Eve Blakemore, Author at Microsoft Security Blog http://approjects.co.za/?big=en-us/security/blog/author/eveblakemore/ Expert coverage of cybersecurity topics Thu, 20 Feb 2025 04:13:43 +0000 en-US hourly 1 https://wordpress.org/?v=6.7.2 What is a trusted device? http://approjects.co.za/?big=en-us/security/blog/2014/08/14/what-is-a-trusted-device/ Thu, 14 Aug 2014 08:10:00 +0000 When you try to view or edit your credit card details or other sensitive information in your Microsoft account, you might need to enter a security code first, to make sure that only you can get in to your account. But you can designate a computer or other device as a trusted device. On trusted […]

The post What is a trusted device? appeared first on Microsoft Security Blog.

]]>
When you try to view or edit your credit card details or other sensitive information in your Microsoft account, you might need to enter a security code first, to make sure that only you can get in to your account. But you can designate a computer or other device as a trusted device. On trusted devices, you don’t need to enter a security code each time you try to access sensitive information.

How many trusted devices can I have?

You can trust as many devices as you want. There is no limit. If you don’t sign in to a particular trusted device at least once every two months, it’s automatically removed from your Microsoft account. This safeguard helps keep your account more secure in the event that a trusted device is lost or stolen without you realizing it. You can always trust a device again later.

The post What is a trusted device? appeared first on Microsoft Security Blog.

]]>
How to sign into devices that don’t accept security codes http://approjects.co.za/?big=en-us/security/blog/2014/07/31/how-to-sign-into-devices-that-dont-accept-security-codes/ Thu, 31 Jul 2014 13:55:00 +0000 Two-step verification makes it more difficult for hackers to access your account, even when they have your password. If you turn on two-step verification, you’ll see an extra page every time you sign in on a device that isn’t trusted. The extra page prompts you to enter a security code to sign in. When you turn […]

The post How to sign into devices that don’t accept security codes appeared first on Microsoft Security Blog.

]]>
Two-step verification makes it more difficult for hackers to access your account, even when they have your password. If you turn on two-step verification, you’ll see an extra page every time you sign in on a device that isn’t trusted. The extra page prompts you to enter a security code to sign in.

When you turn on two-step verification for your Microsoft account, it turns on two-step verification for all the places where you sign in with your Microsoft account. However, some apps (like the email apps on some smartphones) or devices (like the Xbox 360 console) can’t prompt you to enter a security code when you try to sign in, so they display an incorrect password or account error.

For example, if you’ve just turned on two-step verification, you might see the following error code and message when you try to sign in to Xbox Live:

Account does not exist.
Status Code: 8015D002

Create a unique app password to sign in

If you get an error like the one above with an app or device, you’ll need to create a unique app password to sign in. Once you’ve signed in with your app password, you can use that app or device. You’ll need to create and sign in with an app password one time for each app or device that can’t prompt you for a security code.

  1. Sign in to your Microsoft account.
  2. Under Password and security info, tap or click Edit security info.

If you’re prompted for a security code here, enter it and tap or click Submit.

  1. Under App passwords, tap or click Create a new app password.

A new app password is generated and appears on your screen.

  1. Switch to the app or device for which you need the password, and enter the app password that was generated.

To learn more about signing in to specific devices, see App passwords and two-step verification.

Get more answers to your questions about two-step verification

The post How to sign into devices that don’t accept security codes appeared first on Microsoft Security Blog.

]]>
Is that call from Microsoft a scam? http://approjects.co.za/?big=en-us/security/blog/2014/06/26/is-that-call-from-microsoft-a-scam/ Thu, 26 Jun 2014 08:46:00 +0000 Neither Microsoft nor our partners make unsolicited phone calls (also known as cold calls) about your computer security or software fixes.

The post Is that call from Microsoft a scam? appeared first on Microsoft Security Blog.

]]>
(Note: Our Tech support scams FAQ page has the latest info on this type of threat, including scammer tactics, fake error messages, and the latest scammer hotlines. You can also read our latest blog, Teaming up in the war on tech support scams.)

A reader writes:

I received a call from someone who claimed that my computer had been identified by Microsoft as vulnerable. I thought it sounded fake, and I told them that I had no way to know if they were who they said they were. Then they said they could prove that they were from Microsoft by giving me my serial number if I would go to a website called www.ammyy.com.

Is this call a scam?

Yes. This is a scam. This is not a legitimate call from Microsoft. Neither Microsoft nor our partners make unsolicited phone calls (also known as cold calls) about your computer security or software fixes.

If you receive a call like this one, it’s a scam, and all you need to do is hang up.

