nothing is total secure
I read this thread and yes the april fool's notion comes to mind, however let's get serious.
#1 using a wireless router is inherently insecure and wpa is hackable although in order for someone to hack it they would need a certain wireless card and alot of processing power. But that processing power would not necessarily have to be on site they could simple record all packets and hand off sections to a beowulf cluster more about that later.
#2 cell phones have never been secure, unless you count the goverment secure telephone units (and again they are not 100% but then again those secrets they talk are usually time sensitive so by the time the otherside encrypts it it's yesterday's news)
#3 it is also possible to hack into your connection physically if someone really wanted to do it they could record every packet coming out of your dsl/cable internet connection, which would be less conspcious than having a directional antenna pointed at your house.

#4 Apple OSX is more secure than most but not really,

if someone is truly out to get you. Because Apple's OS is based on darwin it enjoy's pretty much the same immunity as the linux community. But it's really not all that secure just too obsure for most script kiddies to bother. Viruses and worms as well as trojans are pretty much just as easy to write for OSX than any other unix OS And unix worms and viruses were out there before the slick dropout proposed to license DOS (he didn't even own yet

) to IBM
Nothing is hacker proof

it's just the cost benefit ratio that is in question here. If someone really wanted to go at it they could feed a bunch of code into a beowulf cluster (a bunch of computers networked to make one giant one) and analyse the code for backdoors/ insecurities) it is unlikley that someone would bruteforce the internet traffic that is sent via ssl-128 (which is what browsers usually use to connect to sites like paypal) but there are backdoors that people could use, for example did you use your mothers maidenname for password recovery? Your birth certificate is a public record and your mother's maiden name would be on it if you were born in the US (at least in most states). If you ever saw the movie hackers, digging in the trash is how they got in. The internet is not as secure as one might think, as far as people know the RSA protocol is secure,(backbone of encrypting internet traffic) but then again no body would really broadcast if they had found a backdoor.
terramir
PS: Keyloggers also can be "digital" or "analog"
Digital in this case would mean:
Someone installed a keylogger program in your mac and guess what sometimes code like that could be hidden in a picture if they knew some sort of unpublished exploit. Or just some direct access but that would require a break-in into your apartment house etc.
Analog: If someone puts a small chip inside your keyboard that transmits every keystroke, or hides a camera somewhere that is pointed at your keyboard they got ya. But hey that would only be possible if they break into your house or get access to your keyboard (is your computer a laptop then they could plant a chip while your in the restroom at work)

But then again all this requires a great deal of skill which would be wasted on the regular joe schmoo, unless you got a really high security clearance

or you really pissed off the wrong geek this sounds like paranoia to me.

PSS: the pay-pal account thing sounds to me like you clicked on the wrong e-mail and got spoofed (tricked into giving out your password on a look alike site.)
PSSS: BTW if you have enough packets you should be able to hack any encryption through some sort of heuristic analysis, I mean hello most Mac's are set by default to go to the apple start page in safari if you have enough sections of packets that are the same (like the start of a browsing session always going to that page first) and you have the cluster compare it to that known site you should have the key in no time. BTW that would work for other start pages too because of the known length even msn, yahoo, google or cnn or some othersite could work of you cached all the common Start pages and compared sizes at given dates that way you could find out someone's home page in no time even with changing content. And then have the cluster figure out the WPA pass in no time. Brute force is not the only way to go content based heuristic analysis should give much faster results Hey wait I'm giving hackers ideas here
