Over 1 million tech questions and answers.

Microsoft and Work account, problem subscribing to Microsoft Security Advisory Notification

Q: Microsoft and Work account, problem subscribing to Microsoft Security Advisory Notification

I have been subscribing to "Microsoft Security Advisory Notification" and a lot of other Microsoft news with my personal Microsoft account and many years ago I added my work mail as where subscriptions should be sent. Now several acquisitions later
that old mail domain will be shut down and I will not get mails sent to that address anymore.
I have been trying to add my new work mail as where those mails should be relayed, but it is not allowed to add an existing work mail as a subscription address in your private Microsoft account. You
must log in with a Microsoft account to create new alerts and I am not allowed to create a Microsoft account with my work mail, so I can create new subscriptions to that address. I get the feeling of a catch 22.
I find it really weird that your now allowed to send Microsoft news and especially the "Microsoft Security Advisory Notification" to your work mail, where you usually have a need to be notified about these kind of news.
Anyone got a suggestion about what I am doing wrong or have any idea of a feasible way to get this information sent to your work email?

Read other answers
RELEVANCY SCORE 200
Preferred Solution: Microsoft and Work account, problem subscribing to Microsoft Security Advisory Notification

I recommend downloading and running Reimage. It's a computer repair tool that has been proven to identify and fix many Windows problems with a high level of success.

I've used it in the past to identify and fix everything from blue screens (BSOD's), ActiveX errors, corrupt files and processes, dll/exe/sys errors, recover lost memory, Windows update problems, defragging, malware removal etc.

You can download it direct from this link http://downloadreimage.com/download.php. (This link will automatically start a download of Reimage that you can save to your computer.)

RELEVANCY SCORE 96.8

Rise in SQL Injection Attacks Exploiting Unverified User Data InputPublished: June 24, 2008Microsoft is aware of a recent escalation in a class of attacks targeting Web sites that use Microsoft ASP and ASP.NET technologies but do not follow best practices for secure Web application development. These SQL injection attacks do not exploit a specific software vulnerability, but instead target Web sites that do not follow secure coding practices for accessing and manipulating data stored in a relational database. When a SQL injection attack succeeds, an attacker can compromise data stored in these databases and possibly execute remote code. Clients browsing to a compromised server could be forwarded unknowingly to malicious sites that may install malware on the client machine...microsoft.com/technet

Read other answers
RELEVANCY SCORE 96.8

Vulnerability in Graphics Rendering Engine Could Allow Remote Code Execution.
Published: December 28, 2005

Microsoft is investigating new public reports of a possible vulnerability in Windows. Microsoft will continue to investigate the public reports to help provide additional guidance for customers.

Microsoft is aware of the public release of detailed exploit code that could allow an attacker to execute arbitrary code in the security context of the logged-on user, when such user is visiting a Web site that contains a specially crafted Windows Metafile (WMF) image. An attacker would have no way to force users to visit a malicious Web site. Instead, an attacker would have to persuade them to visit the Web site, typically by getting them to click a link that takes them to the attacker's Web site.Click to expand...

http://www.microsoft.com/technet/security/advisory/912840.mspx
 

A:Microsoft Security Advisory (912840)

bump, that more people may see this.
 

Read other 1 answers
RELEVANCY SCORE 96.8

Microsoft Security Advisory (899480)
Vulnerability in TCP Could Allow Connection Reset
Published: May 18, 2005
http://www.microsoft.com/technet/security/advisory/899480.mspx

This issue does not affect Windows 98, Windows 98 SE, or Windows Millennium Edition. If you have installed Windows XP Service Pack 2, Windows Server 2003 Service Pack 1, or the MS05-019 security update you are not affected by this vulnerability.

This attack requires the TCP Timestamp Option registry setting to be enabled. This setting is enabled by default. However, this option can be disabled. Systems that have disabled this setting are not affected by this vulnerability. For more information about this setting, visit the following Web site.

http://www.microsoft.com/resources/...s/2000/server/reskit/en-us/regentry/58800.asp

To check out your settings:
Start->Run->regedit
HKLM\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Tcp1323Opts

Value Meaning
0 (00) Timestamps and window scaling are disabled.
1 (01) Window scaling is enabled.
2 (10) Timestamps are enabled.
3 (11) Timestamps and window scaling are enabled.

MS05-019 security bulletin is currently scheduled to be re-released in June of 2005. The original security update successfully addressed the vulnerabilities that are described in the security bulletin and the vulnerability that is documented in this advisory. However, the original security update contains a known network connectivity issue that affects a particular type of network c... Read more

Read other answers
RELEVANCY SCORE 96.8

Microsoft Security Advisory (980088)
Vulnerability in Internet Explorer Could Allow Information Disclosure
Published: February 03, 2010
Version: 1.0
Microsoft is investigating a publicly reported vulnerability in Internet Explorer for customers running Windows XP or who have disabled Internet Explorer Protected Mode. This advisory contains information about which versions of Internet Explorer are vulnerable as well as workarounds and mitigations for this issue.
Our investigation so far has shown that if a user is using a version of Internet Explorer that is not running in Protected Mode an attacker may be able to access files with an already known filename and location. These versions include Internet Explorer 5.01 Service Pack 4 on Microsoft Windows 2000 Service 4; Internet Explorer 6 Service Pack 1 on Microsoft Windows 2000 Service Pack 4; and Internet Explorer 6, Internet Explorer 7, and Internet Explorer 8 on supported editions of Windows XP Service Pack 2, Windows XP Service Pack 3, and Windows Server 2003 Service Pack 2. Protected Mode prevents exploitation of this vulnerability and is running by default for versions of Internet Explorer on Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008.
The vulnerability exists due to content being forced to render incorrectly from local files in such a way that information can be exposed to malicious websites.
At this time, we are unaware of any attacks attempting to use this vulnerability.

