![]() There are two items on the menu, called Kernel and WebKit respectively. Indeed, in the last few minutes, Apple has refreshed its page of security updates details, indicating what iOS 15.6.1 is all about. Which tells you that this update must be all about fixes and security changes, not new features. This is a surprise update, with most analysts believing that last month’s iOS 15.6 would be the last before the move to iOS 16 in September. Within a few minutes, it’ll be good to go-this is not a huge update. Once you’ve clicked on Download and Install, it’ll do everything for you. Updating is easy-peasy: open the Settings app on the device and then choose General, then Software Update. This won’t apply with iOS 16, by the way, which is for iPhones from iPhone 8 onwards.įor iPads, you’re good to go with iPadOS 15.6.1 if you have any iPad Pro, any iPad Air from iPad Air 2, iPad mini 4 or newer and iPad from the fifth generation onwards. In other words, every iPhone from the iPhone 6s onwards and includes all three generations of iPhone SE. That’s quite the achievement, stretching back across every device released in the last six years. Impressively, Apple has ensured that every iOS 14-capable iPhone runs iOS 15, too. If you have a device that runs iOS 14, you’re sorted. Check out Gordon Kelly’s new post to find out if you should do so. The bugs were reported by anonymous researchers.Īlarming though these details are, updating should fix the bugs. The fact that Apple also disclosed active exploitation in the wild is also worth noting and the bug fixes below are the sixth and seventh zero day exploits Apple has addressed this year, though the first five were all in January to March. Those in the public eye such as activists, politicians and journalists should act quicker due to previously becoming targets of nation state spying.” ‘If exploited, attackers would be able to see your location, read messages, view contacts lists and potentially even access the microphone and camera – all the things you don’t want to have out there. "Selling technology to governments that will use the technology recklessly in violation of international human rights law ultimately facilitates discovery of the spyware by investigatory watchdog organizations."Īpple device owners can download and install the security-only updates issued Monday by triggering a software update through the device's OS.As Jake Moore, Global Cyber Security Advisor at ESET explained to Metro, “Apple has disclosed some pretty serious security vulnerabilities for iPhones, iPads and Macs that could potentially allow hackers to take complete control over these devices. "Despite promising their customers the utmost secrecy and confidentiality, NSO Group's business model contains the seeds of their ongoing unmasking," Citizen Labs' researcher wrote in their Monday report. According to researchers, the spyware loaded by the zero-click exploit contained coding characteristics, including ones never made public, that Citizen Lab had come across in previous analysis of NGO Group and Pegasus. ![]() It, in turn, consists largely of spyware that can document texts and emails sent to and from the device as well as switch on its camera and microphone for secret recording.Ĭitizen Lab was confident that FORCEDENTRY was associated with Pegasus and thus, NGO Group. The exploit, which Citizen Lab dubbed "FORCEDENTRY," had been used to infect the phone of the activist - and possibly others as far back as February 2021 - with the NGO Group's "Pegasus" surveillance suite. "While analyzing the phone of a Saudi activist infected with NSO Group's Pegasus spyware, we discovered a zero-day zero-click exploit against iMessage," Citizen Lab researchers wrote. Apple credited The Citizen Lab for reporting the flaw.Īlso on Monday, Citizen Lab, a cybersecurity watchdog organization that operates from the Munk School of Global Affairs & Public Policy at the University of Toronto, released a report outlining what it found.
0 Comments
Leave a Reply. |