Can my contact list on my iPad be hacked?
I use iOS and Ventura is it possible for someone to lift my contact list
[Re-Titled by Moderator]
I use iOS and Ventura is it possible for someone to lift my contact list
[Re-Titled by Moderator]
Bruce Baum Said:
"Can my contact list be hacked?: I use iOS and Ventura is it possible for someone to lift my contact list"
-------
Hacking a Contact List:
Officially, there is no "Contact List". As for a list of contacts, the only way this would be possible through hacking is if someone knows your credentials, and is able to get into your account. So, secure what need be, and all would be fine.
Secure your Info:
Being of high-concern for info access, then (A)don't stare your login info, (B.) verify your devices, and (C)secure your account:
A. Verify your Devices:
Verify that all devices are logged in to your account, by using this link: Check your Apple ID Device List to See where you're Signed in - Apple Support
then...
B. Modify your Credentials:
Having been stollen, someone lily has your credentials. So, by all means, modifying them.
Bruce Baum wrote:
Is there a procedure/program to run that may indicate she may have a virus on one of her 3 devices (2 mobile, 1 Desktop)? All operating softwares are at the current releases.
There are no viruses that can affect an iPhone unless it has been jailbroken or you are a high-profile journalist, activist, or politician whose data would be worth hundreds of thousands of dollars to acquire. So, put a password on the phone and don't let anyone else use it.
As for your Mac, start here:
Effective defenses against malware and ot… - Apple Community
The weakest link is probably the Apple ID. See here:
If you think your Apple ID has been compromised - Apple Support
It's not entirely clear what the message was that your wife received but it may well have been a phishing email. Those should be closed, marked as junk and deleted.
Bruce Baum wrote:
Thank you. Regarding 'Contacts List" I was referring to contacts that are shared on devices via iCloud. My wife has been notified that she is sending a Phish e-mail of an Adobe document that requires an action by the recipients.
It's fairly common for spammers and scammers to spoof legitimate mail senders' addresses.
Whether the SMTP headers for the phishing message indicate the expected mail servers or—if the headers are forged—the headers from whatever computers were breached and used to send the scammer's or phisher's message.?
Showing the message raw text on a legitimate message and on the questionable message would provide some indication of the mail servers involved in each.
Spoofing the sending address in the mail headers is unfortunately "normal" on the net, and not an indication of a breach.
It can also sometimes be an indication that the receiving mail server might want to review their anti-spam settings.
Thank you. Regarding 'Contacts List" I was referring to contacts that are shared on devices via iCloud. My wife has been notified that she is sending a Phish e-mail of an Adobe document that requires an action by the recipients.
Is there a procedure/program to run that may indicate she may have a virus on one of her 3 devices (2 mobile, 1 Desktop)? All operating softwares are at the current releases.
Thanks, Bruce
Can my contact list on my iPad be hacked?