We will continue ... Read more

A:Microsoft Security Advisory (980088)

  
Quote: Originally Posted by NICK ADSL UK


Microsoft Security Advisory (980088): Vulnerability in Internet Explorer Could Allow Information Disclosure

Microsoft Security Advisory: Vulnerability in Internet Explorer could allow information disclosure
Microsoft Security Advisory: Vulnerability in Internet Explorer could allow information disclosure











  
Quote: Originally Posted by http://www.tomsguide.com/us/Internet-Explorer-FTP-Microsoft-Exploit,news-5739.html


A vulnerability found in Internet Explorer could expose your files to the Internet.

A security consultant on Wednesday provided a live demonstration at the Black Hat DC conference that immediately prompted a security advisory from Microsoft. Jorge Luis Alvarez Medina, the Argentina-based security consultant with Core Security Technologies, showed attendees that it was possible to use an exploit found in Internet Explorer to remotely read files on a victim's local drive.

Medina said that the security flaw extends across all versions of Internet Explorer, and cannot be fixed with a simple patch. Microsoft countered and said that consumers can work around the problem by running Internet Explorer in ?protected mode.? Still, that doesn't ultimately solve the problem--many unaware Internet Explorer users will be exposed to the Internet like an at-home FTP offering free, anonymous downloads.


Read more: IE Fl... Read more

Read other 1 answers
RELEVANCY SCORE 96.8

Microsoft is investigating new public reports of a vulnerability in Microsoft Office Excel 2003 Service Pack 2, Microsoft Office Excel Viewer 2003, Microsoft Office Excel 2002, Microsoft Office Excel 2000, and Microsoft Excel 2004 for Mac. At this time, our initial investigation indicates that customers who are using Microsoft Office Excel 2007 or Microsoft Excel 2008 for Mac, or who have installed Microsoft Office Excel 2003 Service Pack 3 are not affected by this vulnerability.microsoft.com/technet

Read other answers
RELEVANCY SCORE 96.8

Today we are announcing the availability of an update that does not address a security vulnerability, but is a high priority for customers in keeping their systems updated...symptoms:? Your system may appear to become unresponsive when Windows Update or Microsoft Update is scanning for updates that use Windows Installer.? You receive an access violation error in svchost.exe. This access violation stops the Server service and the Workstation service.? A memory leak occurs when Windows Update or Microsoft Update is scanning for updates that use Windows Installer.http://www.microsoft.com/technet/security/...ory/927891.mspx

Read other answers
RELEVANCY SCORE 96.8

Microsoft is investigating new public reports of vulnerability in Microsoft Internet Explorer on Windows 2000 Service Pack 4, on Windows XP Service Pack 1, and on Windows XP Service Pack 2. Customers who are running Windows Server 2003 and Windows Server 2003 Service Pack 1 in their default configurations, with the Enhanced Security Configuration turned on, are not affected. We are also aware of proof of concept code published publicly but we are not aware of any attacks attempting to use the reported vulnerability or of customer impact at this time. We will continue to investigate these public reports.The ActiveX control is the Microsoft DirectAnimation Path ActiveX control, which is included in Daxctle.ocx...http://www.microsoft.com/technet/security/...ory/925444.mspxSecunia rates the issue as 'highly critical', its most severe rating. http://secunia.com/advisories/21910/

Read other answers
RELEVANCY SCORE 96.8

Microsoft is investigating public reports of a remote code execution vulnerability in supported editions of Windows XP and Windows Server 2003 with Windows Internet Explorer 7 installed. We are not aware of attacks that try to use the reported vulnerability or of customer impact at this time. Microsoft is investigating the public reports....microsoft.com/technet

A:Microsoft Security Advisory (943521)

And people still ask me why I refuse to use I-net Exploder unless I can find no other option.

Read other 2 answers
RELEVANCY SCORE 96.8

Microsoft is investigating active, targeted attacks leveraging a potential vulnerability in the ActiveX control for the Snapshot Viewer for Microsoft Access. An attacker could exploit the vulnerability by constructing a specially crafted Web page. When a user views the Web page, the vulnerability could allow remote code execution. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user...microsoft.com/technet

Read other answers
RELEVANCY SCORE 96.8

Hi All,

 
Microsoft is announcing the availability of additional guidance for critical security updates, that are at heightened risk of exploitation due to past and threatened nation-state attacks
and disclosures. Some of the releases are new, and some are for older platforms that we are making publicly available today.
We recommend that customers who are not utilizing automatic updates prioritize downloading and application of these critical updates.
 
Microsoft has tailored customer guidance based on platform. Please review the following table and follow
the appropriate link to download updates for affected platforms. 




Which Windows version are you running?


