1 min read

Update Apple Devices Soon for Important Security Patch

Apple released a very important security update today. The update fixes a pair of zero-day vulnerabilities that have been spotted in use in the wild to attack both Macs and iPhones. One of the two has been used to install the Pegasus spyware onto iPhones.

These two vulnerabilities are being tracked as CVE-2021-30860 and CVE-2021-30858 respectively. Both vulnerabilities allow attackers to create malicious documents which can be used to execute commands when opened on vulnerable devices.

CVE-2021-30860 is an integer overflow bug in CoreGrapics. It was discovered by CitizenLabs and it allows attackers to craft poisoned PDF documents that execute commands when opened on devices running either iOS or macOS.

CVE-2021-30858 is a WebKit vulnerability that allows attackers to create a malicious web page that executes commands on vulnerable devices running either iOS or macOS. That is any time vulnerable devices visit the poisoned page.

Both of These Have Been Spotted in the Wild

Apple stresses that both of these have been seen in use in the wilds which makes the application of Apple’s latest security patch a high priority.

Apple has struggled against zero-day vulnerabilities in 2021. So far the company has scrambled to address more than a dozen such vulnerabilities on macOS and iOS. That is compared to eleven found that targeted Windows and Android devices.

Consider the nature of these security flaws and the fact that they’re currently being exploited by hackers around the world. So downloading and applying this security patch is something that should be given top priority by anyone with Apple devices connected to your corporate network.

Kudos to the company for their rapid response. We hope however that the volume of zero-day exploits will begin to taper off in the near future. At this point it is unclear whether this is a sign of things to come and something that represents a larger and more disturbing trend or if it’s just a run of bad luck for the tech giant.

Used with permission from Article Aggregator

IT Threat Intelligence: Is Your Firm Seeing The Whole Picture?

IT Threat Intelligence: Is Your Firm Seeing The Whole Picture?

Law firms today are sitting on a digital goldmine. From sensitive client communications and trade secrets to financial records and intellectual...

Read More
Mastering Digital Evidence: How Law Firms Turn Data into Trial-Winning Proof

Mastering Digital Evidence: How Law Firms Turn Data into Trial-Winning Proof

In 2011, a jury found Casey Anthony not guilty of murdering her two-year-old daughter. Later reviews revealed two key digital-evidence failures:...

Read More
The Predictive Edge: Turning Case Management Data Into Litigation Strategy

The Predictive Edge: Turning Case Management Data Into Litigation Strategy

The legal world is changing faster than a judge can say "sustained." Gone are the days when successful litigation relied solely on courtroom...

Read More

Over 4,000 Online Shopping Retailers Hit with Data Breach

The UK’s National Cyber Security Centre (NCSC) has identified more than 4,000 different retailers that have been compromised by hackers exploiting...

Read More

Law Firm IT vs. Cyber Threats and Data Vulnerabilities

Law firms are constantly facing a critical clash between their IT infrastructure and the ever-evolving threats posed by cyber-attacks and data...

Read More
Best IT Practices for Lawyers: How to Protect Client Confidentiality

Best IT Practices for Lawyers: How to Protect Client Confidentiality

Technology is transforming the legal field, and with this transformation comes increased risks. For lawyers, protecting sensitive client information...

Read More