So, how do the hackers hijack the computer to get the contacts list or
whatever? Are they accessing the computer -- or hacking e-mail
passwords . . . or more likely phishing with naive septuagenarians?

In this case, the woman had actually gone to England . . .
| Subscription info at http://www.tech-geeks.org |

Reply via email to