 




For customers using Windows Server 2008, Windows 7, Windows Server 2008
R2, Windows Server 2012, Windows 8.1, Windows 8.1 RT, Windows Server 2012 R2, Windows 10, or Windows Server 2016 see Microsoft
Knowledge Base Article 4025686 for guidance.


For customers using Windows XP, Windows Vista, Windows 8, Windows
Server 2003, or Windows Server 2003 R2 see Microsoft Knowledge Base article 4025687 for
guidance.




For customers using Windows Embedded versions see Microsoft
Knowledge Base article 4025688 for guidance.


 




Do not know which Windows version you are running? See Which
Windows operating system am I running?


 ... Read more

Read other answers
RELEVANCY SCORE 96.8

Microsoft Security Advisory (979352)
Vulnerability in Internet Explorer Could Allow Remote Code Execution
Published: January 14, 2010
General Information
Executive Summary
Microsoft is investigating a report of a publicly exploited vulnerability in Internet Explorer. This advisory contains information about which versions of Internet Explorer are vulnerable as well as workarounds and mitigations for this issue.
Our investigation so far has shown that Internet Explorer 5.01 Service Pack 4 on Microsoft Windows 2000 Service Pack 4 is not affected, and that Internet Explorer 6 Service Pack 1 on Microsoft Windows 2000 Service Pack 4, and Internet Explorer 6, Internet Explorer 7 and Internet Explorer 8 on supported editions of Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2 are affected.
The vulnerability exists as an invalid pointer reference within Internet Explorer. It is possible under certain conditions for the invalid pointer to be accessed after an object is deleted. In a specially-crafted attack, in attempting to access a freed object, Internet Explorer can be caused to allow remote code execution.
At this time, we are aware of limited, active attacks attempting to use this vulnerability against Internet Explorer 6. We have not seen attacks against other affected versions of Internet Explorer. We will continue to monitor the threat environment and update this advisory if this situation changes. On completion of thi... Read more

A:Microsoft Security Advisory (979352)

New IE hole exploited in attacks on U.S. firms





Quote:
Attackers targeting Google and a host of other U.S. companies recently used software that exploits a new hole in Internet Explorer, Microsoft said Thursday.
"Internet Explorer was one of the vectors" used in the attacks that Google disclosed earlier this week, Microsoft said in a statement. "To date, Microsoft has not seen widespread customer impact, rather only targeted and limited attacks exploiting IE 6," the statement said.

The vulnerability affects Internet Explorer 6, IE 7, and IE 8 on Windows 7, Vista, Windows XP, Server 2003, Server 2008 R2, as well as IE 6 Service Pack 1 on Windows 2000 Service Pack 4, Microsoft said in an advisory on Thursday afternoon.


more: New IE hole exploited in attacks on U.S. firms | InSecurity Complex - CNET News

Read other 1 answers
RELEVANCY SCORE 96.8

...Microsoft has revised this advisory to notify users of an update to Autorun that restricts AutoPlay functionality to CD-ROM and DVD-ROM media. This update is intended to stop AutoPlay functionality from working on USB drives, external hard drives, or network shares. This update is available for Windows XP, Windows Server 2003, Windows Vista, and Windows Server 2008. For more information about this update as well as the download links, see Microsoft Knowledge Base Article 971029.Microsoft TechNetUpdate to the AutoPlay functionality in WindowsIncludes the download links for applicable OS.

A:Microsoft Security Advisory (967940)

I wonder why MS waited so long? Better late than never I guess.

Thanks for the link!

Read other 4 answers
RELEVANCY SCORE 96.8

Hi All,

 
Microsoft is announcing the availability of additional guidance for critical security updates, that are at heightened risk of exploitation due to past and threatened nation-state attacks
and disclosures. Some of the releases are new, and some are for older platforms that we are making publicly available today.
We recommend that customers who are not utilizing automatic updates prioritize downloading and application of these critical updates.
 
Microsoft has tailored customer guidance based on platform. Please review the following table and follow
the appropriate link to download updates for affected platforms. 




Which Windows version are you running?


 




For customers using Windows Server 2008, Windows 7, Windows Server 2008
R2, Windows Server 2012, Windows 8.1, Windows 8.1 RT, Windows Server 2012 R2, Windows 10, or Windows Server 2016 see Microsoft
Knowledge Base Article 4025686 for guidance.


For customers using Windows XP, Windows Vista, Windows 8, Windows
Server 2003, or Windows Server 2003 R2 see Microsoft Knowledge Base article 4025687 for
guidance.




For customers using Windows Embedded versions see Microsoft
Knowledge Base article 4025688 for guidance.


 




Do not know which Windows version you are running? See Which
Windows operating system am I running?


 ... Read more

Read other answers
RELEVANCY SCORE 96.8

Quote:

General Information

Executive Summary

Microsoft is investigating new public reports of a vulnerability in the Windows Graphics Rendering Engine. An attacker who successfully exploited this vulnerability could run arbitrary code in the security context of the logged-on user. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

We are not aware of attacks that try to use the reported vulnerability or of customer impact at this time.

We are actively working with partners in our Microsoft Active Protections Program (MAPP) to provide information that they can use to provide broader protections to customers.

Upon completion of this investigation, Microsoft will take the appropriate action to help protect our customers. This may include providing a security update through our monthly release process or providing an out-of-cycle security update, depending on customer needs.



