Reyhan, Thank you very much for your response and the advice to contact firstname.lastname@example.org. I have send an email to them with the details I have and the partial log file. I hope to hear back from them with information interpreting the log file. You asked me to "accept as a solution" in response to your note. I will be happy to consider that after I hear back from the TV fraud team. So far I don't actually know that contacting them is going to result in a solution that will be helpful to me. But I am hopeful based on your note and look forward to the next step! I also appreciate the link you sent, though I had already seen it. I would encourage you, as moderator, to add a bit more information about what people can do to document the situation in a data breach (what information should we gather from our breached computers) and what type of response we can reasonably expect from your fraud department (clearly many of us in situations like this will hope for personalized support and that may not be possible, or not to the extent we would like; but what can we expect?) Thanks again - hope to hear back soon!
... View more
My elderly mother was victimized by a scammer posing as an IT support person who convinced her to download TeamViewer12 to her Mac. I have a log file from TeamViewer that I would like to understand, in plain english. It seems to be from a period later than the scam based on dates within it - implying that the scammer deleted the log file relevant to the data breach - but I want to know what triggered the log file I have - additional remote access or my mother accidently triggering it. How do I interpret the file? Any help will be greatly appreciated!
... View more