Zeus scam
It got me! Can't use My browser due to Zeus pop up that threatens to erase my hard drive if I don't call the number provided. I have Windows 10. I have tried a couple malwar removing programs to no avail and fear I am closing in on the most radical of solutions I.e., reformatting the hard drive. Any guidance that would send me in a better direction would be greatly appreciated.2.2KViews0likes1CommentSecurity issues
Security authentication is on an untrusted server of cox security in Alanta Georgia. The compromised server certificate is set to expire in 2018. So why is Cox communication security using an unsecured server and security on my account? They swear they do not hack or spy on their customers. What a crock! STOP HACKING MY SERVICE. Take my computers off your hacked Cox Abuse server causing denial of service, drive-by of malware attacks, port scanning on my account, slowing down my Internet service by stealing bandwidth. Intnentionally putting my systems and private network on your trojan horse of malware, spyware, and viruses, that,s not cute; HACKING is a crime. I see you mofos, get a life. Stop sending fake cox abuse text to my cell phone. You are busted. Next step law enforcement.Solved4.7KViews0likes8CommentsWhy are you hacking my service?
Cox communications are thieves, they offer hacked services. They claim they offer double the speed that is a lie, the service I have is hacked by Cox communication employees. The McAfee Security is a Trojan horse that is connected to a malware/spyware server. The service I receive is hacked services. I am suppose to receive is double speed of 50 Mbps instead I receive less then 5 Mbps. Cox employees are accessing my computer putting unauthorized administrators, credentials, and passwords on my computer. They are performing daily Denial of Service attacks, fruggle attacks, drivebys and ping of death attacks on my service from Cox Abuse ip addresses 24.*.*.*. The so call Cox Abuse text message is "Multimedia messages are being sent to your device, but your device doesn't support these messages. Visit your nearest ... for new device options". I am told that Cox Abuse does not send text messages. So who is it sending the messages? The technician that came to my house a month ago claims I had a bad router, but when I put three new routers on my network, they were all hijacked by Cox Communication Security who change the administrators name to BLAH, BLAH, changed the passwords, fixed the settings so that I could not reset the routers or gain access by remote to the routers, I was denied access to my new routers from a Cox Abuse IP address, Cox Abuse is sending text messages to my cellphone for illegal wiretaps on my cellphone service. Cox Communications always changed my password to my accounts on my computers, deleted partitions forcing me to re-install the system, delete evidence and logs from my computer with unauthorized credentials on all my system. They also hack my Cox account then claim that only the customer can change the password. Cox Communications offers cyber criminal services, I have proof that I am being cyber stalked, and cyber bullied by Cox Communications security personal or hackers employed by Cox Communications. I have proof of all the criminal activity that is preformed on my service on DVD, so deleted the information from my computers and usb's are a waste of time for the hackers. I have over 6000 pieces of evidence from the time my service was put on their trojan horse to the present. Cox claims my speed is doubled for faster internet service that is a sham, I am paying 80 dollars a month for, this fraud and malware/spyware services.Solved14KViews0likes12CommentsIs a hacker using IP address 10.3.48.1 upstream from my router?
I have received an Overage Notice from Cox about my Internet utilization rate. In checking the usage meter on Cox.net, late in September my usage suddenly surged from maybe 1.5GB per day to now over 10GB per day, with spikes up to 20GB per day. One day, usage was fine and the next day it spiked, and is now remaining consistently high. I have scanned my system using a variety of anti-malware products, with no results. I'm resetting the router to default today and reconfiguring everything, including the wireless password. However, when I do a tracert from my computer, for example to Google.com, I am getting the following information: Tracing route to google.com [74.125.225.233] over a maximum of 30 hops: 1 6 ms 6 ms 6 ms 10.3.48.1 2 7 ms 8 ms 8 ms ip68-100-3-241.dc.dc.cox.net [68.100.3.241] 3 8 ms 8 ms 8 ms ip68-100-3-113.dc.dc.cox.net [68.100.3.113] 4 7 ms 7 ms 6 ms mrfddsrj02gex070002.rd.dc.cox.net [68.100.0.145] 5 8 ms 9 ms 7 ms 68.1.4.246 6 10 ms 8 ms 8 ms ip70-167-150-18.at.at.cox.net [70.167.150.18] 7 9 ms 9 ms 8 ms 216.239.46.250 8 9 ms 8 ms 8 ms 72.14.236.146 9 16 ms 18 ms 16 ms 72.14.235.12 10 23 ms 24 ms 24 ms 72.14.239.66 11 50 ms 49 ms 48 ms 72.14.237.213 12 49 ms 48 ms 53 ms 72.14.237.214 13 48 ms 48 ms 52 ms 209.85.240.77 14 47 ms 49 ms 48 ms dfw06s26-in-f9.1e100.net [74.125.225.233] Trace complete. Why is the 10.3.48.1 address sitting upstream from me? That address did not use to appear in a tracert prior to this surge, but I cannot state that it appeared right before the surge, either. A "tens address" (IP address that is 10.x.x.x) is not a routable address and is used only for local networking. Is that address part of the Cox network? I am using the Motorola Surfboard 6580, and have not changed the configuration. I know that the 10.3.48.1 address did not used to appear while using the Surfboard, but now it does. I cannot pinpoint in time when the change appeared. I am concerned that someone has inserted a system upstream from me and is now hijacking my Internet service, not to mention violating my privacy. Could an attacker have inserted a system on the network so that they can act as my router, control my DNS, and inspect my network traffic? I cannot find any information regarding Cox using a 10.x.x.x address in their home consumer Internet service. Thanks for any help or insight anyone can offer.5.1KViews0likes4CommentsSTICKY: Information about the Mac 'Flashback Trojan'
The current Flashback Trojan that is targeting Mac users masquerades as an Adobe Flash payer plug-in installer. It has also begun taking advantage of Java. To learn more about how to detect and remove the virus, see our Help/Support Article on Cox.com: Detect Flashback Trojan Malware On Your Mac Computer6.4KViews0likes0Comments