Microsoft Security Advisory (2490606): Vulnerability in Graphics Rendering Engine Could Allow Remote Code Execution

Microsoft releases Security Advisory 2490606 - MSRC - Site Home - TechNet Blogs

A:Microsoft Security Advisory (2490606)

Read other 2 answers
RELEVANCY SCORE 96

The Microsoft Security Response Centre (MSRC) - Security Advisory.
Advisory released by the MSRC Team on December 10, 2008 4.44pm [GMT= 12.44am 11 Dec 08].

The MSRC Team today released Microsoft Security Advisory 961051, which contains information regarding new attacks against a new vulnerability in Internet Explorer.

This advisory is posted less than 48 hours after the latest patch and update for IE.

To read the full Advisory, link to it here;

The Microsoft Security Response Center (MSRC) : Microsoft Security Advisory 961051

The vulnerability has been detected in a number of MS Operating Systems. Is yours included? Find out by reading the linked Advisory, and await further developments.
________________________________________________________________
Norm Cameron has prepared a well written summary of this ongoing crisis here;

Vista Forums>System Security>Big Security Hole in all IE Versions.
________________________________________________________________
Update - Microsoft Security Advisory 961051.
Released by the MSRC Team on December 11, 2008 4.04pm [GMT= 12.04am Fri 12 Dec 08].

This is the second Advisory released by the MSRC Team. It expands on the attacks on Internet Explorer7, and includes similar warnings about attacks to all other supported versions of IE;

The Microsoft Security Response Center (MSRC) : Microsoft Security Advisory 961051 Updated

Start telling your friends about this problem......now.

_________________________________________... Read more

A:The Microsoft Security Response Centre - new Security Advisory released.

Update - Microsoft Security Advisory 961051.
Released by the MSRC Team on December 11, 2008 4.04pm [GMT= 12.04am 12 Dec 08].

The MSRC Team today released an update to Microsoft Security Advisory 961051 which includes the following introductory statement;

"While the known attacks are only targeting Internet Explorer 7, we have found that the underlying vulnerability affects all currently supported versions of Internet Explorer. We have updated the advisory to include this information."


To read the full updated Advisory, link to it here;


The Microsoft Security Response Center (MSRC) : Microsoft Security Advisory 961051 Updated


For your own security, please link to and read the Advisory, then tell all your friends of this developing situation. Subscribe to this Thread and await further updates on this problem.

Read other 3 answers
RELEVANCY SCORE 96

Quote:

Today we released Security Advisory 2458511 to address a new vulnerability that could impact Internet Explorer users if they visit a website hosting malicious code. As of now, the impact of this vulnerability is extremely limited and we are not aware of any affected customers. The exploit code was discovered on a single website which is no longer hosting the malicious code. When a website is discovered to host malicious software, we work through legal channels to take the site down. These kinds of attempts to exploit systems and the people using technology are the activity of criminals. Microsoft takes this very seriously and where possible, we will take legal action against those responsible.

Internet Explorer 9 Beta users are not affected by this issue and any customers who wish to upgrade their browser to this version can do so freely at www.microsoft.com/ie. Impacted versions include Internet Explorer 6, 7 and 8, although our ongoing investigation confirms that default installations of Internet Explorer 8 are unlikely to be exploited by this issue. This is due to the defense in depth protections offered from Data Execution Prevention (DEP), which is enabled by default in Internet Explorer 8 on all supported Windows platforms. For supported versions of Windows running earlier versions of Internet Explorer, please review this blog post from our Security Research & Defense team describing how to enable DEP.

The S... Read more

A:Microsoft Releases Security Advisory 2458511

thank you for the heads up !!!!

Read other 1 answers
RELEVANCY SCORE 96

Microsoft Releases Security Advisory 284714
 

A:Microsoft Releases Security Advisory 284714

Applies to Internet Explorer 8. Windows 7 users can upgrade to IE9.
 

Read other 2 answers
RELEVANCY SCORE 96

http://blogs.technet.com/b/msrc/archive/2012/06/03/microsoft-releases-security-advisory-2718704.aspxWe recently became aware of a complex piece of targeted malware known as "Flame" and immediately began examining the issue. As many reports assert, Flame has been used in highly sophisticated and targeted attacks and, as a result, the vast majority of customers are not at risk. Additionally, most antivirus products will detect and remove this malware. That said, our investigation has discovered some techniques used by this malware that could also be leveraged by less sophisticated attackers to launch more widespread attacks. Therefore, to help protect both targeted customers and those that may be at risk in the future, we are sharing our discoveries and taking steps to mitigate the risk to customers.Unauthorized digital certificates could allow spoofing http://support.microsoft.com/kb/2718704

A:Microsoft releases Security Advisory 2718704

Researchers reveal how Flame fakes Windows Update

Read other 3 answers
RELEVANCY SCORE 94.8

Microsoft Security Advisory 2934088Today, we released Security Advisory 2934088 regarding an issue that impacts Internet Explorer 9 and 10. Internet Explorer 6, 7, 8 and 11 are not affected. At this time, we are only aware of limited, targeted attacks against Internet Explorer 10. This issue allows remote code execution if users browse to a malicious website with an affected browser. This would typically occur by an attacker convincing someone to click a link in an email or instant message.As part of the security advisory, we have also included an easy, one-click Fix it to address the known attack vectors. The Fix it is available to all customers and helps prevent known attacks that leverage the vulnerability to execute code and should not affect your ability to browse the web. Additionally, applying the Fix it does not require a reboot. We encourage all customers using Internet Explorer 9 and 10 to apply this Fix it to help protect their systems. Fix it tool available to block Internet Explorer attacksMSHTML shim Fix it workaround tool

A:Microsoft Security Advisory 2934088 Internet Explorer 9 and 10

Thanks for the heads up. I applied the Fix It. Have seen too many issues with IE 11 to feel comfortable 'upgrading' to it at this time.

