{"id":26707,"date":"2014-05-28T08:13:49","date_gmt":"2014-05-28T15:13:49","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=26707"},"modified":"2014-05-28T08:13:49","modified_gmt":"2014-05-28T15:13:49","slug":"month-in-review-part-2-vulnerabilities-and-patches","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-part-2-vulnerabilities-and-patches\/","title":{"rendered":"Month in Review, Part 2: Vulnerabilities and Patches"},"content":{"rendered":"<address><em>This article continues our Month in Review coverage. If you missed it, see also <a title=\"Month in Review, Part 1: Database Breaches, Compromised Passwords\" href=\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-part-1-database-breaches-compromised-passwords\/\" target=\"_blank\"><strong>Part 1: Database Breaches, Compromised Passwords<\/strong><\/a>.<\/em><\/address>\n<p>When it comes to computer security news, the past month or so has been pretty jam-packed. Following are more noteworthy security news stories you might have missed.<\/p>\n<p><strong>Multiple Adobe Updates &#8211; And Lack Thereof for Shockwave<\/strong><\/p>\n<p><img loading=\"lazy\" class=\"alignright size-medium wp-image-26728\" alt=\"\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/adobe-300x292.jpg\" width=\"125\" height=\"122\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/adobe-300x292.jpg 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/adobe-150x146.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/adobe-657x640.jpg 657w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/adobe.jpg 800w\" sizes=\"(max-width: 125px) 100vw, 125px\" \/>First there was a <a title=\"Adobe Flash Security Update Tackles Zero-Day Flaw\" href=\"https:\/\/www.intego.com\/mac-security-blog\/adobe-flash-security-update-tackles-zero-day-flaw\/\" target=\"_blank\">zero-day vulnerability<\/a> in Adobe Flash Player at the end of April, prompting Adobe to release version 13.0.0.206. Then several more vulnerabilities were patched in <a title=\"Adobe Thwarts Critical Vulnerabilities with Multiple Software Updates\" href=\"https:\/\/www.intego.com\/mac-security-blog\/adobe-thwarts-critical-vulnerabilities-with-multiple-software-updates\/\" target=\"_blank\">yet another Flash update<\/a> (version 13.0.0.214) two weeks ago, and on the same day Adobe fixed multiple flaws in Adobe Reader XI (releasing version 11.0.07; see Adobe&#8217;s <a href=\"http:\/\/helpx.adobe.com\/security\/products\/reader\/apsb14-15.html\" target=\"_blank\">security bulletin<\/a>). If you use Flash or Reader, make sure you&#8217;ve got the latest version installed.<\/p>\n<p><img loading=\"lazy\" class=\"alignleft size-full wp-image-3490\" alt=\"\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2011\/11\/shockwave.jpg\" width=\"128\" height=\"125\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2011\/11\/shockwave.jpg 128w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2011\/11\/shockwave-100x97.jpg 100w\" sizes=\"(max-width: 128px) 100vw, 128px\" \/>What you may not have heard is that Adobe Shockwave Player contains an embedded component of Flash that according to security reporter Brian Krebs <a title=\"Why You Should Ditch Adobe Shockwave\" href=\"http:\/\/krebsonsecurity.com\/2014\/05\/why-you-should-ditch-adobe-shockwave\/\" target=\"_blank\">hasn&#8217;t been patched since January 2013<\/a>, and thus doesn&#8217;t include fixes for several zero-day Flash vulnerabilities. Adobe is reportedly &#8220;reviewing [its] security update process in order to mitigate risks in Shockwave Player,&#8221; but in the mean time if you&#8217;ve got the plug-in installed and aren&#8217;t sure you need it, now would probably be a good idea to uninstall it.<\/p>\n<p><strong>Windows XP Zero-day Vulnerabilities<\/strong><\/p>\n<p><img loading=\"lazy\" class=\"alignright size-full wp-image-24493\" alt=\"\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/04\/WindowsXp-Apple-220.png\" width=\"150\" height=\"150\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/04\/WindowsXp-Apple-220.png 220w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/04\/WindowsXp-Apple-220-150x150.png 150w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/>We&#8217;ve previously covered the end of Windows XP&#8217;s support lifecycle, noting that Mac users should take the opportunity to upgrade Windows in their VMWare\/Parallels\/VirtualBox virtual machines or Boot Camp partitions, and that it may even be a good opportunity for some PC users to <a title=\"Windows XP\u2019s Death: Good Time to Switch to Apple?\" href=\"https:\/\/www.intego.com\/mac-security-blog\/windows-xps-death-good-time-to-switch-to-apple\/\" target=\"_blank\">switch to Apple<\/a>.<\/p>\n<p>Since Microsoft officially ended support for the nearly 13-year-old desktop operating system in mid-April, new vulnerabilities affecting Windows XP have come to light.<\/p>\n<p>The first was a zero-day remote code execution vulnerability (CVE-2014-1776) affecting Internet Explorer versions from all the way back to IE 6 to the current IE 11. Microsoft <a title=\"Security Update Released to Address Recent Internet Explorer Vulnerability\" href=\"http:\/\/blogs.technet.com\/b\/msrc\/archive\/2014\/05\/01\/security-update-released-to-address-recent-internet-explorer-vulnerability.aspx\" target=\"_blank\">begrudgingly<\/a> patched this vulnerability for Windows XP users on May 1st. The updates can be <a title=\"Microsoft Security Bulletin MS14-021 - Critical\" href=\"https:\/\/technet.microsoft.com\/library\/security\/ms14-021\" target=\"_blank\">downloaded<\/a> from Microsoft&#8217;s site.<\/p>\n<p>Included amongst May&#8217;s second-Tuesday patches on May 13th was a security update fixing two remote code execution vulnerabilities (CVE-2014-0310 and CVE-2014-1815) for IE 6 through 11. In this case, however, Microsoft opted <em>not<\/em> to patch the issues for Windows XP&#8217;s versions of Internet Explorer.<\/p>\n<p>According to NIST&#8217;s National Vulnerability Database, CVE-2014-1815 has <a title=\"Vulnerability Summary for CVE-2014-1815\" href=\"https:\/\/web.nvd.nist.gov\/view\/vuln\/detail?vulnId=CVE-2014-1815\" target=\"_blank\">already been exploited in the wild<\/a>. And since Microsoft has no plans to patch any more vulnerabilities for XP, this seems to be among the first of many &#8220;perpetual zero-days&#8221;\u2014that is, vulnerabilities in Windows XP that have been exploited in the wild and will never be patched by Microsoft.<\/p>\n<p>If you have Windows XP on your Mac, or if you know someone who still has an old PC running XP, you can mitigate this issue to some degree by setting Chrome or Firefox as the default browser and making sure the user knows not to use Internet Explorer anymore. However, more vulnerabilities affecting XP will continue to be discovered, so the better solutions would be to upgrade to a supported version of Windows or replace old computers that are still running XP.<\/p>\n<p><strong>iOS 7.1.1 Reportedly Not Encrypting E-mail Attachments<\/strong><\/p>\n<p><img loading=\"lazy\" class=\"alignright size-thumbnail wp-image-9869\" alt=\"\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/ios-apple-header-150x101.jpg\" width=\"150\" height=\"101\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/ios-apple-header-150x101.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/ios-apple-header-300x203.jpg 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/ios-apple-header.jpg 325w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/>German researcher Andreas Kurtz noticed that in iOS 7, the Mail app apparently <a title=\"iOS 7 reportedly not encrypting email attachments\" href=\"http:\/\/www.cnet.com\/news\/apple-mail-app-in-ios-7-reportedly-not-encrypting-attachments\/\" target=\"_blank\">doesn&#8217;t encrypt e-mail attachments<\/a>. Kurtz claims to have been able to access any IMAP, POP, and ActiveSync account&#8217;s e-mail attachments on his iPhone 4 even after upgrading to iOS 7.1.1, the current version as of this writing.<\/p>\n<p>This revelation is significant because Apple <a title=\"Apple - iOS 7 - What is iOS\" href=\"https:\/\/www.apple.com\/ios\/what-is\/\" target=\"_blank\">specifically claims<\/a>,\u00a0&#8220;When you use a passcode, it automatically encrypts and protects your email and third-party apps.&#8221;<\/p>\n<p><img loading=\"lazy\" class=\"alignright size-full wp-image-1955\" alt=\"\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2010\/08\/iphone4.jpg\" width=\"128\" height=\"246\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2010\/08\/iphone4.jpg 128w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2010\/08\/iphone4-100x192.jpg 100w\" sizes=\"(max-width: 128px) 100vw, 128px\" \/><a title=\"Apple is aware of iOS 7 mail attachment bug, working on a fix\" href=\"http:\/\/www.imore.com\/apple-aware-ios-7-mail-attachment-bug-working-fix\" target=\"_blank\">According to iMore&#8217;s Rene Ritchie<\/a>, newer iOS devices should be relatively safe due to the lack of a working and publicly available jailbreak for iOS 7.1 on anything other than the iPhone 4. Ritchie indicates that an attacker with physical access to a victim&#8217;s iPhone 4 would need to either know\/guess\/brute-force your password or jailbreak your device in order to access unencrypted attachments.<\/p>\n<p>Of course, if an attacker already knew or could easily guess your password, or if you have no passcode at all, then anyone could get into your device and see all your e-mail attachments anyway, not to mention having complete access to everything on your device.