<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>security Archives - Tricky Enough</title>
	<atom:link href="https://www.trickyenough.com/news-tag/security/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.trickyenough.com/news-tag/security/</link>
	<description>Explore and Share the Tech</description>
	<lastBuildDate>Mon, 18 Aug 2025 22:28:30 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.trickyenough.com/wp-content/uploads/2021/05/favicon-32x32-1.png</url>
	<title>security Archives - Tricky Enough</title>
	<link>https://www.trickyenough.com/news-tag/security/</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">100835972</site>	<item>
		<title>Imposter Alert: What to Do When Someone Creates a Fake Instagram Profile of You?</title>
		<link>https://www.trickyenough.com/news/instagram-fake-account-scams/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=instagram-fake-account-scams</link>
					<comments>https://www.trickyenough.com/news/instagram-fake-account-scams/#comments</comments>
		
		<dc:creator><![CDATA[Joycee Amolic]]></dc:creator>
		<pubDate>Mon, 18 Aug 2025 22:28:28 +0000</pubDate>
				<guid isPermaLink="false">https://www.trickyenough.com/?post_type=news&#038;p=166720</guid>

					<description><![CDATA[<p>In today&#8217;s digital world, where people connect and communicate with each other using various digital and social media platforms in the modern landscape dominated by visual media, your digital footprints and online identity are as personal as your fingerprint. So if someone creates a fake Instagram profile pretending to be you by making the use...</p>
<p>The post <a href="https://www.trickyenough.com/news/instagram-fake-account-scams/">Imposter Alert: What to Do When Someone Creates a Fake Instagram Profile of You?</a> appeared first on <a href="https://www.trickyenough.com">Tricky Enough</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><span class="cf0"><a href="https://www.trickyenough.com/benefits-of-instagram-marketing-for-your-business/" target="_blank" rel="noopener">In today&#8217;s digital world</a>, where people connect and communicate with each other using various digital and social media platforms in the modern landscape dominated by visual media, your digital footprints and online identity are as personal as your fingerprint. So if someone creates a fake Instagram profile pretending to be you by making the use of your photos, name, or bio, then it&#8217;s not just creepy, it&#8217;s a digital offence. You can now stay protected from this prank, scams, and something more sinister. Here&#8217;s what you can do- Your action plan to reclaim your identity and to keep your digital self protected is as follows</span>.</p>



<h2 class="wp-block-heading">#1 &#8211; Confirm and Document</h2>



<p>Do not panic; simply check the impersonation before you worry. Secondly, look for your Instagram profile with your name or images. And if you find one, quickly take screenshots of your profile, posts, followers, and also the messages. This documentation is very important for reporting. If needed, legal action can be taken based on this documentation. But before you take this step forward, ensure the account is indeed pretending to be you or someone you know.</p>



<h2 class="wp-block-heading">#2 &#8211; Report the Fake Account</h2>



<p>Instagram has a built-in feature to report a Fake Instagram Profile </p>



<ul class="wp-block-list">
<li>Go to the fake profile.</li>



<li>Tap the three dots (⋯) in the top right corner.</li>



<li>Select “Report” → “It’s pretending to be someone else” → “Me.” </li>



<li>You can also take the help of a report via Instagram’s Help Centre, especially if you don’t have an account or can’t access yours. The more evidence you provide, the faster they act.</li>
</ul>



<h2 class="wp-block-heading">#3 &#8211; Secure Your Account</h2>



<p>If someone can create your fake Instagram profile, then they can also try to hack your Instagram account. To avoid this, strengthen your defences with the following steps:</p>



<ul class="wp-block-list">
<li>Immediately change your password</li>



<li>(2FA), <a href="https://help.instagram.com/566810106808145" target="_blank" rel="noreferrer noopener">enable two-factor authentication</a>,</li>



<li>review your login activity, and revoke access to suspicious third-party apps.</li>



<li>Also, switching your account to private temporarily to limit exposure will also work more effectively.</li>
</ul>



<h2 class="wp-block-heading">#4 &#8211; Notify your network</h2>



<p>Inform your friends, family, and followers: Tell them about the fake account and advise them not to interact with it. Consider posting a story or update: This helps your network identify the fake account and report&nbsp;it&nbsp;as&nbsp;well.</p>



<h2 class="wp-block-heading">#5 &#8211; Prevention Tips &#8211; You can make impersonation harder, instead of controlling others </h2>



<ul class="wp-block-list">
<li>Avoid posting sensitive personal info, for example, your phone number or address.</li>



<li>Watermark your photos subtly.</li>



<li>Regularly search your name on Instagram and Google to catch impersonators early.</li>
</ul>



<h2 class="wp-block-heading">And what if Instagram still doesn&#8217;t respond?</h2>



<p>Try reporting the account again through the app and web form. You can also try reaching out to Instagram Help Centre or social media platforms like X (formerly Twitter) or Threads, if applicable.<br>If you have a business or verified account, you can <a href="https://www.facebook.com/business/help/148723649153231" target="_blank" rel="noreferrer noopener">contact Meta Business Support.</a></p>



<p><strong>Final Thought:</strong> Stay Calm, Stay Smart. A fake profile can feel like a danger, but you’re not powerless. By acting swiftly and smartly, you can shut down the imposter and reclaim your digital space. Remember, your online identity is yours, and guard it like your passport.</p>



<p><strong>Suggested:</strong></p>



<p><a href="https://www.trickyenough.com/instagram-threads-by-meta-all-you-need-to-know/" target="_blank" rel="noopener">Instagram threads by Meta &#8211; All you need to know</a>.</p>



<p><a href="https://www.trickyenough.com/increase-instagram-reels-views/" target="_blank" rel="noreferrer noopener">8 Powerful ways to increase Instagram reel views</a>.</p>



<p></p>
<p>The post <a href="https://www.trickyenough.com/news/instagram-fake-account-scams/">Imposter Alert: What to Do When Someone Creates a Fake Instagram Profile of You?</a> appeared first on <a href="https://www.trickyenough.com">Tricky Enough</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.trickyenough.com/news/instagram-fake-account-scams/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">166720</post-id>	</item>
		<item>
		<title>Samsung&#8217;s New Security Update for Galaxy Users</title>
		<link>https://www.trickyenough.com/news/samsungs-new-security-update-for-galaxy-users/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=samsungs-new-security-update-for-galaxy-users</link>
					<comments>https://www.trickyenough.com/news/samsungs-new-security-update-for-galaxy-users/#respond</comments>
		
		<dc:creator><![CDATA[Yibeni Tungoe]]></dc:creator>
		<pubDate>Fri, 02 Aug 2024 14:05:00 +0000</pubDate>
				<guid isPermaLink="false">https://www.trickyenough.com/?post_type=news&#038;p=136203</guid>

					<description><![CDATA[<p>Samsung&#8217;s new security update comprises two new features for Galaxy smartphones and tablet users. The tech company is now adding features such as Samsung Cloud Enhanced Data Protection and Quick Share&#8217;s Private Sharing to enhance users&#8217; security. Samsung&#8217;s New Security Update and its Features Samsung&#8217;s Cloud Enhanced Data Protection ensures that users&#8217; data stays safe...</p>
<p>The post <a href="https://www.trickyenough.com/news/samsungs-new-security-update-for-galaxy-users/">Samsung&#8217;s New Security Update for Galaxy Users</a> appeared first on <a href="https://www.trickyenough.com">Tricky Enough</a>.</p>
]]></description>
										<content:encoded><![CDATA[

<p>Samsung&#8217;s new security update comprises two new features for Galaxy smartphones and tablet users. The tech company is now adding features such as Samsung Cloud Enhanced Data Protection and Quick Share&#8217;s Private Sharing to enhance users&#8217; security.</p>



<h2 class="wp-block-heading" id="h-samsung-s-new-security-update-and-its-features">Samsung&#8217;s New Security Update and its Features</h2>



<p>Samsung&#8217;s Cloud Enhanced Data Protection ensures that users&#8217; data stays safe and secure in Samsung Cloud. This feature will be available from the Galaxy S24 onwards and provide users with more security when data has been synced with Samsung Cloud. </p>



<p>This feature decreases the loss of data through E2EE (end-to-end encryption), which makes the data accessible only to the users themselves. Additionally, users will be provided with a recovery code for the prevention of data loss. This recovery code can be used in case the user loses their device.</p>



<p>Users can access the Samsung Cloud Enhanced Data Protection by going into Settings of the Samsung Cloud App and clicking on Security and Privacy. Users will then have to click on More Security Settings choose the Enhanced Data Protection and finally switch on the Encrypt Backup Data and Encrypt Synced Data. However, this feature is only available on devices that use the Enhanced Data Protection feature.</p>


<div class="wp-block-image">
<figure class="aligncenter size-full"><img fetchpriority="high" decoding="async" width="1000" height="586" src="https://www.trickyenough.com/wp-content/uploads/2024/08/Samsung-Mobile-Knox-Journal-4-Quick-Share-Private-Sharing-Enhanced-Data-Protection_main2-Final.jpg" alt="" class="wp-image-136212" srcset="https://www.trickyenough.com/wp-content/uploads/2024/08/Samsung-Mobile-Knox-Journal-4-Quick-Share-Private-Sharing-Enhanced-Data-Protection_main2-Final.jpg 1000w, https://www.trickyenough.com/wp-content/uploads/2024/08/Samsung-Mobile-Knox-Journal-4-Quick-Share-Private-Sharing-Enhanced-Data-Protection_main2-Final-300x176.jpg 300w, https://www.trickyenough.com/wp-content/uploads/2024/08/Samsung-Mobile-Knox-Journal-4-Quick-Share-Private-Sharing-Enhanced-Data-Protection_main2-Final-768x450.jpg 768w, https://www.trickyenough.com/wp-content/uploads/2024/08/Samsung-Mobile-Knox-Journal-4-Quick-Share-Private-Sharing-Enhanced-Data-Protection_main2-Final-150x88.jpg 150w" sizes="(max-width: 1000px) 100vw, 1000px" /></figure></div>


<p>Samsung has also<a href="https://www.samsung.com/global/galaxy/apps/quick-share/" target="_blank" rel="nofollow noopener"> introduced Quick Share&#8217;s Private Sharing</a>. This feature ensures privacy and security while sharing files on Quick Share. It should be noted that this feature only functions between two Samsung devices.</p>



<p>Users will be able to share files only with contacts that they have selected. Furthermore, once the files have been shared, the recipient cannot share the files with other people. Screenshotting the files has also been blocked when using this feature. </p>



<p>To access this feature, users can turn this mode on inside Quick Share. Once it has been turned on, users can share files up to 200MB.</p>



<p><strong>Suggested:</strong></p>



<p><a href="https://www.trickyenough.com/news/samsung-galaxy-ai-is-here-to-change-the-world/" target="_blank" rel="noreferrer noopener">Samsung Galaxy AI is here to change the world</a>.</p>



<p><a href="https://www.trickyenough.com/news/samsungs-xr-headset-will-compete-against-apples-vision-pro/" target="_blank" rel="noreferrer noopener">Samsung’s XR Headset Soon Compete Against Apple’s Vision Pro</a>.</p>

<p>The post <a href="https://www.trickyenough.com/news/samsungs-new-security-update-for-galaxy-users/">Samsung&#8217;s New Security Update for Galaxy Users</a> appeared first on <a href="https://www.trickyenough.com">Tricky Enough</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.trickyenough.com/news/samsungs-new-security-update-for-galaxy-users/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">136203</post-id>	</item>
		<item>
		<title>Microsoft China New Mandate to Allow Only iPhones for Workers</title>
		<link>https://www.trickyenough.com/news/microsoft-china-new-madate-to-allow-only-iphones-for-workers/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=microsoft-china-new-madate-to-allow-only-iphones-for-workers</link>
					<comments>https://www.trickyenough.com/news/microsoft-china-new-madate-to-allow-only-iphones-for-workers/#respond</comments>
		
		<dc:creator><![CDATA[Yibeni Tungoe]]></dc:creator>
		<pubDate>Tue, 09 Jul 2024 15:00:00 +0000</pubDate>
				<guid isPermaLink="false">https://www.trickyenough.com/?post_type=news&#038;p=129277</guid>

					<description><![CDATA[<p>Microsoft China is banning their workers from using Android due to the company’s cybersecurity rules. Employees will now be ordered to use iPhones instead of Android devices.&#160; This new mandate is part of Microsoft’s Secure Future Initiative and will be put into action starting in September. This move by the tech giant restricts its employees...</p>
<p>The post <a href="https://www.trickyenough.com/news/microsoft-china-new-madate-to-allow-only-iphones-for-workers/">Microsoft China New Mandate to Allow Only iPhones for Workers</a> appeared first on <a href="https://www.trickyenough.com">Tricky Enough</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Microsoft China is banning their workers from using Android due to the company’s cybersecurity rules. Employees will now be ordered to use iPhones instead of Android devices.&nbsp;</p>



<p>This new mandate is part of <a href="https://www.microsoft.com/en-us/microsoft-cloud/resources/secure-future-initiative" target="_blank" rel="noreferrer noopener">Microsoft’s Secure Future Initiative</a> and will be put into action starting in September. This move by the tech giant restricts its employees from using Android devices to follow cybersecurity measures. Employees must now use Apple devices to verify employees’ identities on their work devices.&nbsp;</p>



<p>Microsoft aims to make sure that employees make use of the Microsoft Authenticator <a href="https://www.trickyenough.com/offline-password-manager/" target="_blank" rel="noreferrer noopener">password manager</a> as well as the Identity Pass app. Thus, employees will be able to access their work devices after undergoing Microsoft’s identity authentication checks. Microsoft workers with an Android phone will be given an iPhone 15.</p>



<h2 class="wp-block-heading">Microsoft China and Reason for Its Mandate</h2>



<p>This move by the tech giant may be due to Google Play’s unavailability in China. However, Apple’s App Store remains available so this might be a contributing factor behind the ban. Furthermore, Chinese mobile brands such as Xiaomi and Huawei already have their own separate and independent platforms.&nbsp;</p>



<p>Previously, state government agencies and companies in China banned iPhones in the workplace due to cybersecurity measures. iPhones were already facing a decrease in popularity in China so the Microsft mandate may relieve some of the negative attention Apple had received earlier.&nbsp;</p>



<p><strong>Suggested:</strong></p>



<p><a href="https://www.trickyenough.com/news/microsofts-latest-tool-unlock-your-maximum-ad-earnings-potential/" target="_blank" rel="noreferrer noopener">Microsoft’s Latest Tool – Unlock Your Maximum Ad Earnings Potential</a></p>



<p><a href="https://www.trickyenough.com/news/microsoft-in-plans-to-remove-wordpad/" target="_blank" rel="noreferrer noopener">Microsoft In Plans To Remove WordPad</a></p>
<p>The post <a href="https://www.trickyenough.com/news/microsoft-china-new-madate-to-allow-only-iphones-for-workers/">Microsoft China New Mandate to Allow Only iPhones for Workers</a> appeared first on <a href="https://www.trickyenough.com">Tricky Enough</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.trickyenough.com/news/microsoft-china-new-madate-to-allow-only-iphones-for-workers/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">129277</post-id>	</item>
		<item>
		<title>Worldr helps you Keep your Business Communications Tool Secure</title>
		<link>https://www.trickyenough.com/news/worldr-helps-you-keep-your-business-communications-tool-secure/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=worldr-helps-you-keep-your-business-communications-tool-secure</link>
					<comments>https://www.trickyenough.com/news/worldr-helps-you-keep-your-business-communications-tool-secure/#respond</comments>
		
		<dc:creator><![CDATA[Namita Mahajan]]></dc:creator>
		<pubDate>Sat, 30 Dec 2023 14:24:00 +0000</pubDate>
				<guid isPermaLink="false">https://www.trickyenough.com/?post_type=news&#038;p=110556</guid>

					<description><![CDATA[<p>Flashback to March 2020. Lockdown hits, and newspapers echo the cliché of the &#8216;new normal.&#8217; Businesses scramble to embrace online platforms like Zoom while cybersecurity takes center stage. However, fast forward two years, and the surge in security startups, including Worldr, signals that the threat persists. Now, what sets Worldr apart? It boils down to...</p>
<p>The post <a href="https://www.trickyenough.com/news/worldr-helps-you-keep-your-business-communications-tool-secure/">Worldr helps you Keep your Business Communications Tool Secure</a> appeared first on <a href="https://www.trickyenough.com">Tricky Enough</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN" "http://www.w3.org/TR/REC-html40/loose.dtd"><br />
<html><head><meta http-equiv="Content-Type" content="text/html; charset=utf-8"><br />
<meta http-equiv="Content-Type" content="text/html; charset=utf-8"></p>


</head><body><p>Flashback to March 2020. Lockdown hits, and newspapers echo the cliché of the &#8216;new normal.&#8217; Businesses scramble to embrace online platforms like Zoom while cybersecurity takes center stage. However, fast forward two years, and the surge in security startups, including Worldr, signals that the threat persists.</p>



<p>Now, what sets Worldr apart? It boils down to one word: simplicity. Nestled in London, <a href="https://valarian.com/" target="_blank" rel="nofollow noopener">this platform</a> effortlessly weaves privacy, security, and compliance layers into some of the globe&#8217;s most widely used business communication tools—think Microsoft Teams, Slack, and WhatsApp. However, in the evolving narrative of digital security, it stands out for its commitment to making protection easy and accessible.</p>



<h2 class="wp-block-heading" id="h-worldr-keeps-your-data-protected">Worldr keeps your data protected</h2>



<p>In an era where <a href="https://www.trickyenough.com/news/goldoson-an-android-malware-invade-60-applications-on-google-play/" target="_blank" rel="noreferrer noopener">hackers and malware are leveling up</a> (with a 31% surge in cyber attacks in 2021), Worldr provides customers with the utmost assurance that their data remains shielded. How? Through their zero-trust architecture, adopting a &#8220;never trust, always verify&#8221; approach to every device, user, or application engaging with your network.</p>



<p>Unlike other applications demanding lengthy implementation, Worldr claims a swift rollout—less than 10 minutes—asserting its products sit seamlessly atop your existing architecture. This sets a high bar for data protection and demystifies the often complex realm of cybersecurity, particularly for SMEs and startups navigating these digital waters.</p>



<h2 class="wp-block-heading" id="h-cybersecurity-over-the-top">Cybersecurity over the top</h2>



<p>Worldr is simplifying the often perplexing <a href="https://www.trickyenough.com/the-growing-role-of-machine-learning-in-cybersecurity/" target="_blank" rel="noreferrer noopener">world of cybersecurity</a>, especially for SMEs and startups. This app boasts some impressive backers, earning recognition as a Rising Star Finalist by Tech Nation in 2020 and securing a substantial £280,000 investment from InnovateUK.</p>



<p>Having disclosed a robust $11 million (£9.9 million) seed funding last year, Worldr now wields substantial capital to fuel its expansion efforts. The focus? Developing additional secure layers for various communication platforms, including email.</p>



<p>Positioned as a clever and disruptive system tailored for the businesses of tomorrow, Worldr earns its spot as one of the top startups to watch in 2023. However, the journey of simplifying cybersecurity for small businesses continues, and Worldr is at the forefront of this transformative narrative.</p>



<p><strong>Recommended:</strong></p>



<p><a href="https://www.trickyenough.com/news/poly-ai-conversational-voice-assistance/" target="_blank" rel="noreferrer noopener">Poly AI – Conversational Voice Assistance</a>.</p>


<p></body></html></p><p>The post <a href="https://www.trickyenough.com/news/worldr-helps-you-keep-your-business-communications-tool-secure/">Worldr helps you Keep your Business Communications Tool Secure</a> appeared first on <a href="https://www.trickyenough.com">Tricky Enough</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.trickyenough.com/news/worldr-helps-you-keep-your-business-communications-tool-secure/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">110556</post-id>	</item>
		<item>
		<title>Report: Up to 400,000+ Websites Are Affected by the Forminator WordPress Plugin Vulnerability</title>
		<link>https://www.trickyenough.com/news/report-up-to-400000-websites-are-affected-by-the-forminator-wordpress-plugin-vulnerability/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=report-up-to-400000-websites-are-affected-by-the-forminator-wordpress-plugin-vulnerability</link>
					<comments>https://www.trickyenough.com/news/report-up-to-400000-websites-are-affected-by-the-forminator-wordpress-plugin-vulnerability/#respond</comments>
		
		<dc:creator><![CDATA[Monisha]]></dc:creator>
		<pubDate>Mon, 04 Sep 2023 22:32:25 +0000</pubDate>
				<guid isPermaLink="false">https://www.trickyenough.com/?post_type=news&#038;p=97221</guid>

					<description><![CDATA[<p>A major vulnerability affecting the Forminator WordPress Contact Form plugin up to and including version 1.24.6 was disclosed by the U.S. Government&#8217;s National Vulnerability Database (NVD). According to the warning, malicious files can be uploaded to websites by unauthenticated attackers, which &#8220;may make remote code execution possible.&#8221; On a scale of one to 10, with...</p>
<p>The post <a href="https://www.trickyenough.com/news/report-up-to-400000-websites-are-affected-by-the-forminator-wordpress-plugin-vulnerability/">Report: Up to 400,000+ Websites Are Affected by the Forminator WordPress Plugin Vulnerability</a> appeared first on <a href="https://www.trickyenough.com">Tricky Enough</a>.</p>
]]></description>
										<content:encoded><![CDATA[<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN" "http://www.w3.org/TR/REC-html40/loose.dtd">
<html><head><meta http-equiv="Content-Type" content="text/html; charset=utf-8">
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
</head><body><p>A major vulnerability affecting the Forminator WordPress Contact Form plugin up to and including version 1.24.6 was disclosed by the U.S. Government&#8217;s National Vulnerability Database (NVD).</p>



<p>According to the warning, malicious files can be uploaded to websites by unauthenticated attackers, which &#8220;may make remote code execution possible.&#8221;</p>



<p>On a scale of one to 10, with 10 being the most serious vulnerability level, the vulnerability score rating is 9.8, with 1 being the least vulnerable.</p>



<h2 class="wp-block-heading" id="h-potential-for-unauthorised-attacks">Potential For Unauthorised Attacks</h2>



<p>In order to exploit many vulnerabilities, an attacker typically has to be a WordPress user or higher. For instance, although specific vulnerabilities are accessible to users with the subscriber user level. Others require the contributor or admin level to be exploited.</p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img decoding="async" src="https://www.searchenginejournal.com/wp-content/uploads/2023/08/screenshot-wordfence-forminator-vulnerability-64eeed599cefb-sej.png" alt=""></figure></div>


<p>This vulnerability is especially concerning because it enables unauthenticated attackers. Those with no user level at all to successfully hijack the website.</p>



<p>The attacker can upload an arbitrary file, which refers to any kind of file, such as a malicious script. This is another reason why this vulnerability is rated 9.8 on a scale of 1 to 10 (critical).</p>



<h2 class="wp-block-heading">Execution of Remote Code</h2>



<p>An exploit that allows the attacker to remotely execute malicious code on the targeted website. From another computer is known as a remote code execution (RCE) vulnerability. An entire site takeover could cause more harm than this kind of hack.</p>



<h2 class="wp-block-heading">Contact Forms Must Be Strictly Controlled</h2>



<p><a href="https://www.trickyenough.com/news/litespeed-cache-plugin-has-a-critical-security-vulnerability/" target="_blank" rel="noreferrer noopener">WordPress plugins that permit logged-in or anonymous users</a> to upload anything. Including text or photos, must have a method to restrict what can be uploaded. Because they allow public feedback, contact forms need to be particularly secure.</p>



<p><strong>Suggested:</strong></p>



<p><a href="https://www.trickyenough.com/news/wordpress-now-offers-a-content-generator-powered-by-openai-with-free-access/" target="_blank" rel="noreferrer noopener">WordPress Now Offers A Content Generator Powered By OpenAI, With Free Access</a>.</p>



<p><a href="https://www.trickyenough.com/news/wordpress-has-made-a-free-course-on-creating-and-monetizing-membership-websites-available/" target="_blank" rel="noreferrer noopener">WordPress has made a Free Course on Creating and Monetizing Membership Websites Available</a>.</p>



<p><a href="https://www.trickyenough.com/news/wordpress-in-discussion-towards-ai-integration/" target="_blank" rel="noreferrer noopener">WordPress in Discussion Towards AI Integration</a>.</p>
</body></html>
<p>The post <a href="https://www.trickyenough.com/news/report-up-to-400000-websites-are-affected-by-the-forminator-wordpress-plugin-vulnerability/">Report: Up to 400,000+ Websites Are Affected by the Forminator WordPress Plugin Vulnerability</a> appeared first on <a href="https://www.trickyenough.com">Tricky Enough</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.trickyenough.com/news/report-up-to-400000-websites-are-affected-by-the-forminator-wordpress-plugin-vulnerability/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">97221</post-id>	</item>
		<item>
		<title>Google Upgrades Privacy Tools To Safeguard Personal Information</title>
		<link>https://www.trickyenough.com/news/google-upgrades-privacy-tools-to-safeguard-personal-information/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=google-upgrades-privacy-tools-to-safeguard-personal-information</link>
					<comments>https://www.trickyenough.com/news/google-upgrades-privacy-tools-to-safeguard-personal-information/#respond</comments>
		
		<dc:creator><![CDATA[Robin Khokhar]]></dc:creator>
		<pubDate>Mon, 14 Aug 2023 11:58:34 +0000</pubDate>
				<guid isPermaLink="false">https://www.trickyenough.com/?post_type=news&#038;p=94203</guid>

					<description><![CDATA[<p>With results about you, removal requests for pornographic personal photographs, and improved parental controls, Google increases its privacy capabilities.  Google unveiled improved privacy control tools with fresh capabilities aimed at giving users more control over their personal information in Google search results. Dashboard And Notifications: Facts Concerning You Google&#8217;s Results About You feature has been...</p>
<p>The post <a href="https://www.trickyenough.com/news/google-upgrades-privacy-tools-to-safeguard-personal-information/">Google Upgrades Privacy Tools To Safeguard Personal Information</a> appeared first on <a href="https://www.trickyenough.com">Tricky Enough</a>.</p>
]]></description>
										<content:encoded><![CDATA[<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN" "http://www.w3.org/TR/REC-html40/loose.dtd">
<html><head><meta http-equiv="Content-Type" content="text/html; charset=utf-8">
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
</head><body><p>With results about you, removal requests for pornographic personal photographs, and improved parental controls, <a href="https://www.searchenginejournal.com/google-enhances-privacy-tools-to-protect-personal-data/493227/" target="_blank" rel="nofollow noopener">Google increases its privacy capabilities</a>. </p>



<p>Google unveiled improved privacy control tools with fresh capabilities aimed at giving users more control over their personal information in Google search results.</p>



<h2 class="wp-block-heading" id="h-dashboard-and-notifications-facts-concerning-you">Dashboard And Notifications: Facts Concerning You</h2>



<p>Google&#8217;s Results About You feature has been dramatically improved, expanding on a function introduced last year.</p>



<p>Users of this facility can ask for the removal of any personal information that might show up in search results, such as phone numbers, addresses, or emails.</p>



<p>The new version alerts users when their contact information appears in search results. And gives them the option to request its removal right away.</p>



<p>Additionally, this enhanced tool comes with a brand-new dashboard that notifies users when their contact information appears in search results, adding another layer of security.</p>



<h2 class="wp-block-heading" id="h-for-families-explicit-content-is-blurred-by-default"><strong>For Families, Explicit Content Is Blurred By Default</strong></h2>



<p>Additionally, as an added degree of security for families worldwide, Google is rolling out SafeSearch blurring options. As a result, graphic images in search results including those with violent or adult content are automatically hidden.</p>



<p>Users can disable this capability unless a network administrator for the school or a parent is in charge. In the Search interface, Google has also made it simpler to access parental settings.</p>



<h2 class="wp-block-heading" id="h-removal-of-private-and-sensitive-images-from-search-results">Removal of Private and Sensitive Images from Search Results</h2>



<p>Concerns about pornographic <a href="https://www.trickyenough.com/news/google-photos-rolled-out-12-new-video-effects-for-limited-subscribers-and-pixel-owners/" target="_blank" rel="noreferrer noopener">images and photos</a> appearing in search results have also been addressed by the internet giant. In cases where the content isn&#8217;t already being used for commercial purposes. Users can now ask for the removal of explicit personal photographs from Google searches.</p>



<p>Although these improvements have been made, Google emphasizes removing information. From search results do not remove it from the internet or <a href="https://www.trickyenough.com/the-worlds-most-popular-search-engines/" target="_blank" rel="noreferrer noopener">other search engines</a>. Google emphasized the need for ongoing attention to maintain control over personal information online.</p>



<p><strong>Suggested:</strong></p>



<p><a href="https://www.trickyenough.com/news/to-support-advertisers-during-the-holiday-season-google-recently-unveiled-new-ai-tools/" target="_blank" rel="noreferrer noopener">To Support Advertisers During The Holiday Season, Google Recently Unveiled New AI Tools</a>.</p>



<p><a href="https://www.trickyenough.com/news/google-reveals-google-adsense-analytics-4-integration/" target="_blank" rel="noreferrer noopener">Google Reveals Google AdSense &amp; Analytics 4 Integration</a>.</p>
</body></html>
<p>The post <a href="https://www.trickyenough.com/news/google-upgrades-privacy-tools-to-safeguard-personal-information/">Google Upgrades Privacy Tools To Safeguard Personal Information</a> appeared first on <a href="https://www.trickyenough.com">Tricky Enough</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.trickyenough.com/news/google-upgrades-privacy-tools-to-safeguard-personal-information/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">94203</post-id>	</item>
		<item>
		<title>Kaspersky Finds Cybersecurity Threat that Targets iPhone Users via iMessage to Gain Access</title>
		<link>https://www.trickyenough.com/news/kaspersky-finds-cybersecurity-threat-that-targets-iphone-users-via-imessage-to-gain-access/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=kaspersky-finds-cybersecurity-threat-that-targets-iphone-users-via-imessage-to-gain-access</link>
					<comments>https://www.trickyenough.com/news/kaspersky-finds-cybersecurity-threat-that-targets-iphone-users-via-imessage-to-gain-access/#respond</comments>
		
		<dc:creator><![CDATA[Vipin Gupta]]></dc:creator>
		<pubDate>Wed, 14 Jun 2023 15:05:36 +0000</pubDate>
				<guid isPermaLink="false">https://www.trickyenough.com/?post_type=news&#038;p=86343</guid>

					<description><![CDATA[<p>If you&#8217;re an iPhone user, then you must be alert and careful before what you click on. There&#8217;s a new cyber threat found via Kaspersky Internet Security that targets iPhone devices and takes complete control of the device. One of the biggest cybersecurity and antivirus software companies &#8216;Kaspersky Internet Security&#8217; recently found a cybersecurity threat...</p>
<p>The post <a href="https://www.trickyenough.com/news/kaspersky-finds-cybersecurity-threat-that-targets-iphone-users-via-imessage-to-gain-access/">Kaspersky Finds Cybersecurity Threat that Targets iPhone Users via iMessage to Gain Access</a> appeared first on <a href="https://www.trickyenough.com">Tricky Enough</a>.</p>
]]></description>
										<content:encoded><![CDATA[<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN" "http://www.w3.org/TR/REC-html40/loose.dtd">
<html><head><meta http-equiv="Content-Type" content="text/html; charset=utf-8">
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
</head><body><p>If you&#8217;re an iPhone user, then you must be alert and careful before what you click on. There&#8217;s a new cyber threat found via Kaspersky Internet Security that targets iPhone devices and takes complete control of the device.</p>



<p>One of the biggest cybersecurity and antivirus software companies &#8216;Kaspersky Internet Security&#8217; recently found a <a href="https://www.trickyenough.com/news/cyber-attack-at-att-millions-of-data-leaked-on-dark-web/" target="_blank" rel="noreferrer noopener">cybersecurity threat</a> called &#8216;Triangulation&#8217;. This threat targets old versions of iPhones, such as iOS 15.7, and gains complete access via the iMessage app.</p>



<h2 class="wp-block-heading" id="h-imessage-app-at-risk-kaspersky-internet-security">iMessage App at Risk kaspersky internet security</h2>



<p>The iMessage app contains a malicious attachment that automatically installs spyware &amp; takes complete control over the iPhone and its data.</p>



<p><a href="https://securelist.com/operation-triangulation/109842/" target="_blank" rel="noreferrer noopener nofollow">As per the Kaspersky report</a>, they just uncovered a cybersecurity threat. It is extremely complex &amp; targets iPhone devices via the iMessage app by auto-installing spyware and taking complete control of it.</p>



<h2 class="wp-block-heading" id="h-operation-triangulation">Operation Triangulation</h2>



<p>Also, Kaspersky CEO Eugene Kaspersky tweeted about this iOS attack, and it is called Triangulation. He said, &#8220;Our investigation of this Triangulation continues, and we expect further details to be shared soon.&#8221;</p>


<div class="wp-block-image">
<figure class="aligncenter size-full"><img decoding="async" width="664" height="646" src="https://www.trickyenough.com/wp-content/uploads/2023/06/kaspersky-internet-security.jpeg" alt="" class="wp-image-86347" srcset="https://www.trickyenough.com/wp-content/uploads/2023/06/kaspersky-internet-security.jpeg 664w, https://www.trickyenough.com/wp-content/uploads/2023/06/kaspersky-internet-security-300x292.jpeg 300w, https://www.trickyenough.com/wp-content/uploads/2023/06/kaspersky-internet-security-150x146.jpeg 150w" sizes="(max-width: 664px) 100vw, 664px" /></figure></div>


<p>In the Kaspersky report, they said that their team of iPhone users <a href="https://www.trickyenough.com/news/goldoson-an-android-malware-invade-60-applications-on-google-play/" target="_blank" rel="noreferrer noopener">recognized this malware attack</a>. This threat is quietly entered via the iMessage app and gets access to microphones, cameras, photos, messages, geolocation, and other sensitive data. </p>



<p>He also said that this threat had been neutralized and complete <a href="https://www.trickyenough.com/news/wordpress-tracks-down-xss-vulnerability-users-to-update-to-6-5-2/" target="_blank" rel="noreferrer noopener">vulnerability details</a> had been sent to the Apple company.</p>



<p>Further investigation shows that dozens of iPhone devices were infected with this attack.</p>



<h2 class="wp-block-heading" id="h-the-zero-click-attack-kaspersky-internet-security">The Zero-Click Attack kaspersky internet security</h2>



<p>Getting this threat inside the iPhone device is easier; the user will receive a message on the iMessage app with an attachment. When the user <a href="https://www.trickyenough.com/news/bumble-compliments-feature-has-rolled-out-that-allow-users-to-message-before-match/" target="_blank" rel="noreferrer noopener">opens the message</a>, a threat will automatically go inside the device and take complete control over the device. Once the hacker gets complete control, the message with the attachment will automatically be selected from the device.</p>



<p>On Friday, Kaspersky also released tools to identify if the device is infected. </p>



<p>One of the clear indications or ideas to check this Triangulation attack on iPhone devices was that it turned off the iOS update and didn&#8217;t allow users to update their iOS version. </p>



<p>The CEO of Kaspersky noticed that turning off the iMessage app can prevent iOS devices from being attacked. <a href="https://www.trickyenough.com/news/ios-16-adoption-rate-reaches-81-ahead-of-ios-17-announcement/" target="_blank" rel="noreferrer noopener">iOS 16 seems safe </a>from this Triangulation threat, and there are low chances but not guaranteed.</p>



<h2 class="wp-block-heading" id="h-apple-ios-16-3-updates">Apple iOS 16.3 Updates</h2>



<p>Furthermore, Apple released major updates that fixed vulnerabilities with iOS 16.3 and MacOS 13.2 supported iPhone, iPad, and Mac devices.</p>



<p>Suggested:</p>



<p><a href="https://www.trickyenough.com/security-good-antivirus/" target="_blank" rel="noreferrer noopener">What Security features must have in Good Antivirus</a>?</p>



<p><a href="https://www.trickyenough.com/remove-malware-from-computer/" target="_blank" rel="noreferrer noopener">How To Remove Malware From Computer</a>?</p>
</body></html>
<p>The post <a href="https://www.trickyenough.com/news/kaspersky-finds-cybersecurity-threat-that-targets-iphone-users-via-imessage-to-gain-access/">Kaspersky Finds Cybersecurity Threat that Targets iPhone Users via iMessage to Gain Access</a> appeared first on <a href="https://www.trickyenough.com">Tricky Enough</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.trickyenough.com/news/kaspersky-finds-cybersecurity-threat-that-targets-iphone-users-via-imessage-to-gain-access/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">86343</post-id>	</item>
		<item>
		<title>Chrome Announces the Redesign of its HTTPS Lock Icon</title>
		<link>https://www.trickyenough.com/news/chrome-announces-the-redesign-of-its-https-lock-icon/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=chrome-announces-the-redesign-of-its-https-lock-icon</link>
					<comments>https://www.trickyenough.com/news/chrome-announces-the-redesign-of-its-https-lock-icon/#respond</comments>
		
		<dc:creator><![CDATA[Robin Khokhar]]></dc:creator>
		<pubDate>Sun, 07 May 2023 16:04:39 +0000</pubDate>
				<guid isPermaLink="false">https://www.trickyenough.com/?post_type=news&#038;p=82757</guid>

					<description><![CDATA[<p>Chrome announced that it would replace its lock sign indicating HTTPS connections and introduce a more relevant icon to enhance user experience. The decision is based on research done by Chrome which shows that the current icon is misleading the users and is also a security risk. Why is HTTPS Lock Icon going to replace...</p>
<p>The post <a href="https://www.trickyenough.com/news/chrome-announces-the-redesign-of-its-https-lock-icon/">Chrome Announces the Redesign of its HTTPS Lock Icon</a> appeared first on <a href="https://www.trickyenough.com">Tricky Enough</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Chrome announced that it would replace its lock sign indicating HTTPS connections and introduce a more relevant icon to enhance user experience.</p>



<p>The decision is based on research done by Chrome which shows that the current icon is misleading the users and is also a security risk.</p>


<div class="wp-block-image">
<figure class="aligncenter size-full is-resized"><img decoding="async" width="475" height="255" src="https://www.trickyenough.com/wp-content/uploads/2023/05/WhatsApp-Image-2023-05-07-at-19.54.20.jpg" alt="" class="wp-image-82760" style="width:531px;height:285px" srcset="https://www.trickyenough.com/wp-content/uploads/2023/05/WhatsApp-Image-2023-05-07-at-19.54.20.jpg 475w, https://www.trickyenough.com/wp-content/uploads/2023/05/WhatsApp-Image-2023-05-07-at-19.54.20-300x161.jpg 300w, https://www.trickyenough.com/wp-content/uploads/2023/05/WhatsApp-Image-2023-05-07-at-19.54.20-150x81.jpg 150w" sizes="(max-width: 475px) 100vw, 475px" /><figcaption class="wp-element-caption">Image credits: Screenshot taken from the website</figcaption></figure></div>


<h2 class="wp-block-heading" id="h-why-is-https-lock-icon-going-to-replace-with-a-new-one">Why is HTTPS Lock Icon going to replace with a new one?</h2>



<p>The lock icon indicates a secure connection, but this was not the norm. There was a misconception that HTTPS or secure connections are only for eCommerce and financial websites. Because on these websites, money transaction involvement is high. For other websites, it is not required. But with the increasing awareness about data security, publishers started using secure connections to ensure data privacy and security.</p>



<p><strong>Read Google Chrome&#8217;s Official Announcement</strong> <strong>page</strong>:</p>



<p><a href="https://blog.chromium.org/2023/05/an-update-on-lock-icon.html" target="_blank" rel="noreferrer noopener">https://blog.chromium.org/2023/05/an-update-on-lock-icon.html</a></p>



<h2 class="wp-block-heading">Lock Icon Misleading the Users</h2>



<p>It may sound vague, but a Google search revealed that users misunderstand the meaning of the lock icon to give a sense of security.</p>



<p>In reality, the lock icon doesn&#8217;t indicate the site is secure to use, but it only indicates that the connection is via a secure protocol.</p>



<p>Reports show malicious publishers can also use HTTPS by adding a secure site connection. This result in users becoming a victim of data leaks.</p>



<h2 class="wp-block-heading">New HTTPS Tune Icon</h2>



<p>Google intended to communicate HTTPS more accurately with their users. So, they are updating HTTPS icons to tune icons.</p>



<p>Google Fonts shows the following examples:</p>



<p>Chrome will feature the following new icon:</p>



<p>As per Chrome, tune icons are not misleading and don&#8217;t indicate security. Along with that, it will provide all information same, like the lock icon.</p>



<p>The redesign will implement in the google chrome September 2023 release. They claim that they will entirely remove its old icons from iOS and Windows, both versions of Chrome. To know more about Google algorithms updates <a href="https://www.trickyenough.com/tips-to-get-your-site-ready-for-googles-algorithm-updates/" target="_blank" rel="noreferrer noopener">read here</a>.</p>



<p><strong>Suggested:</strong></p>



<p><a href="https://www.trickyenough.com/benefits-ssl-certificates-for-wordpress/" target="_blank" rel="noreferrer noopener">Benefits of SSL Certificates for WordPress Website</a>.</p>



<p><a href="https://www.trickyenough.com/free-ssl-sites-certificates/" target="_blank" rel="noreferrer noopener">How to get a free SSL certificate</a>?</p>
<p>The post <a href="https://www.trickyenough.com/news/chrome-announces-the-redesign-of-its-https-lock-icon/">Chrome Announces the Redesign of its HTTPS Lock Icon</a> appeared first on <a href="https://www.trickyenough.com">Tricky Enough</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.trickyenough.com/news/chrome-announces-the-redesign-of-its-https-lock-icon/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">82757</post-id>	</item>
	</channel>
</rss>