Read other 2 answers
RELEVANCY SCORE 94.8

This is weird. I applied the fix that I downloaded directly from Microsoft's web site regarding the "Vulnerability in Microsoft Video ActiveX control could allow remote code execution":

http://support.microsoft.com/kb/972890#Fixed

and I couldn't notice any difference in the behavior of Internet Explorer.

Yes, I could see the changes in the registry, but when I go to a web site like this:

http://www.microsoft.com/windows/int...er/videos.aspx

The video plays with the fix applied (even after rebooting the computer).

Wasn't the fix supposed to disable media player video inside Internet Explorer?

So what does this fix do? I don't understand?

Thanks!

Read other answers
RELEVANCY SCORE 94

Microsoft is investigating public reports of a vulnerability in all supported versions of Internet Explorer. Microsoft is aware of targeted attacks that attempt to exploit this vulnerability in Internet Explorer 8 and Internet Explorer 9. Applying the Microsoft Fix it solution, "CVE-2013-3893 MSHTML Shim Workaround," prevents the exploitation of this issue. See the Suggested Actions section of this advisory for more information.Microsoft Security Advisory (2887505)Security Advisory 2887505 and Microsoft Fix it solutionOfficial Microsoft Fix it

A:Microsoft Security Advisory (2887505): Vulnerability in Internet Explorer

The attack using this vulnerability depends on a MS Office / MSDN DLL (hxds.dll). It is used to display help in MS Office and MSDN Library. Typically, in all products that show help using ms-help:// protocol.
 
Using hxds.dll for attacking was known for many months in the underground world. So its nothing new. If you use IE and also MS Office, then be careful.
 
My personal suggestion is to just use Chrome.

Read other 5 answers
RELEVANCY SCORE 94

http://blogs.technet.com/b/msrc/archive/20...ry-2416728.aspxToday we provided advance notification to customers that we will release an out-of-band security update to address the vulnerability discussed in Security Advisory 2416728. The update is scheduled for release tomorrow, Tuesday, September 28, 2010 at approximately 10:00 AM PDT. The bulletin has a severity rating of Important and addresses a publicly disclosed vulnerability in ASP.NET that affects all versions of the .NET Framework when used on Windows Server operating systems. Windows desktop systems are listed as affected, but consumers are not vulnerable unless they are running a Web server from their computer.Based on our comprehensive monitoring of the threat landscape, we have determined an out-of-band release is needed to protect customers as we have seen limited attacks and continued attempts to bypass current defenses and workarounds.

A:Out of Band Release to Address Microsoft Security Advisory 2416728

Jees. I just hope I7Media updated. I don't feel like having a vulnerable site, thank you very much.

Read other 1 answers
RELEVANCY SCORE 92

Hey Folks,  I was reading an interesting article on the following Microsoft Issues Security Advisory on Solid-State Drive Hardware Encryption, and I was wondering what Lenovo had planned to help out?  https://www.ru.nl/icis/news/recent_news/@1181122/radboud-university-researchers-discover-security/ 

Read other answers
RELEVANCY SCORE 84.8

Windows 8.1 Mail app push email notification for Outlook account stopped working yesterday (it was working for one year). I haven't changed anything. Note it stopped working
on two different devices at the same time. The only way to get new email messages is manual synchronization by the Sync button now. No error messages in Event log, I also tried to reinstall all three apps, no change. Note that calendar push
notifications still works (on both devices).


I believe it is a server issue because TcpView now reports livecomm.exe process connection to
dub407-m.hotmail.com server on both devices affected while it was something like
snt000-m.hotmail.com (I don't remember the number exactly) before when it had worked. It seems to be my Microsoft account specific issue because notifications on other Microsoft account where Mail, Calendar and People apps are connected to
col403-m.hotmail.com server still works.
Short summary:

My MS account until 20 Jan 2016 - connection to snt000-m.hotmail.com - notifications/synchronization workedMy MS account from 21 Jan 2016 - connection to dub407-m.hotmail.com - notifications/synchronization does not workOther MS account - connection to col403-m.hotmail.com - notifications/synchronization still work


I used Fiddler debugging proxy to capture communication between the livecomm.exe process and Microsoft dub407-m.hotmail.com server. It has
confirmed that new email notification does not arrive from the server (while the calendar ... Read more

Read other answers
RELEVANCY SCORE 83.6

Hello:

I have a problem with my Microsoft Outlook 2003. Sometimes my email notification works, sometimes it doesn't. It seems to not work for internal email.

I am using Windows Professional 2000.

I've checked the notification, turned it off and on again, but still not work for internal emails.

Thanks for ur assistance.

