	{"id":25006,"date":"2014-04-24T08:50:57","date_gmt":"2014-04-24T15:50:57","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=25006"},"modified":"2014-04-24T15:48:37","modified_gmt":"2014-04-24T22:48:37","slug":"apple-securing-mac-iphone","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/apple-securing-mac-iphone\/","title":{"rendered":"Does Apple care more about securing Mac users than iPhone users?"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-25048\" alt=\"Does Apple care more about securing Mac users than iPhone users?\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/04\/sad-iphone-wide.jpeg\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/04\/sad-iphone-wide.jpeg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/04\/sad-iphone-wide-150x75.jpeg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/04\/sad-iphone-wide-300x150.jpeg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>In the last couple of days, Apple has issued critical security patches for <a title=\"iOS 7.1.1 Update Includes Bug Fixes\" href=\"https:\/\/www.intego.com\/mac-security-blog\/ios-7-1-1-update-includes-bug-fixes\/\" target=\"_blank\">iOS<\/a>, <a title=\"Apple Security Update 2014-002 Patches Secure Transport\" href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-security-update-2014-002-patches-secure-transport\/\" target=\"_blank\">Mac OS X<\/a>, the <a title=\"Apple Releases AirPort Base Station Firmware Update 7.7.3, Addresses Heartbleed Bug\" href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-airport-base-station-firmware-update-7-7-3-addresses-heartbleed-bug\/\" target=\"_blank\">Apple Airport Base Station<\/a>, and even the innocuous <a title=\"Apple Releases Apple TV 6.1.1 with Security Updates\" href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-apple-tv-6-1-1-with-security-updates\/\" target=\"_blank\">hockey puck-shaped Apple TV<\/a>.<\/p>\n<p>And I trust, as a regular loyal reader of the Mac Security blog, that you haven&#8217;t wasted any time ensuring that all of your devices and gadgets are fully patched up, and protected from potential attack by hackers.<\/p>\n<p>After all, some of the security flaws tackled by these patches are extremely serious &#8211; and could lead to your devices being compromised by malicious hackers, or your personal and private data being stolen.<\/p>\n<p>But the list of patches above reveals just how many different types of consumer and business gadgets Apple&#8217;s security team needs to consider these days when a new flaw is discovered, and raises an important question:<\/p>\n<p><strong>Does Apple treat all of its products equally when it comes to security?<\/strong><\/p>\n<p>Sadly, it seems they don&#8217;t.<\/p>\n<p>Take a look at this list of issues that Apple has just fixed in WebKit, the framework that underlies the Safari browser on iPhones and iPads, and the security holes it addressed in the OS X desktop\/laptop version of Safari a full three weeks ago:<\/p>\n<table style=\"width: 620px;\">\n<colgroup>\n<col style=\"width: 122px;\" \/>\n<col style=\"width: 178px;\" \/>\n<col style=\"width: 22px;\" \/>\n<col style=\"width: 121px;\" \/>\n<col style=\"width: 177px;\" \/><\/colgroup>\n<tbody>\n<tr>\n<th style=\"font-family: Arial, sans-serif; font-size: 14px; font-weight: normal; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #ffffff; background-color: #010066; text-align: center;\" colspan=\"2\">Security updates contained in<br \/>\niOS 7.1.1, issued this week<\/th>\n<th style=\"font-family: Arial, sans-serif; font-size: 14px; font-weight: bold; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #ffffff; background-color: #010066;\"><\/th>\n<th style=\"font-family: Arial, sans-serif; font-size: 14px; font-weight: normal; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #ffffff; background-color: #010066; text-align: center;\" colspan=\"2\">Security updates in Safari 7.0.3 for OS X, released three weeks ago on 1 April 2014<\/th>\n<\/tr>\n<tr>\n<td style=\"font-family: Arial, sans-serif; font-size: 12px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #333333; background-color: #cdffff;\">CVE-2013-2871<\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 12px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #cdffff;\">miaubiz<\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 14px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #cfcfcf;\"><\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 12px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #cdffff;\">CVE-2013-2871<\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 12px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #cdffff;\">miaubiz<\/td>\n<\/tr>\n<tr>\n<td style=\"font-family: Arial, sans-serif; font-size: 12px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #f7fdfa;\">CVE-2014-1298<\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 12px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #f7fdfa;\">Google Chrome Security Team<\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 14px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #cfcfcf;\"><\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 12px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #f7fdfa;\">CVE-2013-2926<\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 12px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #f7fdfa;\">cloudfuzzer<\/td>\n<\/tr>\n<tr>\n<td style=\"font-family: Arial, sans-serif; font-size: 12px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #cdffff;\">CVE-2014-1299<\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 12px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #cdffff;\">Google Chrome Security Team, Apple, Renata Hodovan of University of Szeged \/ Samsung Electronics<\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 14px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #cfcfcf;\"><\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 12px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #f7fdfa;\">CVE-2013-2928<\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 12px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #f7fdfa;\">Google Chrome Security Team<\/td>\n<\/tr>\n<tr>\n<td style=\"font-family: Arial, sans-serif; font-size: 12px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #cdffff;\">CVE-2014-1300<\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 12px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #cdffff;\">Ian Beer of Google Project Zero working with HP&#8217;s Zero Day Initiative<\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 14px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #cfcfcf;\"><\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 12px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #f7fdfa;\">CVE-2013-6625<\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 12px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #f7fdfa;\">cloudfuzzer<\/td>\n<\/tr>\n<tr>\n<td style=\"font-family: Arial, sans-serif; font-size: 12px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #cdffff;\">CVE-2014-1302<\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 12px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #cdffff;\">Google Chrome Security Team, Apple<\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 14px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #cfcfcf;\"><\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 12px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #f7fdfa;\">CVE-2014-1289<\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 12px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #f7fdfa;\">Apple<\/td>\n<\/tr>\n<tr>\n<td style=\"font-family: Arial, sans-serif; font-size: 12px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #cdffff;\">CVE-2014-1303<\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 12px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #cdffff;\">KeenTeam working with HP&#8217;s Zero Day Initiative<\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 14px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #cfcfcf;\"><\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 12px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #f7fdfa;\">CVE-2014-1290<\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 12px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #f7fdfa;\">ant4g0nist (SegFault) working with HP&#8217;s Zero Day Initiative, Google Chrome Security Team<\/td>\n<\/tr>\n<tr>\n<td style=\"font-family: Arial, sans-serif; font-size: 12px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #cdffff;\">CVE-2014-1304<\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 12px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #cdffff;\">Apple<\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 14px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #cfcfcf;\"><\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 12px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #f7fdfa;\">CVE-2014-1291<\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 12px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #f7fdfa;\">Google Chrome Security Team<\/td>\n<\/tr>\n<tr>\n<td style=\"font-family: Arial, sans-serif; font-size: 12px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #cdffff;\">CVE-2014-1305<\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 12px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #cdffff;\">Apple<\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 14px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #cfcfcf;\"><\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 12px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #f7fdfa;\">CVE-2014-1292<\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 12px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #f7fdfa;\">Google Chrome Security Team<\/td>\n<\/tr>\n<tr>\n<td style=\"font-family: Arial, sans-serif; font-size: 12px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #cdffff;\">CVE-2014-1307<\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 12px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #cdffff;\">Google Chrome Security Team<\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 14px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #cfcfcf;\"><\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 12px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #f7fdfa;\">CVE-2014-1293<\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 12px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #f7fdfa;\">Google Chrome Security Team<\/td>\n<\/tr>\n<tr>\n<td style=\"font-family: Arial, sans-serif; font-size: 12px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #cdffff;\">CVE-2014-1308<\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 12px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #cdffff;\">Google Chrome Security Team<\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 14px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #cfcfcf;\"><\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 12px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #f7fdfa;\">CVE-2014-1294<\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 12px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #f7fdfa;\">Google Chrome Security Team<\/td>\n<\/tr>\n<tr>\n<td style=\"font-family: Arial, sans-serif; font-size: 12px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #cdffff;\">CVE-2014-1309<\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 12px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #cdffff;\">cloudfuzzer<\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 14px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #cfcfcf;\"><\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 12px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #cdffff;\">CVE-2014-1298<\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 12px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #cdffff;\">Google Chrome Security Team<\/td>\n<\/tr>\n<tr>\n<td style=\"font-family: Arial, sans-serif; font-size: 12px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #cdffff;\">CVE-2014-1310<\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 12px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #cdffff;\">Google Chrome Security Team<\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 14px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #cfcfcf;\"><\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 12px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #cdffff;\">CVE-2014-1299<\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 12px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #cdffff;\">Google Chrome Security Team, Apple, Renata Hodovan of University of Szeged \/ Samsung Electronics<\/td>\n<\/tr>\n<tr>\n<td style=\"font-family: Arial, sans-serif; font-size: 12px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #cdffff;\">CVE-2014-1311<\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 12px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #cdffff;\">Google Chrome Security Team<\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 14px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #cfcfcf;\"><\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 12px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #cdffff;\">CVE-2014-1300<\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 12px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #cdffff;\">Ian Beer of Google Project Zero working with HP&#8217;s Zero Day Initiative<\/td>\n<\/tr>\n<tr>\n<td style=\"font-family: Arial, sans-serif; font-size: 12px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #cdffff;\">CVE-2014-1312<\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 12px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #cdffff;\">Google Chrome Security Team<\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 14px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #cfcfcf;\"><\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 12px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #ffffff;\">CVE-2014-1301<\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 12px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #ffffff;\">Google Chrome Security Team<\/td>\n<\/tr>\n<tr>\n<td style=\"font-family: Arial, sans-serif; font-size: 12px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #cdffff;\">CVE-2014-1313<\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 12px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #cdffff;\">Google Chrome Security Team<\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 14px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #cfcfcf;\"><\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 12px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #cdffff;\">CVE-2014-1302<\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 12px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #cdffff;\">Google Chrome Security Team, Apple<\/td>\n<\/tr>\n<tr>\n<td style=\"font-family: Arial, sans-serif; font-size: 12px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #cdffff;\">CVE-2014-1713<\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 12px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #cdffff;\">VUPEN working with HP&#8217;s Zero Day Initiative<\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 14px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #cfcfcf;\"><\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 12px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #cdffff;\">CVE-2014-1303<\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 12px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #cdffff;\">KeenTeam working with HP&#8217;s Zero Day Initiative<\/td>\n<\/tr>\n<tr>\n<td style=\"font-family: Arial, sans-serif; font-size: 14px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #f7fdfa;\"><\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 14px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #f7fdfa;\"><\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 14px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #cfcfcf;\"><\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 12px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #cdffff;\">CVE-2014-1304<\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 12px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #cdffff;\">Apple<\/td>\n<\/tr>\n<tr>\n<td style=\"font-family: Arial, sans-serif; font-size: 14px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #f7fdfa;\"><\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 14px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #f7fdfa;\"><\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 14px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #cfcfcf;\"><\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 12px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #cdffff;\">CVE-2014-1305<\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 12px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #cdffff;\">Apple<\/td>\n<\/tr>\n<tr>\n<td style=\"font-family: Arial, sans-serif; font-size: 14px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #f7fdfa;\"><\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 14px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #f7fdfa;\"><\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 14px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #cfcfcf;\"><\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 12px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #cdffff;\">CVE-2014-1307<\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 12px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #cdffff;\">Google Chrome Security Team<\/td>\n<\/tr>\n<tr>\n<td style=\"font-family: Arial, sans-serif; font-size: 14px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #f7fdfa;\"><\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 12px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #f7fdfa;\"><\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 14px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #cfcfcf;\"><\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 12px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #cdffff;\">CVE-2014-1308<\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 12px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #cdffff;\">Google Chrome Security Team<\/td>\n<\/tr>\n<tr>\n<td style=\"font-family: Arial, sans-serif; font-size: 14px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #f7fdfa;\"><\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 14px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #f7fdfa;\"><\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 14px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #cfcfcf;\"><\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 12px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #cdffff;\">CVE-2014-1309<\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 12px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #cdffff;\">cloudfuzzer<\/td>\n<\/tr>\n<tr>\n<td style=\"font-family: Arial, sans-serif; font-size: 14px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #f7fdfa;\"><\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 14px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #f7fdfa;\"><\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 14px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #cfcfcf;\"><\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 12px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #cdffff;\">CVE-2014-1310<\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 12px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #cdffff;\">Google Chrome Security Team<\/td>\n<\/tr>\n<tr>\n<td style=\"font-family: Arial, sans-serif; font-size: 14px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #f7fdfa;\"><\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 14px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #f7fdfa;\"><\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 14px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #cfcfcf;\"><\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 12px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #cdffff;\">CVE-2014-1311<\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 12px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #cdffff;\">Google Chrome Security Team<\/td>\n<\/tr>\n<tr>\n<td style=\"font-family: Arial, sans-serif; font-size: 14px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #f7fdfa;\"><\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 14px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #f7fdfa;\"><\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 14px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #cfcfcf;\"><\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 12px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #cdffff;\">CVE-2014-1312<\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 12px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #cdffff;\">Google Chrome Security Team<\/td>\n<\/tr>\n<tr>\n<td style=\"font-family: Arial, sans-serif; font-size: 14px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #f7fdfa;\"><\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 14px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #f7fdfa;\"><\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 14px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #cfcfcf;\"><\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 12px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #cdffff;\">CVE-2014-1313<\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 12px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #cdffff;\">Google Chrome Security Team<\/td>\n<\/tr>\n<tr>\n<td style=\"font-family: Arial, sans-serif; font-size: 14px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #f7fdfa;\"><\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 14px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #f7fdfa;\"><\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 14px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #cfcfcf;\"><\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 12px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #cdffff;\">CVE-2014-1713<\/td>\n<td style=\"font-family: Arial, sans-serif; font-size: 12px; padding: 10px 5px; border-style: solid; border-width: 1px; overflow: hidden; border-color: #999; color: #444; background-color: #cdffff;\">VUPEN working with HP&#8217;s Zero Day Initiative<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Do you see any similarities? Sure, the patch for desktop OS X users contains more fixes than the one for iOS users, but ignore that for now.<\/p>\n<p>For those of you who haven&#8217;t spotted, I&#8217;ve shaded in the security holes that are shared between the Mac OS X and iOS versions of Safari in a fetching shade of blue.<\/p>\n<p>In short, three weeks ago, when it released its security update for OS X, Apple told the world that there were critical security holes in its browser and provided fixes.<\/p>\n<p>That would have been fine, if it had patched the same underlying vulnerabilities on the iPhone and iPad at the same time. After all, we know that hackers love nothing more than to reverse-engineer security patches and see if the same holes can be used elsewhere. But Apple *didn&#8217;t* patch iPhones and iPads at that point.<\/p>\n<p>Instead, it left those iOS users vulnerable for three weeks.<\/p>\n<p>And this isn&#8217;t a new phenomenon. Time and time again we have seen the iOS operating system used by Apple iPhones and iPads lagging behind &#8211; sometimes by months &#8211; when it comes to security updates compared to its big brother operating system, Mac OS X.<\/p>\n<p>Security researcher Kristin Paget <a title=\"Apple + Patching = You\u2019re Doing It Wrong :( \" href=\"http:\/\/www.tombom.co.uk\/blog\/?p=492\" target=\"_blank\">took to her blog<\/a> to underline her disapproval of what appears to be Apple treating its millions of iPhone and iPad users as second class citizens, security-wise:<\/p>\n<blockquote><p>OK, so the desktop patch also included a few more issues \u2013 but clearly the iOS vulnerabilities they just fixed are a direct subset of the vulnerabilities they fixed 3 weeks ago. Apparently someone needs to sit Apple in front of a chalkboard and make them write out 100 lines:<\/p>\n<p>\u201cI will not use iOS to drop 0day on OSX, nor use OSX to drop 0day on iOS\u201d.<\/p>\n<p>Seriously, Apple \u2013 what the ****?<\/p>\n<p>Is this how you do business? Drop a patch for one product that quite literally lists out, in order, the security vulnerabilities in your platform, and then fail to patch those weaknesses on your other range of products for *weeks* afterwards? You really don\u2019t see anything wrong with this?<\/p><\/blockquote>\n<p>Paget is quite right.<\/p>\n<p>A malicious hacker could have taken one of these patched OS X vulnerabilities, and weaponised it for exploitation in a zero-day attack against iPhone and iPad users.<\/p>\n<p>Every time Apple treats its smartphone and tablet customers as poor relations when it comes to security, they are putting millions of users at risk.<\/p>\n<p>As we&#8217;ve explained before on the Mac Security blog, there are <a title=\"Don\u2019t Believe in Antivirus? Malware is Only One Tool in a Cybercriminal\u2019s Arsenal\" href=\"https:\/\/www.intego.com\/mac-security-blog\/malware-only-one-tool-in-cybercriminals-arsenal\/\" target=\"_blank\">multiple ways in which malicious hackers and cybercriminals can target your systems<\/a>, so remember the importance of a layered approach to security.<\/p>\n<p>One of the layers is regularly updating your software against vulnerabilities as patches become available. Sadly, it&#8217;s evident that you can be doing a faultless job in keeping your systems updated, but still be let down if Apple fails to fix iOS and OS X security issues simultaneously.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the last couple of days, Apple has issued critical security patches for iOS, Mac OS X, the Apple Airport Base Station, and even the innocuous hockey puck-shaped Apple TV. And I trust, as a regular loyal reader of the Mac Security blog, that you haven&#8217;t wasted any time ensuring that all of your devices [&hellip;]<\/p>\n","protected":false},"author":34,"featured_media":25048,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[7,13],"tags":[3151,69,9,174,168,177,115,148],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"In the last couple of days, Apple has issued critical security patches for iOS, Mac OS X, the Apple Airport Base Station, and even the innocuous hockey\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-securing-mac-iphone\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Does Apple care more about securing Mac users than iPhone users? - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"In the last couple of days, Apple has issued critical security patches for iOS, Mac OS X, the Apple Airport Base Station, and even the innocuous hockey\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/apple-securing-mac-iphone\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2014-04-24T15:50:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2014-04-24T22:48:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/04\/sad-iphone-wide.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Graham Cluley\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-securing-mac-iphone\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/04\/sad-iphone-wide.jpeg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/04\/sad-iphone-wide.jpeg\",\"width\":600,\"height\":300},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-securing-mac-iphone\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-securing-mac-iphone\/\",\"name\":\"Does Apple care more about securing Mac users than iPhone users? - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-securing-mac-iphone\/#primaryimage\"},\"datePublished\":\"2014-04-24T15:50:57+00:00\",\"dateModified\":\"2014-04-24T22:48:37+00:00\",\"description\":\"In the last couple of days, Apple has issued critical security patches for iOS, Mac OS X, the Apple Airport Base Station, and even the innocuous hockey\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-securing-mac-iphone\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/apple-securing-mac-iphone\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-securing-mac-iphone\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Does Apple care more about securing Mac users than iPhone users?\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-securing-mac-iphone\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-securing-mac-iphone\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2\"},\"headline\":\"Does Apple care more about securing Mac users than iPhone users?\",\"datePublished\":\"2014-04-24T15:50:57+00:00\",\"dateModified\":\"2014-04-24T22:48:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-securing-mac-iphone\/#webpage\"},\"wordCount\":999,\"commentCount\":2,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-securing-mac-iphone\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/04\/sad-iphone-wide.jpeg\",\"keywords\":[\"Apple\",\"iOS\",\"iPhone\",\"Mac\",\"OS X\",\"Patching\",\"Safari\",\"WebKit\"],\"articleSection\":[\"Apple\",\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/apple-securing-mac-iphone\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2\",\"name\":\"Graham Cluley\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g\",\"caption\":\"Graham Cluley\"},\"description\":\"Graham Cluley is an award-winning security blogger, researcher and public speaker. He has been working in the computer security industry since the early 1990s, having been employed by companies such as Sophos, McAfee and Dr Solomon's. He has given talks about computer security for some of the world's largest companies, worked with law enforcement agencies on investigations into hacking groups, and regularly appears on TV and radio explaining computer security threats. Graham Cluley was inducted into the InfoSecurity Europe Hall of Fame in 2011, and was given an honorary mention in the \\\"10 Greatest Britons in IT History\\\" for his contribution as a leading authority in internet security. Follow him on Twitter at @gcluley.\",\"sameAs\":[\"https:\/\/grahamcluley.com\/\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/graham-cluley\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"In the last couple of days, Apple has issued critical security patches for iOS, Mac OS X, the Apple Airport Base Station, and even the innocuous hockey","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/apple-securing-mac-iphone\/","og_locale":"en_US","og_type":"article","og_title":"Does Apple care more about securing Mac users than iPhone users? - The Mac Security Blog","og_description":"In the last couple of days, Apple has issued critical security patches for iOS, Mac OS X, the Apple Airport Base Station, and even the innocuous hockey","og_url":"https:\/\/www.intego.com\/mac-security-blog\/apple-securing-mac-iphone\/","og_site_name":"The Mac Security Blog","article_published_time":"2014-04-24T15:50:57+00:00","article_modified_time":"2014-04-24T22:48:37+00:00","og_image":[{"width":600,"height":300,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/04\/sad-iphone-wide.jpeg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Graham Cluley","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-securing-mac-iphone\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/04\/sad-iphone-wide.jpeg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/04\/sad-iphone-wide.jpeg","width":600,"height":300},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-securing-mac-iphone\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/apple-securing-mac-iphone\/","name":"Does Apple care more about securing Mac users than iPhone users? - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-securing-mac-iphone\/#primaryimage"},"datePublished":"2014-04-24T15:50:57+00:00","dateModified":"2014-04-24T22:48:37+00:00","description":"In the last couple of days, Apple has issued critical security patches for iOS, Mac OS X, the Apple Airport Base Station, and even the innocuous hockey","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-securing-mac-iphone\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/apple-securing-mac-iphone\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-securing-mac-iphone\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Does Apple care more about securing Mac users than iPhone users?"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-securing-mac-iphone\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-securing-mac-iphone\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2"},"headline":"Does Apple care more about securing Mac users than iPhone users?","datePublished":"2014-04-24T15:50:57+00:00","dateModified":"2014-04-24T22:48:37+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-securing-mac-iphone\/#webpage"},"wordCount":999,"commentCount":2,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-securing-mac-iphone\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/04\/sad-iphone-wide.jpeg","keywords":["Apple","iOS","iPhone","Mac","OS X","Patching","Safari","WebKit"],"articleSection":["Apple","Security &amp; Privacy"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/apple-securing-mac-iphone\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2","name":"Graham Cluley","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g","caption":"Graham Cluley"},"description":"Graham Cluley is an award-winning security blogger, researcher and public speaker. He has been working in the computer security industry since the early 1990s, having been employed by companies such as Sophos, McAfee and Dr Solomon's. He has given talks about computer security for some of the world's largest companies, worked with law enforcement agencies on investigations into hacking groups, and regularly appears on TV and radio explaining computer security threats. Graham Cluley was inducted into the InfoSecurity Europe Hall of Fame in 2011, and was given an honorary mention in the \"10 Greatest Britons in IT History\" for his contribution as a leading authority in internet security. Follow him on Twitter at @gcluley.","sameAs":["https:\/\/grahamcluley.com\/"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/graham-cluley\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/04\/sad-iphone-wide.jpeg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-6vk","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/25006"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/34"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=25006"}],"version-history":[{"count":24,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/25006\/revisions"}],"predecessor-version":[{"id":25084,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/25006\/revisions\/25084"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/25048"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=25006"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=25006"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=25006"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}