![]() ![]() The second vulnerability patched in iOS 15.6.1, tracked as CVE-2022-32894, could allow an attacker who has already gained a basic foothold on an Apple device by exploiting the WebKit bug “to jump from controlling just a single app to taking over the operating system kernel itself. “The vulnerability potentially affects many more apps and system components than just Apple’s own Safari browser.” He also warns that avoiding Safari won’t help. “Simply put, a cybercriminal could implant malware on your device even if all you did was view an otherwise innocent web page,” he says. Tap Install Trust to accept Remote Management. ![]() If prompted, enter your passcode and tap Install. Close your web browser and open your iOS settings. When your web browser opens and tries to download the profile, tap Allow Close. ![]() In a newly-published blog, Sophos principal research scientist Paul Ducklin explains how the CVE-2022-32893 flaw in WebKit, which underpins the Safari browser, could allow a “booby trapped web page” to trick iPhones, iPads and Macs into running unauthorised and untrusted software code. Complete the steps below for your iOS version. Updated Apr 21, 2023: Converted to Test Bench 1.10. We've also updated our pre-calibration settings to match the new setting names used by Hisense. Security company Sophos has shed some light on how the patched iOS 15.6.1 flaws could have led to real-life attacks. Updated May 15, 2023: Hisense has added a new HDMI Input Optimization setting, which allows for proper 4k 120Hz 4:4:4 from a PC, so we've updated the list of supported resolutions. So what are you waiting for? Go to your iPhone Settings > General > Software Update and download and install iOS 15.6.1 now. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |