{"id":72805,"date":"2010-08-12T06:59:39","date_gmt":"2010-08-12T06:59:39","guid":{"rendered":"https:\/\/localhost\/wordpress\/?p=72805"},"modified":"2010-08-12T06:59:39","modified_gmt":"2010-08-12T06:59:39","slug":"apple-releases-emergency-security-patch-for-iphoneipadipod-touch","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/apple-releases-emergency-security-patch-for-iphoneipadipod-touch\/","title":{"rendered":"Apple releases emergency security patch for iPhone\/iPad\/iPod Touch"},"content":{"rendered":"<p>Users of iPad, iPhone and iPod Touch and can heave a sigh of relief as Apple has kept its word and released a security patch for a vulnerability that could have exposed the concerned devices to malicious attacks.<\/p>\n<p>The vulnerability existed in Apple\u2019s Safari browser and the way it handled Adobe Acrobat PDF documents. For example, if a PDF file containing malicious code was downloaded using Mobile Safari browser it gave remote attackers a chance to take complete control of a vulnerable device. This exploit was also said to have imitated JailbreakMe utility that allowed iPhone users to run non-Apple approved applications.<\/p>\n<p>The iOS 4.0.2 update for iPhone and iPod Touch can be downloaded and installed using iTunes. For additional information, <a title=\"Apple's support advisory HT4291\" href=\"https:\/\/support.apple.com\/kb\/HT4291\">visit Apple&#8217;s support advisory HT4291<\/a>. The same process can be used to update Apple iPads to version 3.2.3 of iOS, with detailed information about the vulnerability published on <a title=\"Apple's support knowledgebase\" href=\"https:\/\/support.apple.com\/kb\/HT4292\">Apple&#8217;s support knowledgebase<\/a>.<\/p>\n<p>I will recommend Apple iPad, iPhone and iPod Touch users to apply this patch on priority otherwise the exposed devices may be prone to malicious attacks.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Users of iPad, iPhone and iPod Touch and can heave a sigh of relief as Apple has kept its word and released a security patch for a vulnerability that could have exposed the concerned devices to malicious attacks. The vulnerability existed in Apple\u2019s Safari browser and the way it handled Adobe Acrobat PDF documents. For [&hellip;]<\/p>\n","protected":false},"author":13,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-72805","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/72805"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=72805"}],"version-history":[{"count":0,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/72805\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=72805"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=72805"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=72805"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}