<\/p>\n<p>If you&#8217;ve got an iPhone 4 and you&#8217;re concerned about this issue, an Apple spokesperson told CNET that a fix is in the works, although no specific timeframe has been announced.<\/p>\n<p><strong>Multiple Apple Updates<\/strong><\/p>\n<p><img loading=\"lazy\" class=\"alignleft size-thumbnail wp-image-26797\" alt=\"\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/Mac-App-Store-icon-150x150.png\" width=\"150\" height=\"150\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/Mac-App-Store-icon-150x150.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/Mac-App-Store-icon-300x300.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/Mac-App-Store-icon.png 512w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/>In the past two weeks, Apple released several Mac updates:<\/p>\n<p>\u2022\u00a0<a title=\"Apple releases Mac OS X 10.9.3, but offers scant information on improvements\" href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-mac-os-x-10-9-3-but-offers-scant-information-on-improvements\/\" target=\"_blank\">OS X Mavericks version 10.9.3<\/a><br \/>\n\u2022\u00a0<a title=\"Apple Releases iTunes 11.2.1 \u2013 Fixes iTunes 11.2 Security Bug\" href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-itunes-11-2-1-fixes-itunes-11-2-security-bug\/\" target=\"_blank\">iTunes 11.2 and then 11.2.1<\/a><br \/>\n\u2022\u00a0<a title=\"About the security content of OS X Server 3.1.2\" href=\"http:\/\/support.apple.com\/kb\/HT6248\" target=\"_blank\">OS X Server 3.1.2<\/a> (which fixes a Ruby vulnerability)<br \/>\n\u2022\u00a0<a title=\"Safari 6.1.4 and Safari 7.0.4 Released with Security Bug Fixes\" href=\"https:\/\/www.intego.com\/mac-security-blog\/safari-6-1-4-and-safari-7-0-4-released-with-security-bug-fixes\/\" target=\"_blank\">Safari 6.1.4 and 7.0.4<\/a><\/p>\n<p>See our previous coverage, and patch your Macs as necessary (as well as Windows PCs with iTunes).<\/p>\n<p><strong>Heartbleed Still Affects 300,000 Servers<\/strong><\/p>\n<p><img loading=\"lazy\" class=\"alignright size-full wp-image-26815\" alt=\"\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/heartbleed-modified-logo-cropped.png\" width=\"174\" height=\"210\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/heartbleed-modified-logo-cropped.png 232w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/heartbleed-modified-logo-cropped-124x150.png 124w\" sizes=\"(max-width: 174px) 100vw, 174px\" \/>Back in April, the Heartbleed OpenSSL vulnerability became public knowledge. If you missed it, be sure to read our previous coverage for details about the vulnerability and how it affects you (in short: there&#8217;s a pretty good chance that you may need to change some of your online account passwords):<\/p>\n<p>\u2022\u00a0<a title=\"Heartbleed OpenSSL bug: FAQ for Mac, iPhone and iPad users\" href=\"https:\/\/www.intego.com\/mac-security-blog\/heartbleed-openssl-bug-faq-for-mac-iphone-and-ipad-users\/\" target=\"_blank\">Heartbleed OpenSSL bug: FAQ for Mac and iOS users<\/a><br \/>\n\u2022\u00a0<a title=\"Heartbleed Threat Alert Update\" href=\"https:\/\/www.intego.com\/mac-security-blog\/heartbleed-threat-alert-update\/\" target=\"_blank\">Heartbleed Threat Alert Update<\/a><\/p>\n<p>On May 8th, about a month after the Heartbleed problem became widely known, security veteran Robert Graham <a title=\"300k servers vulnerable to Heartbleed one month later\" href=\"http:\/\/blog.erratasec.com\/2014\/05\/300k-servers-vulnerable-to-heartbleed.html\" target=\"_blank\">scanned the Internet<\/a> probing port 443 to find out how many HTTPS servers are still vulnerable. He found that the number of Heartbleed-affected servers had dropped by half, from 600,000 to 300,000 servers, since his first scan a month earlier.<\/p>\n<p>Although it&#8217;s great that the number of affected servers has decreased substantially, it&#8217;s also rather disconcerting that such a high number of servers are still affected.<\/p>\n<p>Graham points out that he did not scan other common SSL ports, for example SMTP; Simple Mail Transfer Protocol (SMTP) and Internet Message Access Protocol (IMAP) e-mail servers that rely on OpenSSL may also be affected by Heartbleed.<\/p>\n<p>If you&#8217;re still concerned about how Heartbleed might have impacted you, <a title=\"Heartbleed Affected More Sites Than You Realized\" href=\"http:\/\/security.thejoshmeister.com\/2014\/05\/heartbleed-affected-more-sites-than-you.html\" target=\"_blank\">I&#8217;ve compiled lists<\/a> of some major sites that were confirmed to be affected by Heartbleed or were likely affected given available evidence. Although certainly not comprehensive, these lists include some original research of my own that hasn&#8217;t been published anywhere else. I&#8217;ve also included links to several sites that you can use to check the Heartbleed status of servers you access, including Secure IMAP and SMTP servers.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This article continues our Month in Review coverage. If you missed it, see also Part 1: Database Breaches, Compromised Passwords. When it comes to computer security news, the past month or so has been pretty jam-packed. Following are more noteworthy security news stories you might have missed. Multiple Adobe Updates &#8211; And Lack Thereof for [&hellip;]<\/p>\n","protected":false},"author":14,"featured_media":27196,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[5,11],"tags":[15,184,943,69,907,964,9,1111,201,121,519,144],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"This article continues our Month in Review coverage. If you missed it, see also Part 1: Database Breaches, Compromised Passwords.When it comes to computer\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-part-2-vulnerabilities-and-patches\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Month in Review, Part 2: Vulnerabilities and Patches - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"This article continues our Month in Review coverage. If you missed it, see also Part 1: Database Breaches, Compromised Passwords.When it comes to computer\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-part-2-vulnerabilities-and-patches\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/JoshLong\" \/>\n<meta property=\"article:published_time\" content=\"2014-05-28T15:13:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/computer-security.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@theJoshMeister\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Joshua Long\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-part-2-vulnerabilities-and-patches\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/computer-security.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/computer-security.jpg\",\"width\":400,\"height\":260,\"caption\":\"Computer Security on Paper background\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-part-2-vulnerabilities-and-patches\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-part-2-vulnerabilities-and-patches\/\",\"name\":\"Month in Review, Part 2: Vulnerabilities and Patches - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-part-2-vulnerabilities-and-patches\/#primaryimage\"},\"datePublished\":\"2014-05-28T15:13:49+00:00\",\"dateModified\":\"2014-05-28T15:13:49+00:00\",\"description\":\"This article continues our Month in Review coverage. If you missed it, see also Part 1: Database Breaches, Compromised Passwords.When it comes to computer\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-part-2-vulnerabilities-and-patches\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-part-2-vulnerabilities-and-patches\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-part-2-vulnerabilities-and-patches\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Month in Review, Part 2: Vulnerabilities and Patches\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-part-2-vulnerabilities-and-patches\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-part-2-vulnerabilities-and-patches\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\"},\"headline\":\"Month in Review, Part 2: Vulnerabilities and Patches\",\"datePublished\":\"2014-05-28T15:13:49+00:00\",\"dateModified\":\"2014-05-28T15:13:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-part-2-vulnerabilities-and-patches\/#webpage\"},\"wordCount\":1044,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-part-2-vulnerabilities-and-patches\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/computer-security.jpg\",\"keywords\":[\"Adobe\",\"Adobe Shockwave Player\",\"Heartbleed\",\"iOS\",\"iOS 7.1\",\"iOS 7.1.1\",\"iPhone\",\"iPhone 4\",\"Security Updates\",\"Shockwave\",\"Shockwave Player\",\"Vulnerability\"],\"articleSection\":[\"Security News\",\"Software &amp; Apps\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-part-2-vulnerabilities-and-patches\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\",\"name\":\"Joshua Long\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"caption\":\"Joshua Long\"},\"description\":\"Joshua Long (@theJoshMeister), formerly Intego\\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \\u2014\",\"sameAs\":[\"https:\/\/security.thejoshmeister.com\",\"https:\/\/www.facebook.com\/JoshLong\",\"https:\/\/www.instagram.com\/thejoshmeister\/\",\"https:\/\/www.linkedin.com\/in\/thejoshmeister\",\"https:\/\/www.pinterest.com\/thejoshmeister\/\",\"https:\/\/twitter.com\/theJoshMeister\",\"https:\/\/www.youtube.com\/@theJoshMeister\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"This article continues our Month in Review coverage. If you missed it, see also Part 1: Database Breaches, Compromised Passwords.When it comes to computer","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-part-2-vulnerabilities-and-patches\/","og_locale":"en_US","og_type":"article","og_title":"Month in Review, Part 2: Vulnerabilities and Patches - The Mac Security Blog","og_description":"This article continues our Month in Review coverage. If you missed it, see also Part 1: Database Breaches, Compromised Passwords.When it comes to computer","og_url":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-part-2-vulnerabilities-and-patches\/","og_site_name":"The Mac Security Blog","article_author":"https:\/\/www.facebook.com\/JoshLong","article_published_time":"2014-05-28T15:13:49+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/computer-security.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_creator":"@theJoshMeister","twitter_misc":{"Written by":"Joshua Long","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-part-2-vulnerabilities-and-patches\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/computer-security.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/computer-security.jpg","width":400,"height":260,"caption":"Computer Security on Paper background"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-part-2-vulnerabilities-and-patches\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-part-2-vulnerabilities-and-patches\/","name":"Month in Review, Part 2: Vulnerabilities and Patches - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-part-2-vulnerabilities-and-patches\/#primaryimage"},"datePublished":"2014-05-28T15:13:49+00:00","dateModified":"2014-05-28T15:13:49+00:00","description":"This article continues our Month in Review coverage. If you missed it, see also Part 1: Database Breaches, Compromised Passwords.When it comes to computer","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-part-2-vulnerabilities-and-patches\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/month-in-review-part-2-vulnerabilities-and-patches\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-part-2-vulnerabilities-and-patches\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Month in Review, Part 2: Vulnerabilities and Patches"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-part-2-vulnerabilities-and-patches\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-part-2-vulnerabilities-and-patches\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1"},"headline":"Month in Review, Part 2: Vulnerabilities and Patches","datePublished":"2014-05-28T15:13:49+00:00","dateModified":"2014-05-28T15:13:49+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-part-2-vulnerabilities-and-patches\/#webpage"},"wordCount":1044,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-part-2-vulnerabilities-and-patches\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/computer-security.jpg","keywords":["Adobe","Adobe Shockwave Player","Heartbleed","iOS","iOS 7.1","iOS 7.1.1","iPhone","iPhone 4","Security Updates","Shockwave","Shockwave Player","Vulnerability"],"articleSection":["Security News","Software &amp; Apps"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/month-in-review-part-2-vulnerabilities-and-patches\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1","name":"Joshua Long","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","caption":"Joshua Long"},"description":"Joshua Long (@theJoshMeister), formerly Intego\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \u2014","sameAs":["https:\/\/security.thejoshmeister.com","https:\/\/www.facebook.com\/JoshLong","https:\/\/www.instagram.com\/thejoshmeister\/","https:\/\/www.linkedin.com\/in\/thejoshmeister","https:\/\/www.pinterest.com\/thejoshmeister\/","https:\/\/twitter.com\/theJoshMeister","https:\/\/www.youtube.com\/@theJoshMeister"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/computer-security.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-6WL","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/26707"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=26707"}],"version-history":[{"count":56,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/26707\/revisions"}],"predecessor-version":[{"id":27202,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/26707\/revisions\/27202"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/27196"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=26707"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=26707"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=26707"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}