Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium


Hotmail Security Logging

Posted on 2011-04-25
Medium Priority
Last Modified: 2012-05-11
I believe that someone has been accessing my Hotmail account and deleting private messages without my knowledge. How can I find out the approximate location from where these access attempts were made? They have the password, so it never threw up any red flags from this end.

Thank you!
Question by:NMCS_Support
1 Comment

Accepted Solution

Sean Meyer earned 2000 total points
ID: 35461538
Conclusion on Logged hotmail - It is Not possible to get information Of your MSN hotmail account about who logged in and from where.

Now if you had gmail you could at least get the ip address of anyone currently logged into your account.

Just make sure your computer has been scanned for keyloggers and change your passwords and any account which may have an identical password.  AND if you do find a keylogger with anti-malware then you better check all of your accounts.

Featured Post

Who's Defending Your Organization from Threats?

Protecting against advanced threats requires an IT dream team – a well-oiled machine of people and solutions working together to defend your organization. Download our resource kit today to learn more about the tools you need to build you IT Dream Team!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Securing your business data in current era should be your biggest priority. Numerous people are unaware of the fact that insiders commit more than 60 percent of security breaches. You need to figure out the underlying cause and invoke your potential…
Your business may be under attack from a silent enemy that is hard to detect. It works stealthily in the shadows to access and exploit your critical business information, sensitive confidential data and intellectual property, for commercial gain. T…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses

580 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question