![]() First off if you don’t want to delve into the details but just want to wait until the dust has cleared and all of the issues have been identified, watch when we change the “Defcon” number at the top of the site. There are several ways you can use the list. The other day I was asked how does one use the Master patch list? Posted on Octoat 23:46 CDT by Susan Bradley So far all of the reports I’ve seen on these “may have been exploited” are targeted attacks against key individuals, journalists in high risk areas, and the latest target de jour, not you and I. ![]() What mechanism was used? Text messages? Through an application I haven’t downloaded or don’t use? Through native email apps or third party?Īgain, I have yet to see us normal folks with an iPhone or iPad who do not jailbrake their device, who ignore scam text messages, who don’t open emails willy nilly…. And if it was (apparently) used in attacks, in order to determine risk I need to know the HOW of the attacks. ![]() “may have been actively exploited” Uh folks it either is or it isn’t. “Apple pushed additional updates for Kernel zero-day ( CVE-2022-42827) that may have been actively exploited.” This is where I REALLY wish all vendors were held to a standard of documentation and explanation. ![]() IPhone 6s and later, iPad Pro (all models), iPad Air 2 and later, iPad 5th generation and later, iPad mini 4 and later, and iPod touch (7th generation) If you are still running iOS 15.7 get ready for an update: Posted on Octoat 14:03 CDT by Susan Bradley ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |