Binance前首席执行官赵长鹏(CZ)在 X 上敦促苹果用户更新他们的设备以进行安全修复。 还要更新您的 iPhone。重要的安全修复。 https://t.co/rPKZzp41Ut https://t.co/29s0Wsj8cQ — CZ 🔶 BNB (@cz_ binance ) 2024 年 11 月 21 日 According to a report by Security Week, two security flaws were used to attack Intel-based Mac computers. Google’s Threat Analysis Group reportedly found the issues, and Apple confirmed the problem in a release. In its advisory, Apple released security updates for iOS 18.1.1, iPadOS 18.1.1, and macOS Sequoia 15.1.1. The tech giant underlined JavaScriptCore and WebKit vulnerabilities are the reason for the updates. JavaScriptCore vulnerability could process malicious web content and allow hackers to execute arbitrary code. This simply means that hackers can take control of your Apple device if the user visits a risky website. To counter this, Apple said it has improved its safety checks. In addition, WebKit vulnerability can lead to a cross-site scripting attack. This essentially means that users can lose data while their browser runs any harmful action. As a fix, Apple has reportedly improved its cookie tracking. Apple devices are usually known for protocols that prevent security exploits. Therefore, several crypto enthusiasts reportedly rely on Apple’s platforms for sensitive transactions. Apple says it keeps security issues private until they are fully investigated and fixes are available. However, some analysts have called it a zero-day attack, claiming hackers could have exploited the vulnerability before it was fixed. Apple did say that the WebKit vulnerability “may have been actively exploited on Intel-based Mac systems.” In May 2024, Apple released a “Apple Platform Security” document pointing to its strong encryption, biometric safeguards like Face ID, and features such as Lockdown Mode for enhanced protection. The report even stated, “The most recent versions of Apple operating systems are the most secure.” In October, the company expanded its Private Cloud Compute (PCC) program, inviting researchers to independently verify its cloud security claims. These efforts do say that Apple has been serious about staying ahead of security threats. And for the same reason, Apple devices have become one of the top choices for sensitive data transactions. However, the identified vulnerabilities could bypass protections to access data or even manipulate web-based wallet interfaces. Therefore, updating your software should be the first step for users. Additionally, incorporate strong and unique passwords, enable two-factor authentication, and review wallet activity for added security. Land a High-Paying Web3 Job in 90 Days: The Ultimate RoadmapCrypto users should care as Apple promised robust security