Cybercriminals often use publicly available phone directories, so they might know your name and other personal information when they call you. They might even guess what operating system you’re using. It’s still a scam.

Don’t let scammers encourage you to install dangerous software

Once cybercriminals gain your trust, they might ask for your user name and password or ask you to go to a legitimate website (such as www.ammyy.com) to install software that will let them access your computer to fix it. Once you do this, your computer and your personal information are vulnerable.

Do not trust unsolicited calls. Do not provide any personal information.

Although law enforcement can trace phone numbers, perpetrators often use pay phones, disposable cellular phones, or stolen cellular phone numbers. It’s better to avoid being conned rather than try to repair the damage afterwards.

I think I might have already fallen for this scam

If you think you might be a victim of fraud, you can report it.

The post Is that call from Microsoft a scam? appeared first on Microsoft Security Blog.

]]>
Microsoft is building a global online safety community, one tweet at a time http://approjects.co.za/?big=en-us/security/blog/2014/06/12/microsoft-is-building-a-global-online-safety-community-one-tweet-at-a-time/ Thu, 12 Jun 2014 06:00:00 +0000 Some say, “It takes a village to raise a child.” Extending this notion, it takes an entire global community to make the Internet a safer and better place. Microsoft is committed to fostering digital citizenship—the safer, responsible, and more appropriate use of devices and technology. Although it’s impossible to be all things to all people, […]

The post Microsoft is building a global online safety community, one tweet at a time appeared first on Microsoft Security Blog.

]]>
Some say, “It takes a village to raise a child.” Extending this notion, it takes an entire global community to make the Internet a safer and better place.

Microsoft is committed to fostering digital citizenship—the safer, responsible, and more appropriate use of devices and technology. Although it’s impossible to be all things to all people, by using digital and social media, we can more efficiently reach those interested in educating themselves, their community, and the youth in their lives, on the proactive habits and practices needed to have safer digital experiences.

Earlier this year, Microsoft surpassed 100,000 followers on its @Safer_Online Twitter channel. This growth is due to the involvement and enthusiasm of our active community. From sharing our online safety news, research, and guidance, to connecting with other online safety experts and participating in our live social media events, you are what drives us to do more. Thank you for your support and engagement!

We all have a role to play in helping create a safer digital world.  What will yours be?

  • Educate yourself and your social circles about the benefits of, risks to, and proactive steps to take when going online.
  • Join the online safety conversation with your own tips and questions for our community.
  • Participate in any of our upcoming live Twitter chats. You never know, there could be prizes to be won!

Connect with us on all of our online channels!

Web: Microsoft.com/Safety  Twitter: @Safer_Online  Facebook: SaferOnline  YouTube: MSFTOnlineSafety  

The post Microsoft is building a global online safety community, one tweet at a time appeared first on Microsoft Security Blog.

]]>
5 ways to protect your Microsoft account http://approjects.co.za/?big=en-us/security/blog/2014/05/15/5-ways-to-protect-your-microsoft-account/ Thu, 15 May 2014 08:54:00 +0000 Your Microsoft account (formerly your Windows Live ID) is the combination of an email address and a password that you use to sign in to services such as Xbox LIVE and Outlook.com, as well as devices such as Windows Phone and computers running Windows 8. A Microsoft account is free and you can use it […]

The post 5 ways to protect your Microsoft account appeared first on Microsoft Security Blog.

]]>
Your Microsoft account (formerly your Windows Live ID) is the combination of an email address and a password that you use to sign in to services such as Xbox LIVE and Outlook.com, as well as devices such as Windows Phone and computers running Windows 8.

A Microsoft account is free and you can use it to:

  • Purchase apps from the Windows Store
  • Back up all your data using free cloud storage
  • Keep all your devices, photos, friends, games, settings, music, up to date and in sync.

5 ways to help protect your Microsoft account

  1. Create a strong password. Strong passwords use a combination of uppercase and lowercase letters, numerals, punctuation marks, and symbols. The longer the better, and don’t use personal information (such as a pet’s name, nickname, or driver’s license number) that can be easily guessed.
  2. Protect your password. Don’t use the same password you use on other sites, and remember to change your Microsoft account password (as well as other passwords) regularly. Watch out for email social engineering scams designed to trick you into turning over your password to a cybercriminal.
  3. Enable two-step verification. Two-step verification uses two ways to verify your identity whenever you sign in to your Microsoft account. Two-step verification is optional, but we recommend that you use it. Learn how to turn it on.
  4. Make sure the security information associated with your account is current. If the alternate email address or phone number you’ve given us changes, update the settings of your account so that we can contact you if there’s a problem.
  5. Watch out for phishing scams. If you receive an email message about the security of your Microsoft account, it could be a phishing scam. Don’t click links in any messages unless you trust or check with the sender.