Liz
 

A:Microsoft Outlook email notification not work...

Read other 9 answers
RELEVANCY SCORE 83.6

SOURCE: http://www.computerworld.com/s/article/9249445/Microsoft_to_shutter_security_notification_service?source=rss_operatingsystems&utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+computerworld%2Fs%2Ffeed%2Ftopic%2F125+%28Computerworld+Windows+News%29
Here are the RSS links, to get the same info that was being sent via e-mail:
http://technet.microsoft.com/en-us/security/rss/bulletin
https://technet.microsoft.com/en-us/security/rss/comprehensive
https://technet.microsoft.com/en-us/security/rss/advisory
http://blogs.technet.com/b/msrc/rss.aspx
Have a great day!

A:Microsoft to shutter security notification service

"As of July 1, 2014, due to changing governmental policies concerning the issuance of automated electronic messaging, Microsoft is suspending the use of email notifications," the company told the mailing list's members.The use of the word "suspending" leave opens the possibility that Microsoft will resume the practice at some later date.Figures...Big Brother sticking his nose where it doesn't belong.

Read other 5 answers
RELEVANCY SCORE 83.6

I've tried to sign up for the Microsoft Security Notification Service: Comprehensive Edition over months but haven't received a single email. No welcome email either. I've checked in my spam folders too. Clicking Subscribe does not seem to change any of
my Microsoft subscriptions.
[screenshot 1 deleted because account unverified]
Clicking Subscribe turns both buttons grey momentarily and then they return to their previous appearance.
[screenshot 2 deleted because account unverified]
No subscription shown in my Microsoft Account communication permission settings.
[screenshot 3 deleted because account unverified]
Tried with both Firefox and Edge.
How can I get an email subscription to this from Microsoft? Thank you!

Read other answers
RELEVANCY SCORE 83.6

Microsoft To Patch Critical Holes In WindowsOffice July 7, 2005 Microsoft will post three security bulletins, two for Windows and one for Office, next week, the software giant announced on Thursday. Two of the trio will be tagged as "critical," Microsoft's most dire threat label.Full Read at InformationWeekMicrosoft Security Bulletin Advance NotificationUpdated: July 7, 2005On 12 July 2005 Microsoft is planning to release:Security Updates? 2 Microsoft Security Bulletins affecting Microsoft Windows. The greatest aggregate, maximum severity rating for these bulletin is Critical. Some of these updates will require a restart. These updates will be detectable using the Microsoft Baseline Security Analyzer (MBSA). ? 1 Microsoft Security Bulletin affecting Microsoft Office. The greatest aggregate, maximum severity rating for this bulletin is Critical. These updates may require a restart. These updates will be detectable using the Microsoft Baseline Security Analyzer (MBSA). Microsoft Windows Malicious Software Removal Tool? Microsoft will release an updated version of the Microsoft Windows Malicious Software Removal Tool on Windows Update, Microsoft Update, Windows Server Update Services and the Download Center. Note that this tool will NOT be distributed using Software Update Services (SUS).Non-security High Priority updates on MU, WU, WSUS and SUS? Microsoft will release one NON-SECURITY High-Priority Updates for Microsoft Office on Microsoft Update (MU), and Windows... Read more

Read other answers
RELEVANCY SCORE 83.6

Microsoft is providing a preliminary overview of the monthly security bulletins that will be issued on the second Tuesday of each month (usually around 1:00 pm PST). To help security and network administrators with planning, Microsoft will announce the patches that are going to be released a few days ahead of time. This general overview will provide the number of security bulletins that be released, anticipated security ratings and the products that will be affected. Microsoft Security Bulletins - Advanced Notificationhttp://www.microsoft.com/technet/security/...tinadvance.mspxhttp://www.microsoft.com/technet/security/...in/advance.mspx

Read other answers
RELEVANCY SCORE 83.6

...On 12 December 2006 Microsoft is planning to release:Security Updates? Five Microsoft Security Bulletins affecting Microsoft Windows. ? One Microsoft Security Bulletins affecting Microsoft Visual Studio. ? Microsoft will release an updated version of the Microsoft Windows Malicious Software Removal Tool on Windows Update, Microsoft Update, Windows Server Update Services and the Download Center.Non-security High Priority updates on MU, WU, WSUS and SUS? Microsoft will release four NON-SECURITY High-Priority Updates for Windows on Windows Update (WU) and Software Update Services (SUS).? Microsoft will release 10 NON-SECURITY High-Priority Updates on Microsoft Update (MU) and Windows Server Update Services (WSUS).Although we do not anticipate any changes, the number of bulletins, products affected, restart information and severities are subject to change until released....http://www.microsoft.com/technet/security/...in/advance.mspx

A:Microsoft Security Bulletin Advance Notification (dec)

Microsoft Security Bulletin Summary for December, 2006http://www.microsoft.com/technet/security/...n/ms06-dec.mspx3 Critical:MS06-072 - Cumulative Security Update for Internet Explorer (925454)MS06-073 - Vulnerability in Visual Studio 2005 Could Allow Remote Code Execution (925674)MS06-078 - Vulnerability in Windows Media Format Could Allow Remote Code Execution (923689)4 Important:MS06-074 - Vulnerability in SNMP Could Allow Remote Code Execution (926247)MS06-075 - Vulnerability in Windows Could Allow Elevation of Privilege (926255)MS06-076 - Cumulative Security Update for Outlook Express (923694)MS06-077 - Vulnerability in Remote Installation Service Could Allow Remote Code Execution (926121)

Read other 1 answers
RELEVANCY SCORE 82.8

On 11 July 2006 Microsoft is planning to release:Security Updates? Four Microsoft Security Bulletins affecting Microsoft Windows. The highest Maximum Severity rating for these is Critical. These updates will be detectable using the Microsoft Baseline Security Analyzer and the Enterprise Scan Tool. Some of these updates will require a restart.? Three Microsoft Security Bulletins affecting Microsoft Office. The highest Maximum Severity rating for these is Critical. These updates will be detectable using the Microsoft Baseline Security Analyzer. These updates may require a restart.Microsoft Windows Malicious Software Removal Tool? Microsoft will release an updated version of the Microsoft Windows Malicious Software Removal Tool on Windows Update, Microsoft Update, Windows Server Update Services and the Download Center.Note that this tool will NOT be distributed using Software Update Services (SUS).http://www.microsoft.com/technet/security/...in/advance.mspx

Read other answers
RELEVANCY SCORE 82.8

As part of a monthly patching cycle, the software maker plans to release on Tuesday a dozen security bulletins with fixes for flaws. Nine of the bulletins address problems in Windows, two relate to Office and one to the Exchange e-mail server software. At least one of the Windows and one of the Office alerts is deemed "critical,"...Additionally, the June patches will permanently alter the way Internet Explorer handles Web programs called ActiveX Controls.news.commicrosoft.com/technet

Read other answers
RELEVANCY SCORE 82

Tuesday, December 16, 2008 12:28 PM by MSRC TEAM
Advance Notification for December 2008 Out-of-Band Release


Hi this is Christopher Budd,
We’ve just published our Advance Notification for an out-of-band security bulletin release. We plan to release the security update tomorrow, Dec. 17, 2008 to address the vulnerability we’ve discussed in Microsoft Security Advisory 961051. Our target time, as always, is 10:00 a.m. Pacific Time. We’ll be holding two special webcasts to give you details and take your questions..................more

For full details leading to this Out-of -Band Release, please go to the following Thread in this Forum;

Vista Forums>System Security>The Microsoft Security Response Centre - new Security Advisory Released.

Read other answers
RELEVANCY SCORE 82

Quote:

This is an advance notification of security bulletins that Microsoft is intending to release on February 14, 2012.

This bulletin advance notification will be replaced with the February bulletin summary on February 14, 2012. For more information about the bulletin advance notification service, see Microsoft Security Bulletin Advance Notification.

To receive automatic notifications whenever Microsoft Security Bulletins are issued, subscribe to Microsoft Technical Security Notifications.

Microsoft will host a webcast to address customer questions on the security bulletins on February 15, 2012, at 11:00 AM Pacific Time (US & Canada). Register now for the February Security Bulletin Webcast. After this date, this webcast is available on-demand. For more information, see Microsoft Security Bulletin Summaries and Webcasts.

Microsoft also provides information to help customers prioritize monthly security updates with any non-security, high-priority updates that are being released on the same day as the monthly security updates.


Microsoft Security Bulletin Advance Notification for February 2012

ANS for February 2012, and some notes on SDL - MSRC - Site Home - TechNet Blogs

A:Microsoft Security Bulletin Advance Notification for February 2012

Thanks JMH for keeping us abreast of such things.

Read other 3 answers
RELEVANCY SCORE 82

Looks like a slow month, lol. 1 Critical, 4 Important, and 1 Moderate.

Microsoft Security Bulletin Advance Notification for March 2012

A Guy

A:Microsoft Security Bulletin Advance Notification for March 2012

Does a slow month a sign of malware creators and hackers slowing down?

Read other 1 answers
RELEVANCY SCORE 82

This is an advance notification of six security bulletins that Microsoft is intending to release on Tuesday June 12, 2007.
http://www.microsoft.com/technet/security/bulletin/ms07-jun.mspx
 

A:Microsoft Security Bulletin Advance Notification for June 2007

Reminder!
 

Read other 1 answers
RELEVANCY SCORE 78

I set my computer to boot in safe mode, but when it did it asked for my Microsoft account password. I couldn't remember it so I reset it. Now it won't log me in and I'm locked out of my account even though I know it's the right password. Plus the Internet doesn't seem to be working, but it says it's connected. Any ideas how on earth to fix this if I can't access anything beyond the log in screen?

A:Can't log in with Microsoft account, Internet won't work

Hello mgoldin, and welcome to Eight Forums.

If you have another computer (ex: friends) that you can use with an internet connection, then you can use Option Two in the tutorial below to reset your Microsoft account password to regain access. It may take a bit to sync the new password though.

Microsoft Account Password - Change or Reset in Windows 8

Hope this helps,
Shawn

Read other 11 answers
RELEVANCY SCORE 78

For several weeks I have tried to login to my windows account, keeps telling my password is wrong, reset password, then go to second step tells me password is wrong. I keep resetting and and it says it was successful but then when I go to use it, it says it's wrong. I can't even try adding the extensions to Edge because of the password, you have to login to your account.

