	{"id":97648,"date":"2023-04-07T14:43:07","date_gmt":"2023-04-07T21:43:07","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=97648"},"modified":"2023-04-10T14:48:21","modified_gmt":"2023-04-10T21:48:21","slug":"urgent-patches-macos-ventura-13-3-1-ios-ipados-16-4-1-safari-16-4-1-fix-2-actively-exploited-vulns","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/urgent-patches-macos-ventura-13-3-1-ios-ipados-16-4-1-safari-16-4-1-fix-2-actively-exploited-vulns\/","title":{"rendered":"Urgent Patches: macOS Ventura 13.3.1, iOS 16.4.1 fix 2 actively exploited vulns (UPDATED)"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-97208\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/02\/Apple-software-update-red-critical-urgent-600x300-1.png\" alt=\"\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/02\/Apple-software-update-red-critical-urgent-600x300-1.png 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/02\/Apple-software-update-red-critical-urgent-600x300-1-300x150.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/02\/Apple-software-update-red-critical-urgent-600x300-1-150x75.png 150w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>On Friday, April 7, Apple released emergency security updates for macOS Ventura, iOS 16 and iPadOS 16, and Safari to address two &#8220;actively exploited&#8221; (zero-day, in the wild) vulnerabilities.<\/p>\n<p>On Monday, April 10, Apple released additional patches for macOS Monterey, macOS Big Sur, iOS 15 and iPadOS 15 to address the same vulnerabilities.<\/p>\n<p>Let&#8217;s examine what we know about the two vulnerabilities that Apple mitigated.<\/p>\n<p><em>In this article:<\/em><\/p>\n<ul>\n<li><a href=\"#vent\">macOS Ventura 13.3.1, iOS 16.4.1, and iPadOS 16.4.1<\/a>\n<ul>\n<li><a href=\"#vent\">What was fixed in macOS Ventura 13.3.1 and iOS\/iPadOS 16.4.1?<\/a><\/li>\n<li><a href=\"#howupvent\">How to update to macOS Ventura 13.3.1<\/a><\/li>\n<li><a href=\"#howupi\">How to update to iOS 16.4.1 or iPadOS 16.4.1<\/a><\/li>\n<\/ul>\n<\/li>\n<li><a href=\"#saf\">Safari 16.4.1 for macOS Monterey and Big Sur<\/a><\/li>\n<li><a href=\"#mont\"><strong>NEW<\/strong> macOS Monterey 12.6.5 and macOS Big Sur 11.7.6<\/a><\/li>\n<li><a href=\"#15\"><strong>NEW<\/strong> iOS 15.7.5 and iPadOS 15.7.5<\/a><\/li>\n<li><a href=\"#keys\">Key takeaways<\/a><\/li>\n<li><a href=\"#learnmore\">How can I learn more?<\/a><a name=\"vent\"><\/a><\/li>\n<\/ul>\n<h3>macOS Ventura 13.3.1, iOS 16.4.1, and iPadOS 16.4.1<\/h3>\n<h4><strong>What was fixed in macOS Ventura 13.3.1 and iOS\/iPadOS 16.4.1?<\/strong><\/h4>\n<p>Two highly critical vulnerabilities were addressed in this update:<\/p>\n<blockquote><p><strong>IOSurfaceAccelerator<\/strong><\/p>\n<p>Impact: An app may be able to execute arbitrary code with kernel privileges. Apple is aware of a report that this issue may have been actively exploited.<\/p>\n<p>Description: An out-of-bounds write issue was addressed with improved input validation.<\/p>\n<p>CVE-2023-28206: Cl\u00e9ment Lecigne of Google&#8217;s Threat Analysis Group and Donncha \u00d3 Cearbhaill of Amnesty International\u2019s Security Lab<\/p>\n<p>&nbsp;<\/p>\n<p><strong>WebKit<\/strong><\/p>\n<p>Impact: Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.<\/p>\n<p>Description: A use after free issue was addressed with improved memory management.<\/p>\n<p>WebKit Bugzilla: 254797<br \/>\nCVE-2023-28205: Cl\u00e9ment Lecigne of Google&#8217;s Threat Analysis Group and Donncha \u00d3 Cearbhaill of Amnesty International\u2019s Security Lab<\/p><\/blockquote>\n<p>WebKit is the page-rendering engine used by Safari and other components of Apple operating systems. Third-party apps also use WebKit to render HTML content.<\/p>\n<p>There aren&#8217;t yet any additional details about the vulnerabilities on the MITRE or NIST databases, and there are no clear connections yet on the\u00a0<span style=\"font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, Oxygen-Sans, Ubuntu, Cantarell, 'Helvetica Neue', sans-serif;\">Google TAG<\/span><span style=\"font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, Oxygen-Sans, Ubuntu, Cantarell, 'Helvetica Neue', sans-serif;\">\u00a0<\/span><span style=\"font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, Oxygen-Sans, Ubuntu, Cantarell, 'Helvetica Neue', sans-serif;\">or<\/span><span style=\"font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, Oxygen-Sans, Ubuntu, Cantarell, 'Helvetica Neue', sans-serif;\">\u00a0<\/span><span style=\"font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, Oxygen-Sans, Ubuntu, Cantarell, 'Helvetica Neue', sans-serif;\">Amnesty International blogs, but more details might be forthcoming:<\/span><\/p>\n<ul>\n<li><a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-28205\" target=\"_blank\" rel=\"noopener\">MITRE: CVE-2023-28205<\/a> <strong>\u2022<\/strong> <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-28205\" target=\"_blank\" rel=\"noopener\">NIST: CVE-2023-28205<\/a><\/li>\n<li><a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-28206\" target=\"_blank\" rel=\"noopener\">MITRE: CVE-2023-28206<\/a> <strong>\u2022<\/strong> <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-28206\" target=\"_blank\" rel=\"noopener\">NIST: CVE-2023-28206<\/a><\/li>\n<li><a href=\"https:\/\/blog.google\/threat-analysis-group\/\" target=\"_blank\" rel=\"noopener\">Google TAG Blog<\/a> <strong>\u2022<\/strong>\u00a0<a href=\"https:\/\/www.amnesty.org\/en\/tech\/\" target=\"_blank\" rel=\"noopener\">Amnesty International Tech Blog<\/a><\/li>\n<\/ul>\n<p>Apple links to the details of the security patches included in\u00a0<a href=\"https:\/\/support.apple.com\/en-us\/HT213721\" target=\"_blank\" rel=\"noopener\">macOS Ventura 13.3.1<\/a>\u00a0and\u00a0<a href=\"https:\/\/support.apple.com\/en-us\/HT213720\" target=\"_blank\" rel=\"noopener\">iOS 16.4.1 and iPadOS 16.4.1<\/a>\u00a0on the\u00a0<a href=\"https:\/\/support.apple.com\/en-us\/HT201222\" target=\"_blank\" rel=\"noopener\">Apple security updates page<\/a>\u00a0on its site.<\/p>\n<p><span style=\"font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, Oxygen-Sans, Ubuntu, Cantarell, 'Helvetica Neue', sans-serif;\">As of early Friday there was no word yet on whether Ventura 13.3.1 had also fixed the <\/span><a style=\"font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, Oxygen-Sans, Ubuntu, Cantarell, 'Helvetica Neue', sans-serif;\" href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-macos-ventura-13-3-ios-16-4-and-more-with-security-updates\/#ventbug\" target=\"_blank\" rel=\"noopener\">bug that Apple reportedly introduced in 13.3<\/a><span style=\"font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, Oxygen-Sans, Ubuntu, Cantarell, 'Helvetica Neue', sans-serif;\"> that affects users whose Home folder is stored on an external drive. Users with this uncommon configuration have reported receiving the message, &#8220;You are unable to log into the user account &#8216;[username]&#8217; at this time. Logging into the account failed because an error occurred.&#8221; If you don&#8217;t have your Home directory on an external storage device, then you don&#8217;t need to worry about this bug; it&#8217;s important to install the latest macOS Ventura update to address the aforementioned critical security vulnerabilities.\u00a0<strong>UPDATE:<\/strong> Macworld later reported that this issue <a href=\"https:\/\/www.macworld.com\/article\/1683099\/macos-ventura-13-3-home-directory-bug-system-integrity-protection.html\" target=\"_blank\" rel=\"noopener\">was indeed fixed<\/a> in macOS Ventura 13.3.1.<\/span><\/p>\n<p>Early on Monday, April 10, security researcher Linus Henze\u00a0<a href=\"https:\/\/twitter.com\/LinusHenze\/status\/1645340348548300801\">released<\/a>\u00a0proof-of-concept code demonstrating how to exploit CVE-2023-28206. In part, this means that threat actors that had not already been aware of the vulnerability before Apple patched it, and had not yet reverse-engineered Apple&#8217;s Friday patches, can now more easily exploit the vulnerability on unpatched systems. Therefore, it&#8217;s even more urgent to install the updates, as there is an increased risk of more widespread exploitation in the wild.<a name=\"howupvent\"><\/a><\/p>\n<p>&nbsp;<\/p>\n<h4><strong>How to update to macOS Ventura 13.3.1<\/strong><\/h4>\n<p>Macs running macOS Ventura can get this update by going to <strong>System Settings<\/strong> &gt; <strong>General<\/strong> &gt; <strong>Software Update<\/strong>.<\/p>\n<p>If your Mac is still running macOS Mojave, Catalina, Big Sur, or Monterey, and your Mac is compatible with macOS Ventura, you can upgrade to macOS Ventura by going to <strong>System Preferences<\/strong> &gt; <strong>Software Update<\/strong>. If your Mac is running macOS High Sierra or older and is compatible with macOS Ventura, look for macOS Ventura in the Mac App Store and download it from there.<\/p>\n<p>For optimal security, <strong>we advise all Mac users to upgrade to macOS Ventura<\/strong> if your Mac supports it\u2014or you may even be able to <a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-keep-older-macs-secure-a-geeky-approach\/\">run macOS Ventura on an unsupported Mac<\/a>, at your own risk.<a name=\"howupi\"><\/a><\/p>\n<p>&nbsp;<\/p>\n<h4><strong>How to update to iOS 16.4.1 or iPadOS 16.4.1<\/strong><\/h4>\n<p>Some devices cannot be upgraded to version 16.x, due to <a href=\"https:\/\/www.intego.com\/mac-security-blog\/apples-planned-obsolescence\/\">Apple dropping support<\/a> for several iPhone and iPad models, as well as the final model of iPod touch. For those older devices, it&#8217;s best to <a href=\"#15\">update to 15.7.5<\/a> for now, and replace the devices with 16.x-compatible hardware as soon as possible for optimal security.<\/p>\n<p>If you have an iPhone or iPad that&#8217;s compatible with iOS 16 or iPadOS 16, the new 16.4.1 update can be obtained by going to <strong>Settings<\/strong> &gt; <strong>General<\/strong> &gt; <strong>Software Update<\/strong> on your device.<a name=\"saf\"><\/a><\/p>\n<h3>Safari 16.4.1 for macOS Monterey and Big Sur<\/h3>\n<p>A corresponding Safari 16.4.1 update for macOS Monterey and macOS Big Sur was also released.<\/p>\n<p>However, the Safari update only addresses one of the two vulnerabilities, namely CVE-2023-28205, the WebKit issue.<\/p>\n<p><s>It isn&#8217;t yet known whether or not<\/s> The other vulnerability, CVE-2023-28206, also affects macOS Monterey and Big Sur; <s>if so,<\/s> the two older Mac operating systems <s>may remain<\/s> remained vulnerable over the weekend. This was not an unprecedented occurrence; Apple frequently leaves previous macOS versions <a href=\"https:\/\/www.intego.com\/mac-security-blog\/apples-poor-patching-policies-potentially-make-users-security-and-privacy-precarious\/\">not fully patched<\/a>.\u00a0<strong>UPDATE:<\/strong> Apple released additional updates for macOS Monterey and Big Sur on Monday, April 10; <a href=\"#mont\">see below<\/a>.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Nice work, all! \ud83d\udc4f Can you please comment on whether CVE-2023-28206 also affects macOS Monterey or Big Sur (which were not patched today)?<\/p>\n<p>&mdash; Josh Long (the\u00a0JoshMeister) (@theJoshMeister) <a href=\"https:\/\/twitter.com\/theJoshMeister\/status\/1644421681770037248?ref_src=twsrc%5Etfw\">April 7, 2023<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p><s>If we get an answer to this question, we&#8217;ll be sure to update this article accordingly.<\/s>\u00a0<strong>UPDATE:<\/strong> <a href=\"#mont\">See below<\/a>.<\/p>\n<p>You can see the <a href=\"https:\/\/support.apple.com\/en-us\/HT213722\" target=\"_blank\" rel=\"noopener\">details of Safari 16.4.1<\/a> on Apple&#8217;s security updates page.<\/p>\n<p>The Safari update is available via <strong>System Preferences<\/strong> &gt;<strong> Software Update<\/strong> on applicable Macs. However, as mentioned earlier, it&#8217;s much safer to upgrade to macOS Ventura rather than to partially patch a previous macOS version.<a name=\"mont\"><\/a><\/p>\n<h3>macOS Monterey 12.6.5 and macOS Big Sur 11.7.6<\/h3>\n<p>On Monday, April 10, Apple released <a href=\"https:\/\/support.apple.com\/en-us\/HT213724\" target=\"_blank\" rel=\"noopener\">macOS Monterey 12.6.5<\/a> and <a href=\"https:\/\/support.apple.com\/en-us\/HT213725\" target=\"_blank\" rel=\"noopener\">macOS Big Sur 11.7.6<\/a> to address the second actively exploited vulnerability, CVE-2023-28206.<\/p>\n<p>Nevertheless, because Apple is no longer patching every security vulnerability that affects macOS Monterey or macOS Big Sur; Apple&#8217;s policy is that &#8220;not all known security issues are addressed in previous versions.&#8221; We advise users to upgrade to macOS Ventura if your Mac supports it. You may even be able to <a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-keep-older-macs-secure-a-geeky-approach\/\">upgrade an unsupported Mac to macOS Ventura<\/a>, at your own risk.<\/p>\n<p>You can get this update by going to <strong>System Preferences<\/strong> &gt; <strong>Software Update<\/strong>.<a name=\"15\"><\/a><\/p>\n<h3>iOS 15.7.5 and iPadOS 15.7.5<\/h3>\n<p>On Monday, April 10, Apple released iOS 15.7.5 and iPadOS 15.7.5 to address both of the aforementioned actively exploited vulnerabilities.<\/p>\n<p>Approximately\u00a0<a href=\"https:\/\/gs.statcounter.com\/ios-version-market-share\/mobile-tablet\/worldwide\" target=\"_blank\" rel=\"noopener\">18% of all iOS or iPadOS devices are currently running version 15.x<\/a>, according to the latest data from StatCounter. Many of those devices likely cannot be upgraded to version 16.x, due to\u00a0<a href=\"https:\/\/www.intego.com\/mac-security-blog\/apples-planned-obsolescence\/\">Apple dropping support<\/a>\u00a0for several iPhone and iPad models, as well as the final model of iPod touch.<\/p>\n<p>If your device is capable of running iOS\/iPadOS 16, be sure to upgrade to the latest version as soon as possible. Don&#8217;t stay behind on iOS\/iPadOS 15; they&#8217;re significantly less secure, and it&#8217;s important to upgrade quickly to avoid leaving yourself at risk.<\/p>\n<p>If, however, your device is stuck with iOS\/iPadOS 15 and you can&#8217;t yet upgrade to newer hardware that supports iOS\/iPadOS 16, you can at least mitigate some known vulnerabilities by updating to 15.7.5 over the air via <strong>Settings<\/strong> &gt; <strong>General<\/strong> &gt; <strong>Software Update<\/strong>.<a name=\"keys\"><\/a><\/p>\n<h3>Key takeaways<\/h3>\n<p>If you get nothing else out of this article, here are some key points:<\/p>\n<ul>\n<li>Apple has released urgent security updates over the past few days; <strong>check for and install updates on your Macs, iPhones, and iPads!<\/strong><\/li>\n<li>At this point, <strong>macOS Ventura, iOS 16, and iPadOS 16 are the only safe operating systems<\/strong> to use on Macs, iPhones, and iPads, respectively.\n<ul>\n<li>If you have a Mac for which Apple doesn&#8217;t officially support Ventura, <a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-keep-older-macs-secure-a-geeky-approach\/\">you may be able to upgrade it anyway<\/a>.<\/li>\n<li>If you have an older iPhone or iPad that isn&#8217;t compatible with 16.x, or any iPod touch, buying a new device is the safest option.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>It is advisable to update to the latest operating systems as soon as you reasonably can, especially when Apple warns that there are &#8220;actively exploited&#8221; vulnerabilities in the wild. It&#8217;s important to get the benefits of new security fixes as quickly as possible to help you stay protected from hackers and malware.<\/p>\n<p>If you have a Mac running macOS Monterey or Big Sur that&#8217;s compatible with Ventura, you may wish to update to the current Monterey or Big Sur version, and then as soon as practical, upgrade to macOS Ventura. <a href=\"https:\/\/www.intego.com\/mac-security-blog\/apples-poor-patching-policies-potentially-make-users-security-and-privacy-precarious\/\">Here&#8217;s why.<\/a> Generally speaking, it is best to upgrade to the latest Apple OS versions quickly for security reasons. For maximum security, one cannot rely on any minimal security patches Apple may release for previous OS versions.<\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"N6SJkDNeO7\"><p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/apples-poor-patching-policies-potentially-make-users-security-and-privacy-precarious\/\">Apple&#8217;s Poor Patching Policies Potentially Make Users&#8217; Security and Privacy Precarious<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Apple&#8217;s Poor Patching Policies Potentially Make Users&#8217; Security and Privacy Precarious&#8221; &#8212; The Mac Security Blog\" src=\"https:\/\/www.intego.com\/mac-security-blog\/apples-poor-patching-policies-potentially-make-users-security-and-privacy-precarious\/embed\/#?secret=N6SJkDNeO7\" data-secret=\"N6SJkDNeO7\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>Whenever you&#8217;re preparing to update iOS, iPadOS, or macOS, always back up your data before installing any updates. This gives you a restore point if something does not go as planned.<\/p>\n<p>See also our related article on <a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-verify-your-backups-are-working-properly\/\">how to check your macOS backups to ensure they work correctly<\/a>.<a name=\"learnmore\"><\/a><\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"qBAmmaURTb\"><p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-verify-your-backups-are-working-properly\/\">How to Verify Your Backups are Working Properly<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;How to Verify Your Backups are Working Properly&#8221; &#8212; The Mac Security Blog\" src=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-verify-your-backups-are-working-properly\/embed\/#?secret=qBAmmaURTb\" data-secret=\"qBAmmaURTb\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<h3>How can I learn more?<\/h3>\n<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/intego-podcast-artwork-400.jpg\" target=\"_blank\" rel=\"noopener noreferrer\"><img class=\"alignleft\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/intego-podcast-artwork-400.jpg\" alt=\"\" width=\"80\" \/><\/a>Each week on the <a href=\"https:\/\/podcast.intego.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Intego Mac Podcast<\/strong><\/a>, Intego&#8217;s Mac security experts discuss the latest Apple news, including security and privacy stories, and offer practical advice on getting the most out of your Apple devices. Be sure to <a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" rel=\"noopener\"><strong>follow the podcast<\/strong><\/a> to make sure you don\u2019t miss any episodes.<\/p>\n<p>You can also subscribe to our <a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-security-newsletter\/\"><strong>e-mail newsletter<\/strong><\/a> and keep an eye here on <a href=\"https:\/\/www.intego.com\/mac-security-blog\"><strong>The Mac Security Blog<\/strong><\/a> for the latest Apple security and privacy news. And don&#8217;t forget to follow Intego on your favorite social media channels: <a href=\"https:\/\/twitter.com\/IntegoSecurity\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Twitter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Twitter-logo-icon-64.png\" alt=\"Follow Intego on Twitter\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.facebook.com\/Intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Facebook\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Facebook-logo-icon-64.png\" alt=\"Follow Intego on Facebook\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.youtube.com\/user\/IntegoVideo?sub_confirmation=1\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on YouTube\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/YouTube-logo-icon-64.png\" alt=\"Follow Intego on YouTube\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.pinterest.com\/intego\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on Pinterest\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Pinterest-logo-icon-64.png\" alt=\"Follow Intego on Pinterest\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.linkedin.com\/company\/intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on LinkedIn\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/LinkedIn-logo-icon-64.png\" alt=\"Follow Intego on LinkedIn\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.instagram.com\/intego_security\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Instagram\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Instagram-logo-icon-64.png\" alt=\"Follow Intego on Instagram\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow the Intego Mac Podcast on Apple Podcasts\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile.png\" alt=\"Follow the Intego Mac Podcast on Apple Podcasts\" width=\"16\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>On April 7 and 10, Apple released emergency security updates to address two actively exploited (zero-day, in the wild) vulnerabilities in supported macOS, iOS, and iPadOS operating systems.<\/p>\n","protected":false},"author":14,"featured_media":97207,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[11],"tags":[69,4627,4645,3175,4589,4618,4643,115,201],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"On April 7 and 10, Apple released emergency security updates to address two actively exploited (zero-day, in the wild) vulnerabilities in supported macOS, iOS, and iPadOS operating systems.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/urgent-patches-macos-ventura-13-3-1-ios-ipados-16-4-1-safari-16-4-1-fix-2-actively-exploited-vulns\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Urgent Patches: macOS Ventura 13.3.1, iOS 16.4.1 fix 2 actively exploited vulns (UPDATED) - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"On April 7 and 10, Apple released emergency security updates to address two actively exploited (zero-day, in the wild) vulnerabilities in supported macOS, iOS, and iPadOS operating systems.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/urgent-patches-macos-ventura-13-3-1-ios-ipados-16-4-1-safari-16-4-1-fix-2-actively-exploited-vulns\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/JoshLong\" \/>\n<meta property=\"article:published_time\" content=\"2023-04-07T21:43:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-04-10T21:48:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/02\/Apple-software-update-red-critical-urgent-400x260-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@theJoshMeister\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Joshua Long\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/urgent-patches-macos-ventura-13-3-1-ios-ipados-16-4-1-safari-16-4-1-fix-2-actively-exploited-vulns\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/02\/Apple-software-update-red-critical-urgent-400x260-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/02\/Apple-software-update-red-critical-urgent-400x260-1.png\",\"width\":400,\"height\":260,\"caption\":\"Apple software update red critical urgent actively exploited zero-day vulnerability\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/urgent-patches-macos-ventura-13-3-1-ios-ipados-16-4-1-safari-16-4-1-fix-2-actively-exploited-vulns\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/urgent-patches-macos-ventura-13-3-1-ios-ipados-16-4-1-safari-16-4-1-fix-2-actively-exploited-vulns\/\",\"name\":\"Urgent Patches: macOS Ventura 13.3.1, iOS 16.4.1 fix 2 actively exploited vulns (UPDATED) - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/urgent-patches-macos-ventura-13-3-1-ios-ipados-16-4-1-safari-16-4-1-fix-2-actively-exploited-vulns\/#primaryimage\"},\"datePublished\":\"2023-04-07T21:43:07+00:00\",\"dateModified\":\"2023-04-10T21:48:21+00:00\",\"description\":\"On April 7 and 10, Apple released emergency security updates to address two actively exploited (zero-day, in the wild) vulnerabilities in supported macOS, iOS, and iPadOS operating systems.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/urgent-patches-macos-ventura-13-3-1-ios-ipados-16-4-1-safari-16-4-1-fix-2-actively-exploited-vulns\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/urgent-patches-macos-ventura-13-3-1-ios-ipados-16-4-1-safari-16-4-1-fix-2-actively-exploited-vulns\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/urgent-patches-macos-ventura-13-3-1-ios-ipados-16-4-1-safari-16-4-1-fix-2-actively-exploited-vulns\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Urgent Patches: macOS Ventura 13.3.1, iOS 16.4.1 fix 2 actively exploited vulns (UPDATED)\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/urgent-patches-macos-ventura-13-3-1-ios-ipados-16-4-1-safari-16-4-1-fix-2-actively-exploited-vulns\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/urgent-patches-macos-ventura-13-3-1-ios-ipados-16-4-1-safari-16-4-1-fix-2-actively-exploited-vulns\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\"},\"headline\":\"Urgent Patches: macOS Ventura 13.3.1, iOS 16.4.1 fix 2 actively exploited vulns (UPDATED)\",\"datePublished\":\"2023-04-07T21:43:07+00:00\",\"dateModified\":\"2023-04-10T21:48:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/urgent-patches-macos-ventura-13-3-1-ios-ipados-16-4-1-safari-16-4-1-fix-2-actively-exploited-vulns\/#webpage\"},\"wordCount\":1598,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/urgent-patches-macos-ventura-13-3-1-ios-ipados-16-4-1-safari-16-4-1-fix-2-actively-exploited-vulns\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/02\/Apple-software-update-red-critical-urgent-400x260-1.png\",\"keywords\":[\"iOS\",\"iOS 15\",\"iOS 16\",\"macOS\",\"macOS Big Sur\",\"macOS Monterey\",\"macOS Ventura\",\"Safari\",\"Security Updates\"],\"articleSection\":[\"Software &amp; Apps\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/urgent-patches-macos-ventura-13-3-1-ios-ipados-16-4-1-safari-16-4-1-fix-2-actively-exploited-vulns\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\",\"name\":\"Joshua Long\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"caption\":\"Joshua Long\"},\"description\":\"Joshua Long (@theJoshMeister), formerly Intego\\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \\u2014\",\"sameAs\":[\"https:\/\/security.thejoshmeister.com\",\"https:\/\/www.facebook.com\/JoshLong\",\"https:\/\/www.instagram.com\/thejoshmeister\/\",\"https:\/\/www.linkedin.com\/in\/thejoshmeister\",\"https:\/\/www.pinterest.com\/thejoshmeister\/\",\"https:\/\/twitter.com\/theJoshMeister\",\"https:\/\/www.youtube.com\/@theJoshMeister\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"On April 7 and 10, Apple released emergency security updates to address two actively exploited (zero-day, in the wild) vulnerabilities in supported macOS, iOS, and iPadOS operating systems.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/urgent-patches-macos-ventura-13-3-1-ios-ipados-16-4-1-safari-16-4-1-fix-2-actively-exploited-vulns\/","og_locale":"en_US","og_type":"article","og_title":"Urgent Patches: macOS Ventura 13.3.1, iOS 16.4.1 fix 2 actively exploited vulns (UPDATED) - The Mac Security Blog","og_description":"On April 7 and 10, Apple released emergency security updates to address two actively exploited (zero-day, in the wild) vulnerabilities in supported macOS, iOS, and iPadOS operating systems.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/urgent-patches-macos-ventura-13-3-1-ios-ipados-16-4-1-safari-16-4-1-fix-2-actively-exploited-vulns\/","og_site_name":"The Mac Security Blog","article_author":"https:\/\/www.facebook.com\/JoshLong","article_published_time":"2023-04-07T21:43:07+00:00","article_modified_time":"2023-04-10T21:48:21+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/02\/Apple-software-update-red-critical-urgent-400x260-1.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_creator":"@theJoshMeister","twitter_misc":{"Written by":"Joshua Long","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/urgent-patches-macos-ventura-13-3-1-ios-ipados-16-4-1-safari-16-4-1-fix-2-actively-exploited-vulns\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/02\/Apple-software-update-red-critical-urgent-400x260-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/02\/Apple-software-update-red-critical-urgent-400x260-1.png","width":400,"height":260,"caption":"Apple software update red critical urgent actively exploited zero-day