You are here

Mac vulnerability: critical security vulnerability patch for MacOS\iOS

RSS

Archives

SUL Rosette

You may have seen the article in the Stanford Report yesterday about the critical security vulnerability that Apple announced on Feb.21. This vulnerability has been addressed in the following ways:

1) All managed Macs have had the patch installed on them;
2) we are still in the process of having all Stanford-owned iPad\iPhone users update their devices.

If you don't know if you have a managed or unmanaged Mac, please contact your Expert Partner or me (dwicklun@stanford.edu). If you are working on an unmanaged Mac, you need to install the patch on your computer, unless you have installed BigFix and are using it to keep your computer updated.

In an email from Ammy Woodbury of the ITS Campus Readiness department, we have this information: "In late February, Apple announced a major security flaw frequently referred to as the “gotofail bug.” Left unpatched, emails, web site traffic, banking transactions, passwords, and other data transmitted to and from these devices are susceptible to being intercepted. Patches are available for both mobile devices running iOS and for Macintosh computers. Please encourage staff and faculty in your area to complete the update as soon as possible.

For iOS users on iOS 6 or 7, they must upgrade to either iOS 7.0.6 or 7.1. Users of the iPhone 3GS or iPod Touch 4th Generation should upgrade to iOS 6.1.6.

Go to Settings>General>Software Update to install the update or connect to iTunes to download and install the latest version.

If you have any questions about or need help in updating your unmanaged Mac or iOS device, please contact your EP or Deni.

Recent news

December 9, 2015

December 9, 2015