For me, the attached graphic appeared in the same place as 
the alert concerning other updates would show (upper-right).  
And nothing was recorded in the AppStore Updates previous 
history.  The alert was dismissed with a simple click of the 
Desktop area, and I could not find it anywhere else with any 
other common searching.   -russ





> On Dec 23, 2014, at 5:12 PM, Harry Jacobson-Beyer <[email protected]> wrote:
> 
> How will we know if the update has occurred?
> 
> 
> On Dec 23, 2014, at 3:10 PM, John Robinson <[email protected] 
> <mailto:[email protected]>> wrote:
> 
>>                      Merry Christmas!
>> 
>> Ho, Ho, Ho, it’s about time for the big guy.  Best wishes for a very Blessed 
>> Holiday and a wonderful new year, may it be our best.
>> 
>> I also wanted to let the Mac users in the group know they should keep their 
>> machines running so Apple can do an automatic update, the very FIRST they 
>> have ever done since introducing the technology a few years ago.
>> 
>> This means they will do the update WITHOUT you having to do anything, no 
>> approval required and no restart.  A flaw was discovered that affects EVERY 
>> computer, including industrial control systems.
>> 
>> What the other guys will do about this for their users I haven’t a clue but 
>> it was discovered Friday and Apple forced the update Monday so if your Mac 
>> was running you are O.K., Apple also says they know of no breaches.
>> 
>> Our world is amazing in this 21st Century but it’s also quite fragile to so 
>> many areas of breach.  Staying informed is a responsibility we each can’t 
>> ignore.
>> 
>> So, if you have gotten the update you can now sit back and look for the 
>> fella in the Red Coat paying you a visit.
>> 
>> Be safe!
>> 
>> John
>> 
>> 
>> Critical flaw forces Apple to push Mac update for first time
>> <c1e799c9-1a4e-4aac-a4a7-86b2037d897d_gigaom-logo.png> <http://gigaom.com/> 
>> By David Meyer
>> 
>> 
>> 
>> Apple has pushed an automatic update to Macs for the first time, in order to 
>> fix a critical vulnerability in the network time protocol (NTP), which is 
>> used to synchronize computers’ clocks.
>> 
>> The company typically uses its software update mechanism to issue security 
>> updates, with users consciously being involved in the process, but this one 
>> was extraordinarily urgent, and led Apple to use an automatic update 
>> mechanism that it developed a couple years back but had not used until 
>> Monday.
>> 
>> Apple spokesman Bill Evans told Reuters 
>> <http://www.reuters.com/article/2014/12/23/us-apple-cybersecurity-idUSKBN0K108W20141223>
>>  that the firm wanted to protect customers as quickly as possible – and 
>> indeed, when it was first released on Monday ahead of the automated push, 
>> the update was unusually entitled 
>> <http://www.macrumors.com/2014/12/22/apple-issues-new-security-fix/>: 
>> “Install this update as soon as possible.”
>> 
>> The flaw was flagged up 
>> <https://ics-cert.us-cert.gov/advisories/ICSA-14-353-01> by the U.S. 
>> government on Friday – it doesn’t just affect Macs, but also systems all the 
>> way up to industrial control systems, and the government needed to warn 
>> those running critical infrastructure. According to that warning:
>> 
>> Evans told Reuters that Apple was not aware of any exploitations of the flaw 
>> in Macs. The update <https://support.apple.com/en-us/HT6601>, which doesn’t 
>> require a restart, was released for OS X Mountain Lion v10.8.5, OS X 
>> Mavericks v10.9.5, and OS X Yosemite v10.10.1.
>> 
>> _______________________________________________
>> MacGroup mailing list
>> [email protected] 
>> <mailto:[email protected]>
>> http://www.math.louisville.edu/mailman/listinfo/macgroup
> 
> 
> _______________________________________________
> MacGroup mailing list
> [email protected]
> http://www.math.louisville.edu/mailman/listinfo/macgroup

_______________________________________________
MacGroup mailing list
[email protected]
http://www.math.louisville.edu/mailman/listinfo/macgroup

Reply via email to