How will we know if the update has occurred?

On Dec 23, 2014, at 3:10 PM, John Robinson <[email protected]> wrote:

>                       Merry Christmas!
> 
> Ho, Ho, Ho, it’s about time for the big guy.  Best wishes for a very Blessed 
> Holiday and a wonderful new year, may it be our best.
> 
> I also wanted to let the Mac users in the group know they should keep their 
> machines running so Apple can do an automatic update, the very FIRST they 
> have ever done since introducing the technology a few years ago.
> 
> This means they will do the update WITHOUT you having to do anything, no 
> approval required and no restart.  A flaw was discovered that affects EVERY 
> computer, including industrial control systems.
> 
> What the other guys will do about this for their users I haven’t a clue but 
> it was discovered Friday and Apple forced the update Monday so if your Mac 
> was running you are O.K., Apple also says they know of no breaches.
> 
> Our world is amazing in this 21st Century but it’s also quite fragile to so 
> many areas of breach.  Staying informed is a responsibility we each can’t 
> ignore.
> 
> So, if you have gotten the update you can now sit back and look for the fella 
> in the Red Coat paying you a visit.
> 
> Be safe!
> 
> John
> 
> 
> Critical flaw forces Apple to push Mac update for first time
> <c1e799c9-1a4e-4aac-a4a7-86b2037d897d_gigaom-logo.png> By David Meyer
> 
> 
> 
> Apple has pushed an automatic update to Macs for the first time, in order to 
> fix a critical vulnerability in the network time protocol (NTP), which is 
> used to synchronize computers’ clocks.
> 
> The company typically uses its software update mechanism to issue security 
> updates, with users consciously being involved in the process, but this one 
> was extraordinarily urgent, and led Apple to use an automatic update 
> mechanism that it developed a couple years back but had not used until Monday.
> 
> Apple spokesman Bill Evans told Reuters that the firm wanted to protect 
> customers as quickly as possible – and indeed, when it was first released on 
> Monday ahead of the automated push, the update was unusually entitled: 
> “Install this update as soon as possible.”
> 
> The flaw was flagged up by the U.S. government on Friday – it doesn’t just 
> affect Macs, but also systems all the way up to industrial control systems, 
> and the government needed to warn those running critical infrastructure. 
> According to that warning:
> 
> Evans told Reuters that Apple was not aware of any exploitations of the flaw 
> in Macs. The update, which doesn’t require a restart, was released for OS X 
> Mountain Lion v10.8.5, OS X Mavericks v10.9.5, and OS X Yosemite v10.10.1.
> 
> _______________________________________________
> MacGroup mailing list
> [email protected]
> http://www.math.louisville.edu/mailman/listinfo/macgroup

_______________________________________________
MacGroup mailing list
[email protected]
http://www.math.louisville.edu/mailman/listinfo/macgroup

Reply via email to