TECHNOLOGY

This is a good day to update all your devices. Trust us


Another day, another An update that is sad from your iPhone and Mac is ready. And from Chrome. And for Microsoft, it’s a patch on Tuesday, so it’s another round of installation on your plate. Putting them on the road can be as tempting as it getsJust why not wait IOS 15 In a few weeksAhead you want to go ahead and get these done.

Yes, this is ideal advice; Your software must be kept up to date as much as possible. You can even turn on automatic updates for everything and avoid manual maintenance. But if you don’t, today is a special day to stay on top of it, as Apple, Google and Microsoft have fixed security for the vulnerabilities that hackers have been actively using over the past two days. This is a zero-day patching extravaganza, and you don’t want to ignore your invitation.

Update your iPhone, Mac and Apple Watch

The biggest title-occupier of the bunch is the exploitation chain known as forced entry. The attack first came to prominence in August, when the University of Toronto’s Citizen Lab revealed that it had found evidence of a “zero click” attack, which required no interaction from the target, deployed against human rights activists. Being done. Amnesty International found similar forensic signs of NSO group malware in July.

You might be right: if these attacks were reported a few weeks ago – and the attack has been active since at least February – why is a solution now available? At least in part, the answer seems to be that Apple was working with incomplete data until Sept. 7, when Citizen Lab discovered more details of forcible exploitation on the phone of a Saudi worker. They confirmed that ForceDentry did not target Apple’s image-rendering library, but that it affected MacOS and WatchOS in addition to iOS. On September 13, Apple pushed the fixes for all three.

Evan Christian, Apple’s head of security and engineering, said in a statement: “We would like to commend Citizen Lab for successfully completing a very difficult task to get a sample of this exploitation.” Has a short shelf life and is used to target specific individuals. While this does not mean that they are a threat to the majority of our users, we continue to work tirelessly to protect all of our customers, and we are constantly adding new protections to their devices and data.

It’s not just spin; It is true that very few Apple customers are at risk of landing NSO Group malware on their phones. A basic rule: if there is a reason that an authoritarian government wants to read your writings, you may be at risk. So, if you are, of course, patch up now, but also know that the exploitation of the next million dollars is always just around the corner.

Even if you are not dissatisfied, this update is worth taking forward. Now that some details have come out, there is a chance that less intelligent villains may try to attack the same vulnerability. And again, these would mean that you have to spend for these processes.

Fortunately, making sure your iOS, MacOS and WatchOS software is up to date is fairly straightforward. Go to your iPhone or iPad Settings> General> Software Update. Tap Download and install Get iOS 14.8 on your device, and toggle on automatic download and installation while you’re there. Just remember that automatic updates will not work unless your phone is charged and Wi-Fi is connected overnight. You can also update the Apple Watch from your iPhone; Go to the Watch app, tap My watch Tab, then General> Software updates. From the clock, tap Settings> General> Software Update. For MacOS, go to the Apple menu, then click System Preferences> Update Now.

Update Windows

Sorry Microsoft fans, you’re on the hook too. One week ago, the company revealed that a zero-day vulnerability in Windows is being actively used. Rather than the country-state actors that NGO groups sell their exploits to, MSTHL’s error-rendering engine used by Internet Explorer and Microsoft Office has spread among cybercriminals.

In a security bulletin last week, the company said, “Microsoft is aware of targeted attacks that try to exploit this vulnerability by using specially created Microsoft Office documents.” “If you open a scandalous Office file, a hacker could gain access to allow them to run commands on your machine remotely. Get out quickly How to overcome these solutions. Not only that, as security news site Blipping Computer reported this week, hackers have been actively sharing detailed information on how to exploit vulnerabilities since a few days before patches were found on forums.





Source link

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button