Update your Apple device now: emergency security update released
Tuesday, September 14th, 2021
Apple has released an emergency security update to address a vulnerability in which spyware could be installed on an iPhone or other Apple device without ever having to click on a malicious link.
The security patch was released on Monday September 13th, 2021 and a current activities alert (which provides up-to-date information about high-impact types of security activity affecting the community at large) was issued through CISA via the National Cyber Awareness System.
What this means if you’re using an Apple device: As always recommended, update your software ASAP. If you’re not already using automatic updates, turn that setting on to get the latest software notifications as soon as they’re released.
The spyware can then eavesdrop or steal data from your device. All of Apple’s operating systems, including those for iPads, Macs and Apple Watches, are vulnerable.
For instructions on how to update your device and more information on the release visit the Apple Security Updates page: https://support.apple.com/en-us/HT201222
How they discovered the vulnerability: The security flaw was discovered by researchers at watchdog group Citizen Lab, which found that the phone of a Saudi political activist had been infected with the Pegasus spyware via iMessage.
The device had been hacked using a “zero-click” method that had allowed the spyware to live on the Saudi’s phone since February without detection, according to the Washington Post. The same security flaw would enable the software to infect other Apple iPhones, watches and MacBooks, per the Post.
Apple’s Statement: “After identifying the vulnerability used by this exploit for iMessage, Apple rapidly developed and deployed a fix in iOS 14.8 to protect our users,” said Ivan Krstić, head of Apple Security Engineering and Architecture, in a statement.
For instructions on how to update your device and more information on the release visit thee Apple Security Updates page: https://support.apple.com/en-us/HT201222