THAT MICROSOFT PATCH that it was so important for you to put in place this week might have caused you problems with the Outlook email option.
There is a forum on the official Microsoft pages about this problem, and it says that Outlook 2010 and 2013 are in harm's way. Users have reported that since the patch fixed things, other things have stopped working.
The patch is fresh, but the forum post is buzzing already. This suggests that the problem is far reaching.
The first report says that HTML messages were causing Outlook to crash on both the 2010 and 13 Outlook clients. It suggests that the kind of messages that cause the issues are the kind of messages that no one really wants.
"They were always HTML messages, typically the sort of '[on sale' e-mail you get from distributors etc that include a lot of tables, images etc," it said. "I removed KB3097877 & KB3101746 and I've not been able to reproduce the crashes on 2 PC's since."
Other posts confirm the same issue, and that the removal of the above elements of the patch whack had a positive impact on performance. Microsoft must have been reading. It has updated the information on KB3097877, adding in a note about the issue and its remedial work.
"This security update was rereleased on November 11, 2015 for Windows 7 and Windows Server 2008 R2 to resolve an issue where crashes occurred in all supported versions of Microsoft Outlook when users were reading certain emails," it explains.
Putting this sort of thing aside, Patch Tuesday is a monthly headache for administrators, and a regular effort for the Redmond company. While last month's was huge, this latest one is slightly smaller but still pretty darn hefty. The recommendation from the security industry is patch now, because some of these things are critical.
"Microsoft issued 12 security updates addressing a total of 53 vulnerabilities. Four of them are rated critical and the remaining eight are important, with the impacted software list being long," said Russ Ernst, director product management at HEAT Software.
"While last month's patch load made 2015 the biggest patch year in recent memory, this month proves there is no slowing down. 123 total updates, with December yet to go."
Ernst picked over some of the more prominent fixes, urging even those companies that run long-in-the-tooth software to get with the game.
"Users running old code, specifically Vista, Server 2008 or Win 7, will want to patch MS15-114, the last of the criticals from Microsoft. This is a memory corruption vulnerability in the Windows Journal scripting engine. The best course of pro-action here is to (again and again) remind your users not to open attachments from unknown senders," he said.
"The remaining bulletins from Microsoft are all rated important and should be wrapped into your normal patching cycle."
Of course, security is not just about Microsoft these days, and Adobe also has some tasks lined up for you people. A Flash Player update from Adobe, APSB15-28, is a critical one and the third in just a month from Adobe.
Chris Goettl, product manager with Shavlik, is also ready with advice, and he doesn't recommend that anyone sit on their hands either. He reckons that even those issues that don't look bad now could mature into real problems.
"The updates are mostly OS related, but there is an Office update and two other updates that affect Skype for Business. Four of the bulletins are resolving a vulnerability that has been publicly disclosed," he explained.
"This means that these four bulletins are a higher risk of exploit. For these, expect that in as few as two to four weeks there could be working code exploits taking advantage of these vulnerabilities." µ
CUDA give exascale computing a go
And it'll even undo the damage
Affected employees have 60 days to find a new home at the company
Doesn't inspire confidence in HongMeng's appeal