I checked my email last week and discovered a message from a person saying they received a subpoena sent on my behalf, by email. The message had a Word document attached that was the alleged subpoena. It's obviously infected because subpoenas aren't sent by email (besides, I'm not suing him). I read it on my
Security error in the SSL library every time you restart Outlook when you have an Office 365 account in your profile.
As of July 15, 2014, Outlook cannot connect to Gmail using basic authentication. Outlook Send and Receive generates error code 0x800CCC0E. Users need to use two-step authentication or re-enable basic authentication.
How to use Group Policy or a registry key to disable the reading pane in Outlook 2013, 2010, or 2007.
When Word parses specially crafted RTF-formatted data an attacker could execute arbitrary code. Solution: stop using RTF in Outlook. I'll show you how.
Use a simple macro to convert RTF formatted messages to plain text format.
When using 2-step verification with Gmail, Outlook.com, or other email provider, Outlook (and most other mail clients), you need to use the App password.
When the Facebook provider is installed in Outlook, status updates are visible based on the kind of Public Search settings selected in the Facebook profile. Everyone with a Facebook account needs to check these settings, not just Outlook users!
A virus infected email is making the rounds, purportedly from Microsoft, updating their service agreement. It looks like the real message but the URLs point to another site, typical of a phishing scheme. At least one version of the infected message includes an embedded external HTML file. The problem? When you download external content, either automatically or per message, that file will be saved to the hard drive and it will be rendered in Outlook. In this case, the HTML file is going to be rendered.
Use a VBA macro to delete the SecureTemp Folder used by Microsoft Outlook.