- Joined
- Dec 27, 2009
- Messages
- 2
- Reaction score
- 0
- Points
- 1
hello all... I am new here and I am looking for some information and hope you all can help.
Within the past week, a few of my accounts have been compromised. My yahoo email, my paypal and one of my credit cards. The weird thing is, my email password was changed.... there were 2 unauthroized transactions on my Paypal (one purchasing something from a penny auction site - and one a transfer of money from my own account) and then a large payment was intitiated to make a payment on one of my credit cards (which was already paid off) which caused me to have a NSF fee from my bank.
My mac has not been used by someone else physically... so I can only wonder about keylogging and somehow it could have been compromised remotely by something I did online.
Any recommendations for software for Mac OS X (10.6.2) for keylogger software detection?
I looked at the Activity Monitor as suggested in my research on the web, but not sure what to look for exactly or how to read the Activity Monitor.
Looking for any advice on how to figure out if my machine is compromised? Please help
Within the past week, a few of my accounts have been compromised. My yahoo email, my paypal and one of my credit cards. The weird thing is, my email password was changed.... there were 2 unauthroized transactions on my Paypal (one purchasing something from a penny auction site - and one a transfer of money from my own account) and then a large payment was intitiated to make a payment on one of my credit cards (which was already paid off) which caused me to have a NSF fee from my bank.
My mac has not been used by someone else physically... so I can only wonder about keylogging and somehow it could have been compromised remotely by something I did online.
Any recommendations for software for Mac OS X (10.6.2) for keylogger software detection?
I looked at the Activity Monitor as suggested in my research on the web, but not sure what to look for exactly or how to read the Activity Monitor.
Looking for any advice on how to figure out if my machine is compromised? Please help