Read other answers
RELEVANCY SCORE 78

I just setup a Microsoft account on my Win 8 Pro X64 system to play with. As part of the process it asked me to enter a Security Code that they would send me. This is pretty dumb as at that point there was no way for me to receive the security code so I clicked the Can't do this now button.

Once I completed creating the account and got logged in then I could switch users back to my normal account where the E-mail was sent to.

My actual question is, what do I do with that Security Code now that I have it? I have not found anywhere to enter it. The E-mail I received looks like this:






Microsoft account

Security code

Thanks for helping us verify the Microsoft account xx*****@xxx.xx.xxx.

Here is your code: nnnnnnn

This is a verification code, not a password. If you didn't request this code, someone else may know the password for xx*****@xxx.xx.xxx and have access to that account. Click here to change your password.

Thanks,
The Microsoft account team

A:Microsoft account security code

Hey Rich,

Are you able to access your email from another computer or device while setting up your Microsoft account and entering the code?

Read other 7 answers
RELEVANCY SCORE 78

Hello,

I'm using Windows 10 and when I start up my laptop today, I've noticed that the Microsoft Account notification came out. After that I can't click anything but the mouse is able to move.

This is what it says:
"Microsoft Account
You need to fix your Microsoft Account for apps on your other devices..."

This happens a few seconds after loading into the screen, whenever the Microsoft Account notification came out. I can't click anything and the keyboard shortcuts aren't working as well.

I've tried force closing to enter Safe Mode. Then tried to uninstall some apps. I've tried uninstalling Microsoft related products such as Microsoft Office 2016, but I'm unable to because I'm in Safe Mode. I've also tried to scannow command in Safe Mode and restart my laptop. No luck as well. Tried the clean boot, also nope.

So I just leave it there and let it hang for 10 minutes. After 10 minutes or so, I've noticed that on the top right there is a pop up screen that says Windows Unresponsive(or something like that). Then it refresh my screen. But it still hangs there.

Any idea how I can fix this problem? Thank you.

A:Laptop hangs when "Microsoft Account Notification" appeared

Hey,

try going to your Windows 10 Settings, submenu Privacy, and then General. Set the following options off:

"Let apps on my other devices open apps and continue experiences on this device”
“Let apps on my other devices use Bluetooth to open apps and continue experiences on this device”

Read other 2 answers
RELEVANCY SCORE 77.2

Today has been named as Safer Internet Day. On this occasion Microsoft has decided to take some time to talk to Xbox 360 owners and Xbox Live subscribers about how the company is trying to handle reports of Xbox Live accounts being highjacked. It's an issue that Microsoft and a number of Xbox Live users have been dealing with a lot lately. So far, Microsoft has insisted that the Xbox Live service itself has not been attacked and has blamed the account hijackings on phishing scams and other methods.

Today on Microsoft's Major Nelson web site, Xbox Live's General Manager Alex Garden stated that Microsoft has been very aware of the rise of Xbox Live account attacks, stating:

I can assure you we are listening and continue to take aggressive steps to help protect you against ever-changing threats. We also care deeply about how this ongoing issue affects your experience with Xbox LIVE and your trust in us.



Microsoft talks more about Xbox 360 account security - Neowin.net

Read other answers
RELEVANCY SCORE 77.2

I just got this email and am wondering if its real. Yes that's my email address, However I do not have a Microsoft account, Why would I?
 
No I did not click anything.
 

A:Microsoft account security alert( Is this a scam)

It's fake. Google for "microsoft account team" (with quotes) and you'll find several examples.
 
You could also look at the sender.
 
If you post the source of the e-mail, I'll show you other signs (warning: this source contains data you might not want to disclose).

Read other 46 answers
RELEVANCY SCORE 76.8

My computer is endlessly giving me the message "you need to fix your microsoft account for apps on your devices to be able to launch apps and continue experiences on this device"

I have clicked on it and it takes me to the "Change privacy options" settings page. The only slider not previously active was for "Let apps on my other devices use Bluetooth to open apps and continue experiences on this device", which I have now turned on. When I click on the message, a web windows tried to open, but it flickers in and out of existence whilst showing on "Please wait".

I am using Windows 10 Pro build 10.0.14393. I feel like this message only started appearing upon a recent upgrade brought about by being in the 'slow ring' of releases.

I get this notification every few minutes and it is very irritating. Please help.

A:repeating notification "you need to fix your microsoft account"

Make sure you can sign-in to your Microsoft account.

John

Read other 16 answers
RELEVANCY SCORE 76.4

I did a system reset on my laptop and now I'm locked out.I've reset my Microsoft account password many times and that's not working, it's still telling me you can't sign in to your device right now. Go to account.live.com to fix the problem,or try the last password you used on this device. I have tried resetting the password and it just keeps telling me it's not right....please help

A:I'm locked out, resetting my Microsoft account didn't work

Hi, A reset is provided by the microsoft , you can run a recovery provided by hp and it will drive your computer to day 1 condition .  run a recovery : steps to run a recovery power down the note book as soon as you hit the power button , keep tapping the esc key on the top left corner until a new window opens up(the start up menu ) choose the option f11 and choose the option trouble shooting, and run the option called recoveryNote: recovery  will cause all the data to be lost on your computer and makes the computer to go back to day 1 condition  

Read other 2 answers