The Singapore Computer Emergency Response Team, part of the country’s Cyber Security Agency of Singapore, has issued an urgent alert to their citizens about the active exploitation of a vulnerability in Apple products, and is urging users to update their devices immediately.
In a statement by the Singapore Computer Emergency Response Team, they state that Apple has already released a security update to fix a zero-day vulnerability found in both the iPhone and their range of iPad tablets. The issue, codenamed CVE-2022-42827, is a bug that if exploited allows a bad app to run any code or commands that they’d like on the device with kernel privileges. It seems as though this vulnerability is already being used by hackers in the wild.
As such, the government agency is urging all Apple users to immediately update their devices to iOS 16.1 and iPadOS 16.1 immediately if you’re using the following devices:
To update your device, you’ll want to head over to Settings, then go to General and then tap on Software Update. You’ll then see an option to update to the latest version of your software. Simply click download and install to continue, and to ensure you always have the latest software you can also click to enable automatic updates on your device.
As for Apple, it’s not a good look for a company that traditionally has a good reputation for security. This year alone there’s been at least eight documented zero-day vulnerabilities with their hardware that’s been exploited by hackers, with this latest one being the ninth such incident.
[ SOURCE ]
This is your last call to pick up a Gentari Go Power Pass membership plan…
TNB Electron's continues to expand its EV charging network in Perak with the opening its…
You can now purchase a Neta V in Malaysia for just RM39,999, according to an…
If you are struggling to find a Valentine’s gift that isn’t the usual box of…
Perodua has published the service schedule for the Perodua QV-E on the official website for…
A long time coming, the GWM Wey G9 PHEV is finally available in Malaysia. The…
This website uses cookies.