Activist company

How to update your Apple device while the company issues a security flaw | THE DAILY TRIBUNE

Agencies | Cupertino

The Daily Tribune – www.newsofbahrain.com

Apple’s latest security update was easy to miss. But security experts warn that everyone should immediately update any Apple device they have.

Apple said Wednesday that there are serious security vulnerabilities in iPhones, iPads and Macs that could potentially allow attackers to take full control of these devices.

The problem may have already been “actively exploited”, according to the company. Apple releases security updates several times a year.

Without the latest update, a hacker could take full control of Apple devices, allowing the intruder to impersonate the true owner and run any software on their behalf.

The good news? There is a simple solution: just update your Apple phone, computer or tablet.

WHY IS UPDATING YOUR APPLE DEVICE SO URGENT?

Updates can take time and be slow. But they are necessary to protect your device from hackers who might run malicious code on your device.

WHY WON’T MY APPLE DEVICE DO THIS FOR ME?

Apple devices are set up for automatic updates by default, but it may be quicker to check for the latest updates and do it manually.

WHICH APPLE DEVICES ARE AFFECTED?

Affected devices include iPhone6S and later; multiple iPad models, including 5th generation and later, all iPad Pro models, and iPad Air 2; and Mac computers running macOS Monterey. The flaw also affects some iPod models.

HOW DO I UPDATE MY DEVICE?

To update your Apple device to the latest operating system that includes security patches on your phone, go to “Settings”, click “General” and click “Software Update”. On the Mac, go to “System Preferences”, then “Software Update”.

WHAT IS THE RISK THAT MY PHONE WAS COMPROMISED BEFORE I INSTALLED THE UPDATE?

Unless you are a journalist, political dissident or human rights activist, the odds are extremely low. Types of spyware created to exploit vulnerabilities of the type patched by Apple are expensive and used in targeted hacking.