Same here! Tom
> On Dec 23, 2014, at 5:25 PM, R. D. Preston <[email protected] > <mailto:[email protected]>> wrote: > > For me, the attached graphic appeared in the same place as > the alert concerning other updates would show (upper-right). > And nothing was recorded in the AppStore Updates previous > history. The alert was dismissed with a simple click of the > Desktop area, and I could not find it anywhere else with any > other common searching. -russ > > <SecurityUpdate?.jpg> > > > >> On Dec 23, 2014, at 5:12 PM, Harry Jacobson-Beyer <[email protected] >> <mailto:[email protected]>> wrote: >> >> How will we know if the update has occurred? >> >> >> On Dec 23, 2014, at 3:10 PM, John Robinson <[email protected] >> <mailto:[email protected]>> wrote: >> >>> Merry Christmas! >>> >>> Ho, Ho, Ho, it’s about time for the big guy. Best wishes for a very >>> Blessed Holiday and a wonderful new year, may it be our best. >>> >>> I also wanted to let the Mac users in the group know they should keep their >>> machines running so Apple can do an automatic update, the very FIRST they >>> have ever done since introducing the technology a few years ago. >>> >>> This means they will do the update WITHOUT you having to do anything, no >>> approval required and no restart. A flaw was discovered that affects EVERY >>> computer, including industrial control systems. >>> >>> What the other guys will do about this for their users I haven’t a clue but >>> it was discovered Friday and Apple forced the update Monday so if your Mac >>> was running you are O.K., Apple also says they know of no breaches. >>> >>> Our world is amazing in this 21st Century but it’s also quite fragile to so >>> many areas of breach. Staying informed is a responsibility we each can’t >>> ignore. >>> >>> So, if you have gotten the update you can now sit back and look for the >>> fella in the Red Coat paying you a visit. >>> >>> Be safe! >>> >>> John >>> >>> >>> Critical flaw forces Apple to push Mac update for first time >>> <c1e799c9-1a4e-4aac-a4a7-86b2037d897d_gigaom-logo.png> <http://gigaom.com/> >>> By David Meyer >>> >>> >>> >>> Apple has pushed an automatic update to Macs for the first time, in order >>> to fix a critical vulnerability in the network time protocol (NTP), which >>> is used to synchronize computers’ clocks. >>> >>> The company typically uses its software update mechanism to issue security >>> updates, with users consciously being involved in the process, but this one >>> was extraordinarily urgent, and led Apple to use an automatic update >>> mechanism that it developed a couple years back but had not used until >>> Monday. >>> >>> Apple spokesman Bill Evans told Reuters >>> <http://www.reuters.com/article/2014/12/23/us-apple-cybersecurity-idUSKBN0K108W20141223> >>> that the firm wanted to protect customers as quickly as possible – and >>> indeed, when it was first released on Monday ahead of the automated push, >>> the update was unusually entitled >>> <http://www.macrumors.com/2014/12/22/apple-issues-new-security-fix/>: >>> “Install this update as soon as possible.” >>> >>> The flaw was flagged up >>> <https://ics-cert.us-cert.gov/advisories/ICSA-14-353-01> by the U.S. >>> government on Friday – it doesn’t just affect Macs, but also systems all >>> the way up to industrial control systems, and the government needed to warn >>> those running critical infrastructure. According to that warning: >>> >>> Evans told Reuters that Apple was not aware of any exploitations of the >>> flaw in Macs. The update <https://support.apple.com/en-us/HT6601>, which >>> doesn’t require a restart, was released for OS X Mountain Lion v10.8.5, OS >>> X Mavericks v10.9.5, and OS X Yosemite v10.10.1. >>> >>> _______________________________________________ >>> MacGroup mailing list >>> [email protected] >>> <mailto:[email protected]> >>> http://www.math.louisville.edu/mailman/listinfo/macgroup >>> <http://www.math.louisville.edu/mailman/listinfo/macgroup> >> >> >> _______________________________________________ >> MacGroup mailing list >> [email protected] >> <mailto:[email protected]> >> http://www.math.louisville.edu/mailman/listinfo/macgroup >> <http://www.math.louisville.edu/mailman/listinfo/macgroup> > > > _______________________________________________ > MacGroup mailing list > [email protected] <mailto:[email protected]> > http://www.math.louisville.edu/mailman/listinfo/macgroup
_______________________________________________ MacGroup mailing list [email protected] http://www.math.louisville.edu/mailman/listinfo/macgroup
