views
Apple has issued its latest iOS, iPadOS, macOS and even tvOS updates for the eligible devices this week. The new update gives you a host of new features that many have been waiting for weeks.
But the important part of these updates is a security fix that Apple has talked about in recent months. You already know about the Stolen Device Protection feature that has rolled out with the iOS 17.3 update but there is a major security fix bundled along with the version that is linked to WebKit.
These vulnerabilities can be potent enough to allow attackers to bypass the security of your Apple devices and give them access to confidential data without raising any alarm. Apple has admitted regarding the concerns with the issue and has even stated that the issue might have already been exploited which is a definite concern for millions of Apple users.
So, if you have avoided installing the latest iOS/iPadOS/watchOS/macOS or even tvOS update so far, we suggest you get onto it right away and secure your device from the issue. You can update the OS of these devices by heading over to Settings – Software Update and install after confirming your identity with the device PIN.
Earlier this month, there was a major GPU related issue that was pointed out. Basically, the issue is linked to the GPU running on the models before the iPhone 15 series and the Mac M3 models.
Sadly, if you are using last year’s M2-powered Macs, the security flaw is a definite risk and Apple will have to quickly set out a path to patch the issue for these devices.
The issue with this flaw is that all the data processed by the chip can be viewed if an attacker is able to bypass the loophole and access the device.
The other big talking point is that Apple isn’t the only company that needs to be worried about the flaw because GPUs made by Qualcomm, AMD and more vendors are also affected by this issue. Researchers who have discovered the issue are calling it LeftoverLocals because the flaw allows the hacker to read the data that was left over from the previous reading.
Comments
0 comment