Nonetheless, once Apple gets its servers running again and the latte-fueled fury dies down, iPhone users who manage to update their phones should be more secure from potential threats.
The update includes fixes to the following operating system components: CFNetwork (1), Kernel (1), Safari (8), and WebKit (3). The various vulnerabilities, if exploited, could allow for the spoofing of secure Web sites, disclosure of sensitive information, cross-site scripting, denial of service, application crashing, and arbitrary code execution.
Security researchers have been predicting the emergence of iPhone malware for months. In January, US-CERT warned of the emergence of Trojan software purporting to aid in the installation of Apple's iPhone 1.1.3 software update. But the iPhone has yet to be affected by significant device security issues.
At the same time, user-related security issues, such as entering information at a phishing site, are not necessarily mitigated by closing software holes.
Apple on Thursday issued a security update for Apple TV, the company's home media server. The Apple TV 2.1 update includes six fixes to defend against maliciously crafted media files. Apple TV also continues to benefit from security through obscurity, though Apple might wish it were otherwise.
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
2017 State of IT ReportIn today's technology-driven world, "innovation" has become a basic expectation. IT leaders are tasked with making technical magic, improving customer experience, and boosting the bottom line -- yet often without any increase to the IT budget. How are organizations striking the balance between new initiatives and cost control? Download our report to learn about the biggest challenges and how savvy IT executives are overcoming them.