Skip links

In This Article:

Take control of your digital security

Urgent: Your Apple Devices at Risk, Update Now!: Critical Security Update Released to Prevent Active Hacking Attempts

Shares This:
Reading Time: 2 minutes

What is it:

Apple has released an emergency update to fix a vulnerability that can be used to hack iPhones, iPads, and Macs. This vulnerability is called a “zero-day,” which is a flaw that hackers can exploit because it’s unknown to the software developers. The bug could allow attackers to execute code on devices running vulnerable iOS, iPadOS, and macOS versions after opening a malicious web page. To fix this issue, Apple has released an updated version of their software and recommends that all users update their devices to avoid potential attacks.

Who does it apply to?

At the time of writing this affected below:

iPhone 8 and later, iPad Pro (all models), iPad Air 3rd generation and later, iPad 5th generation and later, and iPad mini 5th generation and later

What should you do about it?

  • Apple has addressed this software flaw with security updates. To protect your device, please make sure to update your devices with the security updates provided by Apple

  • It is always recommended to keep your OS updated
  • To protect yourself from this software flaw, it is important to only download and install applications from trusted and verified sources. This will prevent cybercriminals from taking advantage of the flaw through the installation of malicious apps without your knowledge
  • If you believe you have installed any application from unverified sources, uninstall the application ASAP
  • Do a full malware scan of the device

Technical Details

Apple has issued an emergency security update to address a zero-day vulnerability that is actively being used to exploit iPhones, iPads, and Macs. The vulnerability, which is being tracked as CVE-2023-23529, is a WebKit confusion issue that allows an attacker to trigger an operating system crash and gain code execution on targeted devices. The vulnerability can be exploited by a specially crafted webpage, and successful exploitation can enable an attacker to execute arbitrary code, thereby taking control of the device, stealing data or installing malware.


Sign Up to improve your Digital Security Now!

Shares This:

Leave a comment

Related Articles