![]() ![]() Apple had already issued a rare apology for the "root" security flaw, writing that its "customers deserve better" and promising to audit its development practices to prevent similar bugs in the future. Even among those who were affected, many likely have rebooted their computers, which should leave them protected.īut the shoddiness of Apple's patch joins a disturbing pattern of security missteps in High Sierra's code. ![]() For one, it's not clear how many High Sierra users might have installed the security patch before upgrading to the most recent version of the operating system, or even if everyone who did so is affected. The bug in Apple's bug-fix isn't, of course, as bad as its original "root" problem. And worse, two of those Mac users say they've also tried re-installing Apple's security patch after that upgrade, only to find that the "root" problem still persists until they reboot their computer, with no warning that a reboot is necessary. Those who had not yet upgraded their operating system from the original version of High Sierra, 10.13.0, to the most recent version, 10.13.1, but had downloaded the patch, say the "root" bug reappears when they install the most recent macOS system update. Apple's initial patch came out about a 18 hours after the bug was first reported.īut now multiple Mac users have confirmed to WIRED that Apple's fix for that problem has a serious glitch of its own. ![]() Except, perhaps, when that patch is so rushed that it's nearly as buggy as the code it was designed to fix.Įarlier this week, Apple scrambled to push out a software update for macOS High Sierra, to sew up a glaring hole in the operating system's security measures: When any person or malicious program tried to log into a Mac computer, install software, or change settings, and thus hit a prompt for a username and password, they could simply enter "root" as a username, no password, and bypass the prompt to gain full access to the computer. Once you’ve downloaded the patch and you’re all up to date, don’t forget to check out our guide on the best MacOS apps.When a company like Apple rushes out a software patch for a critical security bug, it deserves praise for protecting its customers quickly. The final improvement in this update is added support for unlocking a FileVault-encrypted APFS volume using a recovery keychain file, should you otherwise lose access. The “reliability” of SMB printing has now been improved, and Touch ID preferences are now accessible while logged in as a mobile user on a MacBook Pro with Touch Bar. The High Sierra 10.13.1 update also adds a few improvements for enterprise users. Other security improvements include shoring up the Dictionary widget so it cannot compromise the user’s information and a fix for a flaw that made it possible for malicious Thunderbolt adaptors to steal unencrypted filesystem information. In terms of security, this update addresses an existing flaw that could allow a Wi-Fi bug to be exploited using the KRACK ( Key Reinstallation Attack) method. MacWorld reports that you’ll need the iOS 11.1 update to take full advantage of them. It includes the addition of new food types, animals, mythical creatures, clothing choices, more expressive smiley faces, and more. The addition of 70 new emojis is a pretty sizeable feature update with this release. ![]() Ranking the best (and worst) versions of macOS from the last 20 years Is macOS more secure than Windows? This malware report has the answer Apple’s macOS Sonoma has a game-changing feature - literally ![]()
0 Comments
Leave a Reply. |