![]() ![]() This is an important iOS security fix, especially for folks who haven't updated in a while, given the fact that older versions of iOS were specifically targeted in the active exploits.įortunately, updating to iOS 16.6 (or iPadOS 16.6) is very straightforward. In this case (and others), we wholeheartedly agree. Security researchers and, indeed, Apple itself always encourage iPhone and iPad users to download the latest available version of software for their devices. How To Upgrade to iOS 16.6 and iPadOS 16.6 Today Fortunately, such complexities are now less important than the fact that iOS 16.6 has been released and offers protection against these and other vulnerabilities. It's this flaw that partly led to the release of the Rapid Response Update, along with a similar “zero click” attack targeting web browsers that was reported. Moreover, the long list of Kernel patches included in the iOS 16.6 security notes points back to the “Operation Triangulation” iMessage malware spotted by Kaspersky. This is what Apple means when it refers to “arbitrary code execution.” Basically, security researchers recently highlighted iPhone malware that required zero user interaction to trigger, otherwise known as a “zero click” attack. ![]() What this potential hack looks like is less straightforward. This means some devices out there may have been targeted by an actual attack, with the fine print telling us devices running iOS 15.7.1 or older were particularly vulnerable. Probably not, but as the iOS 16.6 release notes reveal, a couple of the vulnerabilities have been linked to active exploits. ![]() Elsewhere, a series of WebKit fixes address a vulnerability where “processing web content may lead to arbitrary code execution.” One of the listings notes that Apple had received reports of this hole being “actively exploited,” which means it was likely used to execute a live malware attack. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |