![]() ![]() We are auditing our development processes to help prevent this from happening again.” “We greatly regret this error and we apologize to all Mac users, both for releasing with this vulnerability and for the concern it has caused. The release of the update was followed by company’s apology for putting user’s in danger: Apple starts an automatic installation of the security patch soon too. MacOS High Sierra 10.13 and macOS High Sierra 10.13.1 users can already download the update manually from Mac App Store. One day later, Apple released a Security Update 2017-001 which fixes the flaw. The issue was reported on 28th of November. Apple released a security update for macOS High Sierra to fix root bugĪpple didn’t take long to fix a major security vulnerability detected in macOS High Sierra that allowed getting admin access to the computer without a password.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |