Alert: NITDA Highlights Six Preventive Measures On Apple Patches Security Flaw
TECHDIGEST – The National Information Technology Development Agency (NITDA) has given six preventive measures following the Apple Patches Security Flaw in the iOS versions – 14.4 & 14.6, which affects all Apple devices.
NITDA, in a statement signed by its Head, Corporate Affairs and External Relations Unit, Mrs. Hadiza Umar, advised all Apple products to immediately update their iOS devices with the latest patches iOS 14.8.
It also urged all users to follow these six steps to update iOS:
Plug your device into power and connect to the internet with Wi-Fi
Go to Settings > General, then tap Software Update.
Tap Install Now. If you see Download and Install instead, tap it to download the update, enter your passcode, then tap Install Now.
After the install process begins, a message that says “Verifying Update” appears; wait for it to finish.
After verification is complete, your device will restart then the Apple logo and a small progress bar in the center of the screen.
When the installation is complete, you can unlock and use your iPhone again as usual.
To install patches on Apple watch:
Open the Apple Watch app on your iPhone.
Tap My Watch, go to General > Software Update, then, if an update is available, tap Download and Install.
To Update on macOS:
From the Apple menu in the corner of your screen, click System Preferences.
Click Software Update.
Click Update Now or Upgrade Now:
Update Now installs the latest updates for the currently installed version.
Upgrade Now installs a major new version with a new name.
If Software Update says that your Mac is up to date, then macOS and all of the apps it installs are up to date.
Apple has released security updates for a newly discovered zero-day vulnerability that affects every iPhone, iPad, Mac and Apple Watch. Research revealed that the zero-click exploit, which targets iMessaging, is used to illegally spy on iOS devices.
An attacker infects and exploits an Apple device without the victim’s knowledge or the need for the victim to carry out any action.
Spyware called Pegasus gets deployed into the targeted devices, turns on the camera and microphone to record messages, texts, emails and calls, even if sent via encrypted messaging apps.
Once the attacker has control of the device, the attacker compromises the user’s credentials, gains access to entire infrastructure, identify sensitive assets and move laterally within the network.