|
- How to recover a hacked or compromised Microsoft account
Learn how to remove viruses or malware from your Windows PC Learn how to recover a hacked or compromised account, what to do next, and how to prevent your account from being compromised in the future
- Secure your account if you think you’ve been hacked
If you think your Microsoft account has been hacked, find out how to secure your account and check for unauthorized activity
- National Public Data breach: What you need to know
In early 2024, National Public Data, an online background check and fraud prevention service, experienced a significant data breach This breach allegedly exposed up to 2 9 billion records with highly sensitive personal data of up to 170M people in the US, UK, and Canada (Bloomberg Law)
- Contact - Microsoft Support
For all sign-in issues, use this troubleshooter to help identify your problem and provide available support options First, we will ask you to enter the email address or mobile phone number you're trying to sign in with Then we will check your details against our records
- Microsoft account security info verification codes
Learn how to manage your Microsoft account security info and troubleshoot verification code issues
- What happens if theres an unusual sign-in to your account
Learn what to do if your username and password have stopped working If you sign in to your account while traveling or if you install a new app that signs in with your account, you may get an alert We just need you to provide a security code so we know it was you, and that your account is safe
- Account recovery unsuccessful - Microsoft Support
We recommend that you watch the video below and review the guidance for filling out the recovery form before trying the form again If you are unable to use the account recovery form because you don't recognize the additional account security information, use our Sign-In Helper
- How to help keep your Microsoft account secure
Learn how to keep your Microsoft account safe, including making a strong password, identifying safe emails, and reviewing account activity
|
|
|