I did write this article but it is the best article to write about this common problem.
When opening an attachment directly from within Outlook you could get an error message saying that it can’t create the file and to that, you need to check the permissions on the folder you want to save it in. In most cases, the permissions on the folder aren’t the issue but the fact that the folder is “full”. When you open an attachment directly from within Outlook it will first save a copy to a subfolder of the Temporary Internet Files folder.
Cleaning out the folder will solve the issue.
Outlook Secure Temp folder
Unfortunately, this is easier said than done. The subfolder name Outlook creates (on the installation of Outlook) in the Temporary Internet Files folder is quite random.
In Outlook 2003 and previous, the name starts with OLK and is followed by up to 4 random numbers or letters. In Outlook 2007, 2010 and 2013, this folder is called Content. Outlook and then has a subfolder which is named with 8 random numbers and letters.
In addition, by default, you cannot simply browse to the folder to clean it out. Getting to the Temporary Outlook Folder can still be accomplished in 2 easy steps though.
Step 1: Locate the folder
The folder location is stored in the registry in the following key;
Popular web hosting management software, Plesk Panel, is under attack, being used as a point of entry to compromise websites.
The software, created by virtualization and automation firm Parallels, has been targeted in the past, using a vulnerability in Plesk that allowed hackers to remotely compromise the Plesk server. This vulnerability affected versions 7.x, 8.x, 9.x and 10.0 to 10.3.1 of Plesk. When it closed the hole, Parallels recommended that administrators reset the passwords of all users.
Although the fix was put in place in February this year, Plesk users believe that the hackers who compromised user sites at that time, appear to have returned. They have voiced theories on Parallels’ own forums, suggesting that hackers harvested data from Plesk while it was vulnerable and then took advantage of admins or users not resetting passwords, following the hack. This would explain why admins who updated Plesk and were meant to be secure, are seemingly being compromised by an old vulnerability.
ZDNet Australia contacted Parallels over the claims of a zero-day exploit in the wild, but the firm had not responded at the time of writing.
Regardless, Plesk is definitely attracting attention from hackers. There is now a large surge in unsolicited port scans that are looking for Plesk installations, according to data from the SANS Internet Storm Centre and as noted by Sucuri Malware Lab’s Daniel Cid, during an interview with SC Magazine. Cid said that there are more than 50,000 websites compromised, as part of a hacking campaign.
Yesterday, there were reports of attacks using WordPress and other plug-ins to compromise sites, however, from Cid’s later discussions with Krebs, the common factor among all of the compromised sites appears to actually be Plesk, meaning users don’t have to be running content management systems like WordPress to become a victim.