Hi Guys,

Apple recently released a security update to fix two zero-day vulnerabilities that have been exploited to hack into iPhones and Macs. Here’s what you need to know about these vulnerabilities and how to protect yourself:

What are zero-day vulnerabilities?

Zero-day vulnerabilities are security flaws in software that are unknown to the software’s developers. They are called “zero-day” because the developers have had zero days to fix them. This means that cybercriminals can exploit these vulnerabilities to gain access to devices before the developers even know they exist.

What are the recent zero-day vulnerabilities in Apple devices?

The two zero-day vulnerabilities recently discovered in Apple devices are:

  1. CVE-2021-30860: A flaw in the CoreGraphics component of iOS and macOS that could allow an attacker to execute arbitrary code on a device by sending a malicious PDF file.
  2. CVE-2021-30858: A flaw in the WebKit component of iOS and macOS that could allow an attacker to execute arbitrary code on a device by sending a malicious web content.

What devices are vulnerable to these zero-day vulnerabilities?

  • iPhones running iOS 12 or later
  • iPads running iPadOS 12 or later
  • iPod touch running iOS 12 or later
  • Macs running macOS Mojave, macOS Catalina, or macOS Big Sur

How can you protect yourself from these zero-day vulnerabilities?

The best way to protect yourself from these zero-day vulnerabilities is to install the latest security update from Apple. The security update includes patches for these vulnerabilities and other security fixes to keep your device secure. Here’s how to install the update:

  • On iPhone, iPad, or iPod touch: Go to Settings > General > Software Update and follow the on-screen instructions to download and install the update.
  • On Mac: Go to System Preferences > Software Update and follow the on-screen instructions to download and install the update.

It’s important to keep your device updated with the latest security patches to stay protected from these types of vulnerabilities. By taking proactive steps, you can reduce the risk of falling victim to cyber attacks.

Let me know if you need anything.

All the best,

Max Roberts.