Friday, December 1, 2023

Apple Released Security Updates for iOS, Safari , iCloud, watchOS, tvOS

Apple security updates released for this month and fixed several vulnerabilities that affected its products including iOS, Safari, iCloud, watchOS, tvOS, High Sierra.

Along with security updates, Apple released the latest version of iOS is 12.1.1,  macOS is 10.14.2, tvOS is 12.1.1 and watchOS is 5.1.2.

There are several critical vulnerabilities are fixed in this updates including arbitrary code execution, address bar spoofing,  denial of service attack, privilege escalations.

iOS 12.1.1  released with the critical bug fix for FaceTime locked screen contacts disclosure was discovered by security researcher Jose Rodriguez that allows a local attacker may be able to view contacts from the lock screen.

The Safari update fixes one important vulnerability that made it impossible for users to fully delete their browsing history.

A several arbitrary code execution vulnerability fixed that affected iCloud for Windows 7.9 and also Apple fixed several WebKit flaws and released Safari 12.0.2.

According to Apple, For our customers’ protection, Apple doesn’t disclose, discuss, or confirm security issues until an investigation has occurred and patches or releases are available. This document lists recent releases.

Apple security updates

Name and information linkAvailable forRelease date
watchOS 5.1.2Apple Watch Series 1 and later06 Dec 2018
iCloud for Windows 7.9Windows 7 and later05 Dec 2018
Safari 12.0.2macOS Sierra 10.12.6, macOS High Sierra 10.13.6, and macOS Mojave 10.14.105 Dec 2018
iTunes 12.9.2 for WindowsWindows 7 and later05 Dec 2018
macOS Mojave 10.14.2, Security Update 2018-003 High Sierra, Security Update 2018-006 SierramacOS Sierra 10.12.6, macOS High Sierra 10.13.6, and macOS Mojave 10.14.105 Dec 2018
Shortcuts 2.1.2 for iOSiOS 12.0 and later05 Dec 2018
tvOS 12.1.1Apple TV 4K and Apple TV (4th generation)05 Dec 2018
iOS 12.1.1iPhone 5s and later, iPad Air and later, and iPod touch 6th generation05 Dec 2018

Latest Update Proces:

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.


Latest articles

Hackers Using Weaponized Invoice to Deliver LUMMA Malware

Hackers use weaponized invoices to exploit trust in financial transactions, embedding malware or malicious...

US-Seized Crypto Currency Mixer Used by North Korean Lazarus Hackers

The U.S. Treasury Department sanctioned the famous cryptocurrency mixer Sinbad after it was claimed...

CISA Warns Hackers Exploiting Wastewater Systems Logic Controllers

In a disconcerting turn of events, cyber threat actors have set their sights on...

Zyxel Command Injection Flaws Let Attackers Run OS Commands

Three Command injection vulnerabilities have been discovered in Zyxel NAS (Network Attached Storage) products,...

North Korean Hackers Attacking macOS Using Weaponized Documents

Hackers often use weaponized documents to exploit vulnerabilities in software, which enables the execution...

Most Popular Websites Still Allow Users To Have Weak Passwords

The latest analysis shows that tens of millions of people are creating weak passwords...

Chrome Zero-Day Vulnerability That Exploited In The Wild

Google has fixed the sixth Chrome zero-day bug that was exploited in the wild this...
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

API Attack Simulation Webinar

Live API Attack Simulation

In the upcoming webinar, Karthik Krishnamoorthy, CTO and Vivek Gopalan, VP of Products at Indusface demonstrate how APIs could be hacked.The session will cover:an exploit of OWASP API Top 10 vulnerability, a brute force account take-over (ATO) attack on API, a DDoS attack on an API, how a WAAP could bolster security over an API gateway

Related Articles