Over 40 security fixes for iPad, iPhone and iPod Touch in iOS 4.2

Filed Under: Apple, Malware, Mobile, Vulnerability

iPhone and iPad
Yesterday, Apple pushed out the much anticipated update to its mobile operating system - iOS 4.2.

Although most of the headlines have focused on new functionality Apple has introduced, such as bringing folders and multi-tasking to the iPad, there's a much more important reason why you should be considering updating your Apple iPhone, iPod Touch or iPad.


According to an Apple knowledgebase article, iOS 4.2 includes more than 40 security fixes designed to better protect iPhone, iPod Touch and iPad users.

It's critical that users of Apple's popular gadgets update their operating system as soon as possible. Fixes included in the iOS 4.2 update include patches for the web browser. Without these users could be at risk when they visit booby-trapped websites - code embedded on the website could cause iOS applications to crash, or even plant and run malicious code on the device.

In addition, iOS 4.2 fixes a flaw which made it possible for hackers to push malicious configuration files onto iPhones, iPads and iPod Touches, and a problem with the way Excel files can be imported that could lead to malicious code being executed.

Users of the iPhone, iPod Touch and iPad can receive their iOS 4.2 update via the normal route - downloading it as an update via iTunes.

, , , , ,

You might like

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

About the author

Graham Cluley runs his own award-winning computer security blog at https://grahamcluley.com, and is a veteran of the anti-virus industry having worked for a number of security companies since the early 1990s. Now an independent security analyst, he regularly makes media appearances and gives computer security presentations. Follow him on Twitter at @gcluley