it?
Are you still able to send/receive email to that iCloud account? Have you changed your Apple ID password and security questions?
-
Jan 16, 2016 11:08 PM in response to LACAllenby Uwillgetgot!! ,THank you for your reply to my question. I have changed my questions and my password the moment I read the email. It was peculiar to say the least. I can send and receive but there was a period when I was expecting an email but nothing would get delivered? It was strange but weeks later I see the message from Apple about my mail being forwarded. The Apple address looked legit but maybe I should use one of those sites to see where it came from. Trace the headers on the email might be an idea.
I Change my password often due to a breakup and really feel like my privacy with iCloud and apple in general is or has been breached.
THank you again and if you have any advice on how I could keep my account secure that would be great. Can an outlook email application get my mail even changeling my passwords? Just wanted to ask. I feel there are too many ways someone can breach a persons electronic files and information.
-
Jan 16, 2016 11:53 PM in response to Uwillgetgot!!by LACAllen,The bad guys can be pretty good at making their communications look like Apple's.
Here are some tips from Apple themselves... the safest thing when in doubt is to call Apple Support at a number you look up yourself and ask. They have multiple ways of identifying you so that thy can help keep you safe.
Identifying legitimate emails from the iTunes Store - Apple Support
Identifying fraudulent "phishing" email - Apple Support
http://www.apple.com/legal/more-resources/phishing/
Also, you may want to consider using one of Apple's latest 2 step/factor levels of security. It can be difficult to grasp how it works, but it is more secure. Essentially you turn your phone, computer and browsers into "trusted" devices. When you access a new one for the first time, one of your other trusted devices vouches for you. Google and lots of others are doing similar things.
Frequently asked questions about two-step verification for Apple ID - Apple Support