Don’t have a Microsoft account yet? See How do I sign up for a Microsoft account?

The post 5 ways to protect your Microsoft account appeared first on Microsoft Security Blog.

]]>
How do I know if I already have antivirus software? http://approjects.co.za/?big=en-us/security/blog/2014/02/21/how-do-i-know-if-i-already-have-antivirus-software/ Fri, 21 Feb 2014 17:14:00 +0000 If your computer is running Windows 8, you already have antivirus software. Windows 8 includes Windows Defender, which helps protect you from viruses, spyware, and other malicious software.

The post How do I know if I already have antivirus software? appeared first on Microsoft Security Blog.

]]>
UPDATE: For the most relevant information on antivirus software, learn how to protect your computer by visiting the Microsoft support page on Windows Defender. We can ensure this page stays updated with the most relevant information on how to help protect your PC with Windows Defender.

If your computer is running Windows 8

If your computer is running Windows 8, you already have antivirus software. Windows 8 includes Windows Defender, which helps protect you from viruses, spyware, and other malicious software.

If Windows Defender is turned off and you don’t have another antivirus program installed (or your other antivirus program is not working), you will see a warning in the notification area on your taskbar.

If your computer is running Windows 7

Windows 7 includes spyware protection, but to protect against viruses you can download Microsoft Security Essentials for free.

To find out if you already have antivirus software:

  1. Open Action Center by clicking the Start button , clicking Control Panel, and then, under System and Security, clicking Review your computer’s status.
  2. Click the arrow button  next to Security to expand the section.

If Windows can detect your antivirus software, it’s listed under Virus protection.

Windows doesn’t detect all antivirus software, and some antivirus software doesn’t report its status to Windows. If your antivirus software isn’t displayed in Action Center and you’re not sure how to find it, try any of the following:

  • Type the name of the software or the publisher in the Search box on the Start menu.
  • Look for your antivirus program’s icon in the notification area of the taskbar.

If your computer is running Windows Vista

Windows Vista does not include virus protection. To protect against viruses, you can download Microsoft Security Essentials for free.

The status of your antivirus software is typically displayed in Windows Security Center.

  1. Open Security Center by clicking the Start button , clicking Control Panel, clicking Security, and then clicking Security Center.
  2. Click Malware protection.

If Windows can detect your antivirus software, it will be listed under Virus protection.

Windows does not detect all antivirus software, and some antivirus software doesn’t report its status to Windows. If your antivirus software is not displayed in Windows Security Center and you’re not sure how to find it, try any of the following:

  • Look for the antivirus software in the list of programs on the Start menu.
  • Type the name of the software or the publisher in the Search box on the Start menu.
  • Look for the icon in the notification area of the taskbar.

If your computer is running Windows XP

Click the security icon on the taskbar, or click Start, select Control Panel, and then double-click Security Center.

On April 8, 2014, Microsoft will end support for Windows XP. This means that after April 8, there will be no new security updates available through automatic updating for computers that are still running Windows XP.

Also on this date, Microsoft will stop providing Microsoft Security Essentials for download on Windows XP. (If you already have Microsoft Security Essentials installed, you will continue to receive antimalware signature updates for a limited time, but this does not mean that your PC will be secure because Microsoft will no longer provide security updates to protect it.)

For more information, see Support is ending soon.

I don’t know what operating system my computer is running

Find out what operating system your computer is running

The post How do I know if I already have antivirus software? appeared first on Microsoft Security Blog.

]]>
Detect and remove spyware http://approjects.co.za/?big=en-us/security/blog/2013/12/17/detect-and-remove-spyware/ Tue, 17 Dec 2013 12:11:00 +0000 Spyware is a general term used to describe software that performs certain actions—generally without appropriately obtaining your consent—such as: Advertising Collecting personal information Changing the configuration of your computer If your computer is running Windows 8, you can use the built-in Windows Defender to help you detect and get rid of spyware and other malware. If your […]

The post Detect and remove spyware appeared first on Microsoft Security Blog.

]]>
Spyware is a general term used to describe software that performs certain actions—generally without appropriately obtaining your consent—such as:

  • Advertising
  • Collecting personal information
  • Changing the configuration of your computer

If your computer is running Windows 8, you can use the built-in Windows Defender to help you detect and get rid of spyware and other malware. If your computer is running Windows 7, Windows Vista, or Windows XP, Windows Defender removes spyware.

To get rid of viruses and other malware, including spyware, on Windows 7, Windows Vista, and Windows XP, you can download Microsoft Security Essentials for free.

The post Detect and remove spyware appeared first on Microsoft Security Blog.

]]>
Parental controls in Xbox One http://approjects.co.za/?big=en-us/security/blog/2013/12/03/parental-controls-in-xbox-one/ Tue, 03 Dec 2013 08:53:00 +0000 Xbox One is the newest all-in-one games and entertainment system from Microsoft. If you’ve already purchased one, or if you plan to, it’s a good idea to learn more about the built-in privacy and safety parental controls. Control the content your children play and watch Customize your children’s access to specifically rated games, movies, TV shows, and music […]

The post Parental controls in Xbox One appeared first on Microsoft Security Blog.

]]>
Xbox One is the newest all-in-one games and entertainment system from Microsoft. If you’ve already purchased one, or if you plan to, it’s a good idea to learn more about the built-in privacy and safety parental controls.

Control the content your children play and watch

Customize your children’s access to specifically rated games, movies, TV shows, and music according to their ages. By default, if the child is under 8 years of age, Access to content is set to “off.”

Filter the web

Parental controls let you determine what kinds of websites children can view in the Xbox One Internet Explorer app.

Manage what your children download and buy

Xbox One enables you to control what kinds of apps each child may download from the Xbox store. The setting options are:

  • Blocked (none)
  • Free apps only
  • Free or paid apps

For more information:

The post Parental controls in Xbox One appeared first on Microsoft Security Blog.

]]>
Windows Defender and Microsoft Security Essentials: Which one do I need? http://approjects.co.za/?big=en-us/security/blog/2013/11/14/windows-defender-and-microsoft-security-essentials-which-one-do-i-need/ Thu, 14 Nov 2013 08:00:00 +0000 Depending on which operating system your computer is running, you can use either Windows Defender or Microsoft Security Essentials to get rid of malicious software and viruses.

The post Windows Defender and Microsoft Security Essentials: Which one do I need? appeared first on Microsoft Security Blog.

]]>
UPDATE: For the most relevant information on Microsoft Security Essentials, please visit the Microsoft threat detection information page. We can ensure this page stays updated with the most relevant information on how to help protect your PC.

Depending on which operating system your computer is running, you can use either Windows Defender or Microsoft Security Essentials to get rid of malicious software and viruses.

If your computer is running Windows 8, you can use the built-in Windows Defender to help you get rid of viruses, spyware, or other malware. If your computer is running Windows 7, Windows Vista, or Windows XP, Windows Defender only removes spyware. To get rid of viruses and other malware, including spyware, on Windows 7, Windows Vista, and Windows XP, you can download Microsoft Security Essentials for free.

In Windows 8, Windows Defender replaces Microsoft Security Essentials

You can’t use Microsoft Security Essentials with Windows 8 or Windows RT, but you don’t need to because Windows Defender already provides built-in protection.

What is Windows Defender Offline?

Some malicious software will not allow you to access Windows Defender or other antivirus software. To help detect and remove the malware, you can start your computer by using a Windows Defender Offline CD, DVD, or USB flash drive.

The post Windows Defender and Microsoft Security Essentials: Which one do I need? appeared first on Microsoft Security Blog.

]]>
Check security settings in Windows Vista http://approjects.co.za/?big=en-us/security/blog/2013/09/03/check-security-settings-in-windows-vista/ Tue, 03 Sep 2013 08:39:00 +0000 The newest version of Windows is Windows 8, but we know that many of you still use Windows Vista. The best way to ensure that Windows Vista is as secure as it can be is to use the Windows Security Center, which is built into Windows Vista. The Windows Security Center can help you check […]

The post Check security settings in Windows Vista appeared first on Microsoft Security Blog.

]]>
The newest version of Windows is Windows 8, but we know that many of you still use Windows Vista.

The best way to ensure that Windows Vista is as secure as it can be is to use the Windows Security Center, which is built into Windows Vista.

The Windows Security Center can help you check the status of several security features on your computer, including firewall settings, Windows automatic updating, anti-malware software settings, Internet security settings, and User Account Control settings.

To get to the Window Security Center, click the Start button , click Control Panel, click Security, and then click Security Center. If Windows detects a problem (for example, if your antivirus program is out of date), Security Center displays a notification and places a Security Center icon  in the notification area. Click the notification or double-click the Security Center icon to open Security Center and get information about how to fix the problem.

Download Microsoft Security Essentials

Windows 8 comes with Windows Defender to help protect your PC from viruses and other kinds of malware.

Get more security information for Windows Vista

The post Check security settings in Windows Vista appeared first on Microsoft Security Blog.

]]>