Apple + Microsoft Release Patches for Identified Vulnerabilities

Robinson+Cole Data Privacy + Security Insider

This week, both Apple and Microsoft issued patches to fix serious zero-day vulnerabilities that should be applied as soon as possible. That means that if you have an iPhone or iPad, you may want to plug your phone or iPad in and apply the newest iOS 15.0.2, which is what I just did as I was writing this post.

 The Apple vulnerability (CVE-2021-30883) is actively being used by threat actors against iPhone and iPad users to attempt to install malware and steal data, so click on that software update sooner rather than later. It only takes a few minutes.

On its Patch Tuesday earlier this week, Microsoft issued patches for over 80 vulnerabilities in the Windows operating system, including Windows 11 and other products. Three of the patches were deemed critical, which means that exploitation of the vulnerabilities could allow the threat actor to take over control of systems remotely. For more information about the patches, and a designation of their criticality or importance, click here.

[View source.]

DISCLAIMER: Because of the generality of this update, the information provided herein may not be applicable in all situations and should not be acted upon without specific legal advice based on particular situations.

© Robinson+Cole Data Privacy + Security Insider | Attorney Advertising

Written by:

Robinson+Cole Data Privacy + Security Insider

Robinson+Cole Data Privacy + Security Insider on:

Reporters on Deadline

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
Custom Email Digest
- hide
- hide

This website uses cookies to improve user experience, track anonymous site usage, store authorization tokens and permit sharing on social media networks. By continuing to browse this website you accept the use of cookies. Click here to read more about how we use cookies.