vulnerability"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/urgent-patches-macos-ventura-13-3-1-ios-ipados-16-4-1-safari-16-4-1-fix-2-actively-exploited-vulns\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/urgent-patches-macos-ventura-13-3-1-ios-ipados-16-4-1-safari-16-4-1-fix-2-actively-exploited-vulns\/","name":"Urgent Patches: macOS Ventura 13.3.1, iOS 16.4.1 fix 2 actively exploited vulns (UPDATED) - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/urgent-patches-macos-ventura-13-3-1-ios-ipados-16-4-1-safari-16-4-1-fix-2-actively-exploited-vulns\/#primaryimage"},"datePublished":"2023-04-07T21:43:07+00:00","dateModified":"2023-04-10T21:48:21+00:00","description":"On April 7 and 10, Apple released emergency security updates to address two actively exploited (zero-day, in the wild) vulnerabilities in supported macOS, iOS, and iPadOS operating systems.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/urgent-patches-macos-ventura-13-3-1-ios-ipados-16-4-1-safari-16-4-1-fix-2-actively-exploited-vulns\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/urgent-patches-macos-ventura-13-3-1-ios-ipados-16-4-1-safari-16-4-1-fix-2-actively-exploited-vulns\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/urgent-patches-macos-ventura-13-3-1-ios-ipados-16-4-1-safari-16-4-1-fix-2-actively-exploited-vulns\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Urgent Patches: macOS Ventura 13.3.1, iOS 16.4.1 fix 2 actively exploited vulns (UPDATED)"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/urgent-patches-macos-ventura-13-3-1-ios-ipados-16-4-1-safari-16-4-1-fix-2-actively-exploited-vulns\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/urgent-patches-macos-ventura-13-3-1-ios-ipados-16-4-1-safari-16-4-1-fix-2-actively-exploited-vulns\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1"},"headline":"Urgent Patches: macOS Ventura 13.3.1, iOS 16.4.1 fix 2 actively exploited vulns (UPDATED)","datePublished":"2023-04-07T21:43:07+00:00","dateModified":"2023-04-10T21:48:21+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/urgent-patches-macos-ventura-13-3-1-ios-ipados-16-4-1-safari-16-4-1-fix-2-actively-exploited-vulns\/#webpage"},"wordCount":1598,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/urgent-patches-macos-ventura-13-3-1-ios-ipados-16-4-1-safari-16-4-1-fix-2-actively-exploited-vulns\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/02\/Apple-software-update-red-critical-urgent-400x260-1.png","keywords":["iOS","iOS 15","iOS 16","macOS","macOS Big Sur","macOS Monterey","macOS Ventura","Safari","Security Updates"],"articleSection":["Software &amp; Apps"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/urgent-patches-macos-ventura-13-3-1-ios-ipados-16-4-1-safari-16-4-1-fix-2-actively-exploited-vulns\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1","name":"Joshua Long","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","caption":"Joshua Long"},"description":"Joshua Long (@theJoshMeister), formerly Intego\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \u2014","sameAs":["https:\/\/security.thejoshmeister.com","https:\/\/www.facebook.com\/JoshLong","https:\/\/www.instagram.com\/thejoshmeister\/","https:\/\/www.linkedin.com\/in\/thejoshmeister","https:\/\/www.pinterest.com\/thejoshmeister\/","https:\/\/twitter.com\/theJoshMeister","https:\/\/www.youtube.com\/@theJoshMeister"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/02\/Apple-software-update-red-critical-urgent-400x260-1.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-poY","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/97648"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=97648"}],"version-history":[{"count":11,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/97648\/revisions"}],"predecessor-version":[{"id":97677,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/97648\/revisions\/97677"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/97207"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=97648"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=97648"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=97648"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}