Users with older iPhones and/or iPads
iPhone 5s, iPhone 6, iPad Air iPad mini2, iPad mini 3
still running iOS version 12 should update to iOS version 12.5.6.
This update to address the same vulnerability August 17, 2022.
Users with older iPhones and/or iPads
iPhone 5s, iPhone 6, iPad Air iPad mini2, iPad mini 3
still running iOS version 12 should update to iOS version 12.5.6.
This update to address the same vulnerability August 17, 2022.
Mozilla has released security updates to address vulnerabilities in Firefox, Firefox ESR, and Thunderbird. An attacker could exploit some of these vulnerabilities to take control of an affected system.
August 24, 2022
USB is engraved, has a product code, looks more line a Microsoft product than a Microsoft product.
But is not from Microsoft. If you attempt to install it you will be in contact with Microsoft BUT not in a good way. You may be attempting to get your PC working again.
Very tempting BUT please no.
Apple has released Safari version 15.6.1 for some older macOS versions. Big Sur and Catalina. This Safari update addresses a currently exposited vulnerability in WebKit.
This vulnerability was patched by Apple Tuesday for current versions of macOS, iOS, iPadOS and watchOS.
Google issued an update to its Chrome browser in response to a reported actively used exploit for vulnerabilities.
Other chromium based browsers are expected to follow with updates for their browsers soon.
Press release indicates security and bug fixes for iOS 15.6.1 and iPadOS 15.6.1.
I find macOS 12.5.1 available.
Press release indicates watchOS 8.7.1 to be available but i don't find that update as of this writing. This update for Apple Watch series 3 only.
I checked tvOS and don't see an update.
Strong indications these updates address actively exploited vulnerabilities.
Note: Several browsers have recent updates available this date: 17-Aug-2022.
It is recommended that a manual update to zoom be applied for zoom on macOS. An attacker can use the zoom update process to either down rev the zoom application OR obtain root access.
Malicious apps can and are installed in Apple Macs.
Below is a current list of apps to find and remove:
The cited apps have been removed from the Apple store, but they may have been loaded prior to that removal.
Fake reviews added to the ability to alter their behaviour when reviewed by Apple had increased the popularity and download in the Apple store.
Political sites are reporting an increase in hacktivism due to recent events.
Hacktivism is using cyber techniques to promote and/or harm sites with a political agenda.
This causes an increase in bandwidth used for these activities.