SMART Blog

Smart Services has been providing independent agents with proactive, fast, and expert technology services since 1991.

Security Bulletin: Microsoft Outlook Reading Pane Vulnerability

We all have our preferences when it comes to how we work. Our Microsoft Outlook settings are no different. Many people like to have their inbox set up with the reading pane to preview emails at a glance without fully opening them. This is a common practice that, unfortunately, opens up users for unwanted viruses and threats via email. Emails sent to your inbox containing viruses or malware will install the threats when the emails are viewed in the preview pane, whether or not you've fully opened them or not. To avoid this potential danger, simply turn off your Outlook reading pane. To do this, go to View > Reading Pane > Off. This should be done for Outlook Web Access as well because the threat is the same.

 
0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Internet of Things Budget Steve Anderson Mobile Security Meetings Government Commerce Outlook Congratulations Shortcut NFL robot Telephone Touchpad Payment Cards Cast Computer Forensics File Storage insurance Project Management Data Storage Operating Sysytem Tablets Regulation 3D Printing Sales Instant Messaging Application Telephone Systems IT Technicians Patch Management SaaS Chromecast Evernote Efficiency Licensing Google Drive Images Laptop Office ISP Apps Information Technology Technology Video Surveillance Access Control Identity Theft Flexibility Television automation Tech Support Remote Workers Buisness Smartphone Co-managed IT Microsoft Windows 7 video Settings Data Theft Social Engineering GLAD Experience Emails Network Keyboard Password IIAI Break/Fix Proactive Wireless Fax Server Devices Near Field Communication Apple Ransomware IT Support Marketing Benefits Financial Scott White Human Resources Audit Regulations Computer Care holidays Gadgets Computer repair Risk Management Colocation Safety eWaste In the News Save Money Scalability Security Cameras Disaster Cybersecurity iOS Hosted Solutions Legislation The Internet of Things Business Computing Email Ubuntu HBO Big Data Paperless Office WIndows 7 Printer Law Enforcement Bluetooth Entertainment Lithium-ion battery Politics Office 365 Microsoft Workers Redundancy Memory Nanotechnology IT Management Value FAQ Mobile Device Management Internet Exlporer Software Alert Unsupported Software Router Data Loss End of Support Social Networking Vulnerability Tip of the Week Users E-Commerce Avoiding Downtime Mobile Office Media Consumption Data Recovery Machine Learning Virtual Private Network Virtualization Hiring/Firing Hard Drives Operating System Employee Teamwork Data Security Domains Hosted Solution Device Security Computers Gift Giving Advertising Managed IT Service CrashOverride Keyboard Shortcuts iPhone Applied TAM Files Microsoft Outlook 2007 Computing Customer Service OneDrive Blockchain Content Filter User Utility Computing Peripheral Computer WannaCry Mobile Computing Professional Services Windows 10s Cybercrime Productivity Google Maps Windows Bryant Caudill USB Office Tips Automobile website Microsoft Outlook Business Technology Students Best Practices Mobile Business Continuity Chrome Saving Time Training IoT Wireless Charging Touchscreen Webinar Web Design Printing Net Neutrality Analytics Current Events Help Desk Streaming Media Smart Technology MySalesResults hackers Screen Mirroring IT Support Productivity Managing Stress Tech Tip Wasting Money Compliance Cleaning Access Jerry Fetty IT Budget Virtual Desktop Emergency Ciminal Wireless Internet Alexa for Business Take Your Agency to the Next Level HaaS Vendor Twitter Online Currency Recovery Private Cloud Maintenance Collaboration Outsourced IT Bloatware Best Practice Encryption Unified Communications Document Management Hyperlink Google malware Downtime Excel Wearable Technology Content Filtering Doug Vanni Samsung Back Up Jessica Stevenson Financial Technology Antivirus lunch and learn Data Protection Wayne Joubert Taxes Upgrades Credit Cards Microsoft Office 2010 IT solutions SMB Cortana DDoS Printer Server Health Inbound Marketing Windows Ink Hybrid Cloud Business Intelligence email encryption Artificial Intelligence Hacking Server Data Breach Internet iPad IT Consultant Wasting Time Music Bandwidth Gmail Holiday HIPAA Business Miscellaneous data backups Solid State Drive Save Time Wi-Fi Windows 10 WIndows Server 2008 Charger Travel Mouse Testing Tutorial Money Root Cause Analysis Co-Managed Services Small Business Hetrick and Associates Trending MAIA Managed IT Services Mobile Devices Mobility Backup and Disaster Recovery Software as a Service Managed IT Services Facebook SMART Services Specifications User Tips PDF Nokia Supercomputer Scam Thank You Websites Updates Work/Life Balance Electronic Medical Records Programming Projects Microsoft Excel Windows 7 Network Security Branding Data Backup Amazon Printers Avoid Downtime Company Culture Innovation press release Cloud Computing Security Personal Information Employee-Employer Relationship HITECH Act IT Services Privacy OneNote Cameras Cost Management Lifestyle SMARTweb Defense Prodcutivity Saving Money Cloud Spyware Applications spam Workplace Tips Information App Two-factor Authentication Extreme Technology Makeover BDR Wiring Computer Fan Science Smartphones hacker Hardware webinar Windows 10 Humor Storage Mobile Device Consultant Intranet Comparison Managed Service Accessory Camera Microsoft Office Sports IT consulting VPN Reliable Computing Disaster Recovery Dark Web Legal Virtual Reality Conferencing Uninterrupted Power Supply Business Management Battery Phishing Remote Computing Telephony Word social media Payroll Computer Accessories Presentation Augmented Reality Wireless Technology File Sharing Microsoft Word Tablet Management Hard Drive Black Market History Video Games communications Google Assistant Monitoring Running Cable Passwords Bring Your Own Device Networking Quick Tips Connectivity Microblogging Managed IT Identities Fun Point of Sale Remote Monitoring Tech Term BYOD Adobe Vendor Management Surge Protector ebay Fraud Edge Update Analysis Managed Service Provider DocStar How To Admin IT Solutions Hard Disk Drive Smart Tech Administrator Going Green Unified Threat Management Mircrosoft Retail User Error Customer Relationship Management Employer-Employee Relationship Phishing Scam Kleinschmidt Insurance Browser Work Station MSP Best Available Phone System Shadow IT Text Messaging Data Management Virtual Assistant Search Network Congestion Books Youtube Worker Commute SharePoint Firewall Data Chevy HHR Education Administration Proactive IT Gifts Debate VoIP Backup Chromebook Employer Employee Relationship WiFi Virus agency automation IT Service Blogging WPA3 Biometrics Windows 8 Upgrade Google Docs Display Gamification Sync PowerPoint Android Reputation App store Identity Communication Data Privacy Distributed Denial of Service Transportation Backkup Language Social

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *