Apple is pushing its first-ever “rapid” patch – and quickly spoils • the record

On Monday, Apple pushed out to some iPhones and Macs its first-ever quick security fix.

This type of patch is meant to be automatically and seamlessly downloaded and applied by the operating system to immediately protect devices from exploits, thus avoiding the usual system update cycle that users might delay or miss, thus leaving their stuff vulnerable to attack.

Fortunately, this first patch didn’t go off without a hitch. Some Cupertino fans reported problems Get the update already.

“iOS 16.4.1 (a) security response failed because you are no longer connected to the Internet” was the most commonly reported failure message from the operating system, although users were usually able to apply the security update after trying or two.

Also: Apple hasn’t released any feedback besides the quick patch nor if the update patched a vulnerability that miscreants had already discovered and exploited. and as security analyst Will Dorman RequestedWill bug(s) eventually map to CVEs?

Considering that some of the recent iOS and macOS updates covered zero days that were already exploited by hackers to spread spyware on victims’ devices, it’s a good idea not to wait around when installing this latest fix, even if the installation process takes longer than it should.

Here’s what we know about iGiant’s first-ever “rapid security response,” according to Apple May 1 Advisory:

Note: The quotes around “In the Wild” are Apple tags, not ours.

Also, Apple only pushes these new hotfixes to the latest versions of iOS, iPadOS, and macOS starting with iOS 16.4.1, iPadOS 16.4.1, and macOS 13.3.1. Customers with more respectable software will have to wait for regular software updates.

See also  Intel Xeon Platinum 8468 48 Core "Sapphire Rapids" CPU benchmarks leak, on par with AMD's 64 Core Milan Chips

These latest fixes are supposed to be applied automatically by default (assuming they work), and once an update is checked, they are indicated by a letter after the numbers, ex: macOS 13.3.1(a).

If you turn this default off (maybe a bad idea in the long run), your device will receive the fixes when they are included in a regular report Operating system update. ®

Leave a Reply

Your email address will not be published. Required fields are marked *