CERT mailing list archives

Apple Releases Security Update for macOS Mojave


From: "US-CERT" <US-CERT () ncas us-cert gov>
Date: Mon, 24 Sep 2018 16:31:28 -0500

U.S. Department of Homeland Security US-CERT

National Cyber Awareness System:



Apple Releases Security Update for macOS Mojave [ 
https://www.us-cert.gov/ncas/current-activity/2018/09/24/Apple-Releases-Security-Update-macOS-Mojave ] 09/24/2018 03:38 
PM EDT 
Original release date: September 24, 2018

Apple has released a security update to address multiple vulnerabilities in macOS Mojave 10.14. An attacker could 
exploit one of these vulnerabilities to take control of an affected system.

NCCIC encourages users and administrators to review Apple's security page for macOS Mojave 10.14 [ 
https://support.apple.com/en-us/HT209139 ] and apply the necessary update.

________________________________________________________________________

This product is provided subject to this Notification [ http://www.us-cert.gov/privacy/notification ] and this Privacy 
& Use [ http://www.us-cert.gov/privacy/ ] policy.

body { font-size: 1em; font-family: Arial, Verdana, sans-serif; font-weight: normal; font-style: normal; color: 
#333333; } ________________________________________________________________________

A copy of this publication is available at www.us-cert.gov [ https://www.us-cert.gov ]. If you need help or have 
questions, please send an email to info () us-cert gov. Do not reply to this message since this email was sent from a 
notification-only address that is not monitored. To ensure you receive future US-CERT products, please add US-CERT () 
ncas us-cert gov to your address book. 

OTHER RESOURCES: Contact Us [ http://www.us-cert.gov/contact-us/ ] | Security Publications [ 
http://www.us-cert.gov/security-publications ] | Alerts and Tips [ http://www.us-cert.gov/ncas ] | Related Resources [ 
http://www.us-cert.gov/related-resources ]  

STAY CONNECTED: Sign up for email updates [ http://public.govdelivery.com/accounts/USDHSUSCERT/subscriber/new ] 


Current thread: