In recent days, complaints have been raised from users using POP accounts in the classic version of Outlook on Windows 11: after installing the January security update, several reported that the desktop client is frozen or not reopened after closing it. Microsoft has already recognized the problem and is investigating it, although for now it has not offered a definitive correction or a date to solve it. You can check the official status note at the Microsoft support center about this incident Here..
What do we talk about when we say "POP accounts"? POP, or Post Office Protocol, is a traditional way to download emails from the server to a single device. It does not offer real-time synchronization between devices that have IMAP or Exchange, but it remains a common option for domestic users and small businesses that prefer to store local emails. If you need a quick review of how POP works against IMAP, there are useful outreach resources such as the Wikipedia entry on Post Office Protocol Here., and Microsoft's documentation on POP / IMAP accounts in Outlook.

The specific update involved is the KB5074109, published on January 13 for the 25H2 and 24H2 branches of Windows 11; Microsoft maintains a page with the details of that update in this link. Cumulative reports - including threads in Microsoft Answers forums where users describe their experience - agree that, after installing that package, "classic" Outlook may not be closed properly and sometimes does not start after a forced closure; Microsoft has collected these testimonies and linked them in its public communication. Here..
At the moment, the company indicates that the Outlook and Windows teams are working on identifying the root of the failure and understanding its scope to prepare a solution. Meanwhile, Microsoft has published a temporary recommendation for affected users: if problem behavior started right after updating, a way to recover functionality is to uninstall the KB5074109 update. Uninstallation is done from the Windows Settings application, on the Windows Update → History of updates → Uninstall updates; there appears the option to remove the security update.
Before you hurry to remove patches, it's worth remembering a critical point: security updates correct vulnerabilities that, in many cases, are already being exploited in nature. Microsoft explicitly warns about the risks of removing updates that protect the system. If you decide to reverse the update temporarily, try to take compensatory measures such as making sure you have an updated antivirus, back up and postpone automatic redeployment of that patch until there is an official fix. Microsoft alert on why security updates should not be uninstalled is available in this page.

What options do those affected have while a correction is published? A practical alternative is to use web access to the mail or mobile applications provided by the service provider, which do not depend on the classic Outlook client on the PC. Another output is to configure the account as IMAP or use another mail client if your provider allows it; this prevents the lock that seems to be specifically linked to the management of POP profiles in the classic version. Some users have commented on the forums that, after uninstalling the problem update, Outlook was back on track and that, until a stable patch exists, they had to pause the updates to prevent Windows from automatically reinstalling KB5074109.
If you decide to uninstall the patch temporarily, do it with caution and document the steps you make so that you can reverse them. Keep an eye on the Microsoft support page and the KB5074109 update notes to know when a final solution is published. Microsoft has indicated that it will update its advisory as the research progresses, so that consulting the official source regularly is the best way to receive reliable and up-to-date information.
In short, we are facing a failure that affects a specific range of users - those who continue to use POP accounts with the classic Outlook on Windows 11 - and that has been officially recognized by Microsoft. The company investigates the origin, and the most effective shock measure reported by the community has been to reverse the January update, despite the risks that this manoeuvre entails. While an official patch arrives, the prudent recommendation is to evaluate alternative mail access, keep the security defences active and follow Microsoft communications to apply the correction as soon as it is available.
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

The dark matter of identity is changing the rules of corporate security
The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither ...