{"id":837,"date":"2011-03-24T13:18:57","date_gmt":"2011-03-24T13:18:57","guid":{"rendered":"https:\/\/blogs.swarthmore.edu\/its\/?p=837"},"modified":"2011-03-24T13:18:57","modified_gmt":"2011-03-24T13:18:57","slug":"apple-other-critical-software-updates","status":"publish","type":"post","link":"https:\/\/blogs.swarthmore.edu\/its\/2011\/03\/24\/apple-other-critical-software-updates\/","title":{"rendered":"Apple &#038; Other Critical Software Updates"},"content":{"rendered":"<p>Earlier in the week, Apple announced a number of security updates for multiple software products including Leopard, Snow Leopard, iOS, Safari, etc.\u00a0 Approximately <span style=\"text-decoration: underline;\">56 security vulnerabilities<\/span> were patched in OS X and 45 are considered <span style=\"text-decoration: underline;\">critical<\/span> since Apple states that they can provide &#8220;arbitrary code execution&#8221; (i.e., someone else running software on your Mac without your knowledge\/consent).<\/p>\n<p>Please take a moment to run &#8220;<strong>Software Update<\/strong>&#8221; on your Mac and install the available patches as soon as you can.<\/p>\n<p>In addition to Apple, Firefox and Adobe (Flash, Reader and Acrobat) also announced the availability of critical software patches.\u00a0 Firefox and Adobe Reader updates can be installed by clicking on Help and then &#8220;Check for Updates&#8230;&#8221;\u00a0 For Adobe Flash and Shockwave, the latest versions can be downloaded from the links below.<\/p>\n<p>Java also released important fixes recently and the latest version is currently Version 6 Update 24 (1.6.0_24).\u00a0 To check the version of Java you have installed (non-Mac), you can go to <a href=\"http:\/\/www.java.com\/en\/download\/installed.jsp\" target=\"_blank\">http:\/\/www.java.com\/en\/download\/installed.jsp<\/a><\/p>\n<p>More information on updating Java can be found in an earlier blog post at <a title=\"Freshen up your Java!\" href=\"https:\/\/blogs.swarthmore.edu\/its\/2010\/11\/12\/freshen-up-your-java\/\">https:\/\/blogs.swarthmore.edu\/its\/2010\/11\/12\/freshen-up-your-java\/<\/a><\/p>\n<p>&nbsp;<\/p>\n<p>Links to download the latest <a href=\"http:\/\/fpdownload.adobe.com\/get\/flashplayer\/current\/install_flash_player.exe\">Adobe Flash<\/a> and <a href=\"http:\/\/fpdownload.macromedia.com\/get\/shockwave\/default\/english\/win95nt\/latest\/Shockwave_Installer_Slim.exe\">Shockwave<\/a> applications.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Earlier in the week, Apple announced a number of security updates for multiple software products including Leopard, Snow Leopard, iOS, Safari, etc.\u00a0 Approximately 56 security vulnerabilities were patched in OS X and 45 are considered critical since Apple states that they can provide &#8220;arbitrary code execution&#8221; (i.e., someone else running software on your Mac without your knowledge\/consent). Please take a moment to run &#8220;Software Update&#8221; on your Mac and install the available patches as soon as you can. In addition to Apple, Firefox and Adobe (Flash, Reader and Acrobat) also announced the availability of critical software patches.\u00a0 Firefox and Adobe &hellip; <a href=\"https:\/\/blogs.swarthmore.edu\/its\/2011\/03\/24\/apple-other-critical-software-updates\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Apple &#038; Other Critical Software Updates<\/span><\/a><\/p>\n","protected":false},"author":41,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[96,97],"tags":[],"class_list":["post-837","post","type-post","status-publish","format-standard","hentry","category-security","category-software"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/ph2nPL-dv","_links":{"self":[{"href":"https:\/\/blogs.swarthmore.edu\/its\/wp-json\/wp\/v2\/posts\/837","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.swarthmore.edu\/its\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.swarthmore.edu\/its\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.swarthmore.edu\/its\/wp-json\/wp\/v2\/users\/41"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.swarthmore.edu\/its\/wp-json\/wp\/v2\/comments?post=837"}],"version-history":[{"count":10,"href":"https:\/\/blogs.swarthmore.edu\/its\/wp-json\/wp\/v2\/posts\/837\/revisions"}],"predecessor-version":[{"id":847,"href":"https:\/\/blogs.swarthmore.edu\/its\/wp-json\/wp\/v2\/posts\/837\/revisions\/847"}],"wp:attachment":[{"href":"https:\/\/blogs.swarthmore.edu\/its\/wp-json\/wp\/v2\/media?parent=837"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.swarthmore.edu\/its\/wp-json\/wp\/v2\/categories?post=837"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.swarthmore.edu\/its\/wp-json\/wp\/v2\/tags?post=837"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}