{"id":3223,"date":"2014-02-23T12:38:19","date_gmt":"2014-02-23T17:38:19","guid":{"rendered":"http:\/\/kasperskydaily.com\/uk\/?p=3223"},"modified":"2020-02-26T15:08:37","modified_gmt":"2020-02-26T15:08:37","slug":"critical-ios-macos-bug-can-can-expose-your-confidential-data-update-now","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.uk\/blog\/critical-ios-macos-bug-can-can-expose-your-confidential-data-update-now\/3223\/","title":{"rendered":"Critical iOS, MacOS bug can can expose your confidential data, update now"},"content":{"rendered":"<p>On Friday, Apple released an urgent update to iOS 6 and 7. The only fix in the update is well worth bothering yourself with the update process, and doing it as soon as possible.<\/p>\n<p>The description of the issue, as stated by Apple itself \u2013 \u201can attacker with a privileged network position may capture or modify data in sessions protected by SSL\/TLS\u201d. To put it simply, when you do your online banking or Gmail mailing or Facebook chatting on the <a href=\"https:\/\/www.kaspersky.com\/blog\/hot-security-tips-hotspots\/\" target=\"_blank\" rel=\"noopener nofollow\">public Wi-Fi network<\/a> (e.g. at the airport or cafe), any skilled guy around can read and modify your data, even though you see that small lock in Safari, indicating that your session is protected with encryption. It\u2019s important to mention that the vulnerability affects almost any application, not only the web browser. No wonder Apple rushed to push this update.<\/p>\n<p>The security community spent this weekend trying to figure out the nature of the vulnerability. A technical analysis is available <a href=\"https:\/\/www.imperialviolet.org\/2014\/02\/22\/applebug.html\" target=\"_blank\" rel=\"noopener nofollow\">here<\/a>, however the most important finding is \u2013 that MacOS is affected too. Apple hasn\u2019t released the MacOS patch as of now, but we really expect to see it very soon.<\/p>\n<p>What to do:<\/p>\n<ul>\n<li>Update all your iPhones, ipods and ipads running iOS 6 and 7. Do it using a trusted, non-open network, e.g. At home.<\/li>\n<li>Avoid doing anything sensitive, e.g. banking on your iOS devices before you update.<\/li>\n<li>The same applies to MacOS devices \u2013 wait for the update. There are third-party updates already; however, applying this may be risky.<\/li>\n<li>If you really have to do your banking, use the most trusted networks only and implement additional protection measures \u2013 use Google Chrome, plus <a href=\"https:\/\/www.kaspersky.com\/blog\/vpns-use\/\" target=\"_blank\" rel=\"noopener nofollow\">VPN<\/a>, plus a <a href=\"https:\/\/www.kaspersky.co.uk\/mac-security\" target=\"_blank\" rel=\"noopener\">reliable anti-virus<\/a>.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>On Friday, Apple released an urgent update to iOS 6 and 7. The only fix in the update is well worth bothering yourself with the update process, and doing it<\/p>\n","protected":false},"author":32,"featured_media":3224,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[14,528,1150,527],"class_list":{"0":"post-3223","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-apple","9":"tag-bug","10":"tag-ios","11":"tag-macos"},"hreflang":[{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/critical-ios-macos-bug-can-can-expose-your-confidential-data-update-now\/3223\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.uk\/blog\/tag\/apple\/","name":"apple"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/3223","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=3223"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/3223\/revisions"}],"predecessor-version":[{"id":18945,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/3223\/revisions\/18945"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media\/3224"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=3223"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=3223"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=3223"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}