How To Security Report Security Vulnurability On S...

So for the past 2 hours I've been trying to report a security issue regarding Skype.
Can someone please provide me with a direct phone number or email to the relevent security department to file the report to and request a claim of any Microsoft bounty applicable.
Over the past 2 hours I've had Skype Chat Support give me a Microsoft phone number who sent me about from department to department, fobbed me off, and nigh-on insulted me, all the while unable to comprehend that the issue wasn't with my account but with a Microsoft product, who eventually then told me to use Skype Chat Support who then told me for some absurd reason told me to contact Microsoft advertising department or to post all of the information here.
As you can understand this is really starting to get my goat so I was wondering if anyone had any direct/security way of reporting this by phone or email.
Thanks in advance.
Solved!
Go to Solution.

Hi, ScottBull, and welcome to the Community,
Skype does not host a telephone call-in facility, and nor does Skype use a general e-mail address.  I have flagged your report for review by those to whom I report, as Skype Customer Service ought to have reported your findings to the correct authority within Skype. 
I am not familiar with any bounty or payments offered for these types of reports.
Regards,
Elaine
Was your question answered? Please click on the Accept as a Solution link so everyone can quickly find what works! Like a post or want to say, "Thank You" - ?? Click on the Kudos button!
Trustworthy information: Brian Krebs: 3 Basic Rules for Online Safety and Consumer Reports: Guide to Internet Security Online Safety Tip: Change your passwords often!

Similar Messages

  • The passcode lock code at the iPhone 4 was broken into by a program from Internet. ( By connecting the phone to a PC that program tells the passcode) Does someone knows how to prevent unauthorized opening of iPhone? How to secure the passcode ?

    My daughter has an iPhone 4 secured with passcode lock. A visitor in their house took her unattended iPhone, connected to the PC, from a certain program got her pascode and did open her phone to go through her private messages. Does someone knows how to prevent this? How to secure the Phone from unauthorized opening?
    Thanks in advance for all suggestions!!!

    Hi igmusla,
    It seems someone has stolen your daughters phone there is an application called FindMyiPhone if she had location services on and the thief hasn't disabled it you can possibly track the phone down. Sadly you cannot stop the thief from gaining access to her phone and personal information. Please report your phone stolen to your local police station and call Apple aswell, they can possibly put a lock on your phone aswell as put it into a carrier block which prevents the thief from calling anyone or putting a new sim card in it.

  • How to secure folders in a BI Role.

    In BI, when you use profile generator, on the menu tab you can create folders.  Then, put specific reports into each folder. 
    Does anyone know how to secure the folder itself?
    We want one role for Payroll reporting.  But, would like the separate folders inside the role to holdl payroll reports for different countries.
    Any ideas are greately appreciated.
    Thanks,
    Penny

    Thank you. for your response Joseph. 
    So, when the user logs in, they will see only their role and reports.  Is this correct?
    Then, what about an Admin, are we going to see 20 or 30 roles across the top of the portal?   We were trying to 'group' the roles some how.
    Right now we have some different payroll containers.  UK, Australia, US, etc.  Each one has their own container.  When I log in, I have to scroll through so many of the different containers or roles.  Is there no way to group them?  Like have one for Payroll and then list the UK, AU, US??  Or does this list of roles in the portal keep getting longer and longer?
    Hope this makes sense.  Maybe they are called tabs.  Like System Admin, User Admin, then we have UK PAyroll, US Payroll, etc.  How can I group those tabs?
    Thanks so much for the help and insight.
    Penny

  • My iPhone 5 has broken and is being replaced with a new iPhone tomorrow. However, My carrier (orange) will b picking up my broken iPhone and I am unsure how to secure the content and icloud data on the broken phone. Is there a way to display the data?

    My iPhone 5 has broken and is being replaced with a new iPhone tomorrow. However, My carrier (orange) will b picking up my broken iPhone and I am unsure how to secure the content and icloud data on the broken phone. Is there a way to disable the data held on it and ensure that if it is fixed, nobody can use/see my data and access my account?

    Hi Gazpan,
    Thanks for visiting Apple Support Communities.
    I recommend using the steps in this article to back up your iPhone if possible:
    iOS: Back up and restore your iOS device with iCloud or iTunes
    http://support.apple.com/kb/ht1766
    You may also find this advice helpful for your situation:
    What to do before selling or giving away your iPhone, iPad, or iPod touch
    http://support.apple.com/kb/ht5661
    If you no longer have your iOS device
    If you're using iCloud and Find My iPhone on the device, you can erase the device remotely and remove it from your account by signing in to icloud.com/find, selecting the device, and clicking Erase. When the device has been erased, click Remove from Account.
    If you're unable to complete either of the above steps, you should change your Apple ID password. Changing your password won't remove any personal information that is cached on the device, but it will make sure that the new owner can't delete your information from iCloud.
    Cheers,
    Jeremy

  • How to secure one page not entire application?

    Hi there,
    I'm looking for some guidance on how to secure individual pages on my site. I've read a number of articles discussing creating a login using the Application.cfc. The thing is this approach locks down the entire site. I only want to secure a page. In my scenario, if the user hasn't logged in, and goes to a profile.cfm page, they will be asked to login. Once they login, they will then be directed to the profile.cfm page.
    Any and all advice would be greatly appreciated.
    Thanks.
    Novian

    Hi, Novian,
    An option that come directly to mind is to check for the specific page to be locked down in onRequestStart of your Application.cfc.
    This approach is relatively easy to implement but may not be the best approach (don't know how it might affect performance or something else). Basically, use a conditional in your onRequestStart method to see if the page being requested by the user is the page that needs to be secured. Something along the lines of:
    <cffunction name="onRequestStart">
         <cfargument name="target_page" />
         <cfif target_page is 'super-secure-page.cfm'>
              <!--- security stuff --->
         </cfif>
    </cffunction>
    There are, of course, other options but this was a quick and easy one that came right to mind.

  • How to secure connection in sql server 2008? my main problem is which certificate should i add in mmc

    i'm recently working on hardening of sql server 2008. now i face with a problem. my problem is  how to secure connection in sql server 2008?  my main problem is which certificate should i add in mmc? what are these certificates about?and guide
    me in choosing the appropriate certificate.
    and how should i know that the connection in sql server is secured?
    plz guide me from the beginning cause i'm rookie in this subject.
    thanks in advance.

    Hi sqlfan,
    Question 1: my problem is how to secure connection in sql server 2008?
    Microsoft SQL Server can use Secure Sockets Layer (SSL) to encrypt data that is transmitted across a network between an instance of SQL Server and a client application. For more information about Encrypting Connections to SQL Server, please refer to the following
    article:
    http://technet.microsoft.com/en-us/library/ms189067(v=sql.105).aspx
    Question 2: my main problem is which certificate should i add in mmc? what are these certificates about?and guide me in choosing the appropriate certificate.
    To install a certificate in the Windows certificate store of the server computer, you will need to purchase/provision a certificate from a certificate authority first. So please go to a certificate authority to choose the appropriate certificate.
    For SQL Server to load a SSL certificate, the certificate must meet the following conditions:
    The certificate must be in either the local computer certificate store or the current user certificate store.
    The current system time must be after the Valid from property of the certificate and before the Valid to property of the certificate.
    The certificate must be meant for server authentication. This requires the Enhanced Key Usage property of the certificate to specify Server Authentication (1.3.6.1.5.5.7.3.1).
    The certificate must be created by using the KeySpec option of AT_KEYEXCHANGE. Usually, the certificate's key usage property (KEY_USAGE) will also include key encipherment (CERT_KEY_ENCIPHERMENT_KEY_USAGE).
    The Subject property of the certificate must indicate that the common name (CN) is the same as the host name or fully qualified domain name (FQDN) of the server computer. If SQL Server is running on a failover cluster, the common name must match the host
    name or FQDN of the virtual server and the certificates must be provisioned on all nodes in the failover cluster.
    Question 3: how should i know that the connection in sql server is secured?
    If the certificate is configured to be used, and the value of the ForceEncryption option is set to Yes, all data transmitted across a network between SQL Server and the client application will be encrypted using the certificate. For more detail about this,
    please refer to Configuring SSL for SQL Server in the following article:
    http://technet.microsoft.com/en-us/library/ms189067(v=sql.105).aspx
    If you have any question, please feel free to let me know.
    Regards,
    Donghui Li

  • How to secure oracle database

    how to secure oracle database,
    I am having the oracle database which will be packed as package in a machine and will be delivered to client place , need to ensure that the client will not access the database by any means.
    Even he breaks the password (he should not break but despite client has broken the password) and went inside the database, he should not be able to see the databases Procedures ,views,functions and triggers.
    Can we Encrypt this,if so can client will be able to decrypt the same?
    Is there a way to secure the database from the client not to access the database.
    Thanks!

    933663 wrote:
    so how can i secure when there is an option to unwrap ,then there is no use in using the wrap right?Yes, because when there is a lock there is a key, when there is wrap there is unwrap, when there is encrypt there is decrypt. We can not be rest assure for hack the code. I think you should think and explore above security options which are provided by Oracle itself which have lock and key by Oracle itself; which i have mentioned in my previous post.
    You just think that if that is that much easy and cheap, then why Oracle have developed above options/features by expending many dollors..!!!
    Regards
    Girish Sharma

  • How to secure database

    hi,
    i newly joined a company, where i need to maintain oracle database running on linux system.
    my worries are below.
    1. how to secure sys user access
    as we know sys can access via "/ as sysdba" from remote.
    2. except application database user (like scott) developer doesn't have any other user password but except this is there any way developer or any other third person can access oracle database?
    3. any recommendation from expert to secure database from unauthorized access?
    linux redhat 5
    and oracle 11g

    user12187801 wrote:
    hi,
    i newly joined a company, where i need to maintain oracle database running on linux system.
    my worries are below.
    1. how to secure sys user access
    as we know sys can access via "/ as sysdba" from remote.
    2. except application database user (like scott) developer doesn't have any other user password but except this is there any way developer or any other third person can access oracle database?
    3. any recommendation from expert to secure database from unauthorized access?
    linux redhat 5
    and oracle 11gonly allow DBA to log onto DB Server
    This excludes *NIX System Adminsitrator, too!                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                               

  • How to securely back-up my library in iTunes for windows 7

    how to securely back-up my library in iTunes for windows 7

    Hey JFONT,
    Thanks for the question. The following article may assist you in achieving your end goal:
    iTunes: Back up your iTunes library by copying to an external hard drive
    http://support.apple.com/kb/HT1751
    Thanks,
    Matt M.

  • Do I need and how to secure the Unix/Linux agents authentication and communication to RMS?

    Hi everybody
    We have an environment including SCOM 2012 SP1, 10 windows server, 40 linux servers and 10 HP-UX servers. all of them are joined a trusted domain. I know the authentication method between windows agents and management server is kerberos. but not for linux and
    HP-UX servers.
    Now I want to secure the Unix/Linux agents authentication and communication to RMS. some questions:
    1- how much secure and credible is current authentication method? and in a high secure environment can I trust SCOM self signed Certificates?
    2- Considering this point that Unix/linux computers are joined to active directory domain and are using Kerberos to authenticate, can I use this
    authentication method between RMS and linux Agents? 
    3- if I make a decision to use certificates should I use gateway server? (considering all servers and RMS are in same trusted domain)
    any other suggestion?
    Thanks in advance

    nothing?

  • How to Secure pdf doc individual computerwise or individual mobilewise.

    How to Secure pdf doc individual computer-wise or individual mobile-wise.

    Could you, please, elaborate on your question. I do not understand it. Be as verbose and specific as you can. Describe what it is that you need to accomplish. Do you mean encryption? Do you mean access? Do you want to encrypt in such a way that a PDF can be opened only on a specific computer or mobile device?

  • How to secure web services?

    I am building some SOAP-RPC web services, but I don't know how to secure them.
    Only authorized users can call the web services and get the result back.
    what is the best method to implement that?
    Thanks.
    zfyang

    Please see the following article:
    http://java.sun.com/xml/jaxrpc/webservices_config_article.html

  • How to secure/inhibit printing, copying or editing when "Mark: If these alternatives is not active.."?

    How to secure/inhibit printing, copying or editing when "Mark: If these alternatives is not active,  it is either because the document already has the security, it was signed with sertificate based signature or it was established in LiveCycle Designer ES"?

    How to secure/inhibit printing, copying or editing when "Mark: If these alternatives is not active,  it is either because the document already has the security, it was signed with sertificate based signature or it was established in LiveCycle Designer ES"?

  • How to secure iPhone and iPad when traveling abroad against xtra charges

    How to secure iPhone and iPad when traveling abroad against xtra charges?

    You can either put them in "Flight Mode" ( Found in settings. This feature disables 3G, 4G and Wifi), or you can go into your settings and turn off mobile networking ( also found in settings, this allows you to connect to wifi, but disables mobile networking)

  • Anyone know how to securely erase an SSD drive?

    Does anyone know how to securely erase an SSD drive in a MacBook Pro?
    The usual 'security options' are greyed out in Disk Utility...

    Erasing it normally is enough. The nature of SSDs itself makes it secure.
    (114951)

  • How to secure Internet Sharing?

    Unless I've missed something, I can't seem to find how to securely share an internet connection in Leopard.
    I can enable Airport, share the connection - but there doesn't seem to be any way to secure it - i.e. I want to catch the wireless connection, but I don't anyone else to.
    Any ideas?

    This is a big help Tim, thanks.
    I was forewarned that Belkin Routers last about 3 minutes then expire - so I was not surprised when it slowly sank downhill. Our neighborhood does seem to have seen some new wireless faces appear over the last month or so and on the back of that I did systematically try running from channel 1 (on the Belkin) all the way up to 11 to see if it helped matters. It didn't, and it's at that point I thought the router was at fault. (Incidentally, I purchased a Belkin Ethernet Bridge and that worked perfectly).
    So really, and on the back of the Airport Card being a bit un-secure - I think it's new router time.
    Linksys WRT54g duly noted - I have recently set-up the Netgear WGT624 and this seemed excellent, and I also have experience of the 834 which has been consistently reliable.
    There is another consideration though (are you still reading?) - brand new MacBook (latest spec.), this just crawls on its internet connection. After establishing the router was causing dropouts (i.e. with the Enet Bridge on my G5 nabbing wireless perfectly from an airport card via Internet Sharing) - I was able to see that the MacBook was extremely slow (side-by-side with the same internet pages on the G5).
    Any thoughts on that one? (I'm trying to tie this all up in one question I know!).

Maybe you are looking for

  • Permanently cancelling downloads

    Good afternoon! I am currently running iTunes 11.0.4 and was wondering if there was an option to prevent TV episodes/Movies from downloading after purchase? I have grown accustomed to streaming purchased content when needed. However, after purchasing

  • Qty from VA88 Settlement for Account based copa

    Hi Gurus, I have a question on VA88 in MTO-E scenario. In account based copa the qty will update in Delivery. In MTO-E Scenario there is no accounting entries in Delivery(PGI). Is there any way to derive Billing qty in Settlement.(VA88) Thanks Vasant

  • MacBook Pro 2010: very slow wireless connection

    I know a number of people have posted similar questions, but I think I've done everything I can to fix this. I bought a 13 inch MacBook Pro last week, and found I was getting a very slow connection to my wireless network. OK when I was right next to

  • Fleet Managment - Fuel consumption & Mileage in MCIZ

    Hi, In MCIZ, the output shows only the following 1. Fuel Volume (Fuel consumption ) 2. Miles /km   (Distance Travelled) 3. Consump Dist (Fuel consumption per 100 km) 4.Costs per Route 5.Total actual costs I  want the following also. Mileage Miles per

  • OWB Process Schedule Logging

    I have created a process and want to schedule it to run on a daily basis. I created the calendar, applied it to the process, saved, deployed and started it. The schedule now appears to run as required however when I check the execution in Control Cen