![]() ![]() These RSRs are, as we explained previously, Apple’s effort to deliver single-issue emergency fixes as promptly as well-managed open source project generally do, where zero-day patches often come out within a day or two of a problem being found, with updates-to-the-updates following promptly if further investigations reveal further issues needing to be fixed. Urgent! Apple fixes critical zero-day hole in iPhones, iPads and Macs The ruthless answer to our own question in the headline above is, “No one knows except Apple, and Apple isn’t saying.”Ī better but admittedly middle-of-the-road answer is, “Wait and see.” ![]() Well, we’re not journalists here on Naked Security, so fortunately we’re not bound by this law. ![]() At the time of writing, Apple’s HT201222 security portal page hadn’t been updated, but we have already successfully fetched and installed both macOS 13.4.1 (c) and iOS 16.5.1 (c), which each took under two minutes and required one swift reboot.īetteridge’s Law of Headlines insists that any headline posed as a question can instantly be answered with a simple “No.”Īpparently, the theory behind this witticism (it’s not actually a Law, nor yet a rule, nor even in fact anything more than a suggestion) is that if the author knew what they were talking about, and had real evidence to support their case, they’d have written the headline as an undiluted fact. After reporting that update (b) was on the way, Apple has now published its promised patch-for-the-patch, though it had the version suffix (c) in the end. We now have the answer to the question above (for the time being, at least). ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |