Friday 1 December 2017
Apple releases security update for macOS High Sierra 10.13.1
Apple has just released a security update to its macOS High Sierra 10.13.1 operating system.
The update addresses a serious security vulnerability that, in certain circumstances, could enable an attacker to gain full access to your Mac and everything on it without a password.
Apple has advised that users of macOS Sierra 10.12.6 and earlier versions are not impacted by the vulnerability that the security update addresses.
Further information is provided by Apple at https://support.apple.com/en-us/HT208315, including links to advice about ‘How to update the software on your Mac’ and find your macOS version and build number.
Sierra macOS users can also configure their computer to ‘Install system data files and security updates automatically’. Information on how to do this is provided at https://support.apple.com/kb/PH25532?locale=en_US
Stay Smart Online recommends that you always turn on automatic security updates on your computing devices.
The information provided here is of a general nature. Everyone’s circumstances are different. If you require specific advice you should contact your local technical support provider.
Feedback
Thank you to those subscribers who have provided feedback to our Alerts and Newsletters. We are very interested in your feedback and where possible take on board your suggestions or requests.

Disclaimer
This information has been prepared by the Attorney General’s Department (‘the Department’). It was accurate and up to date at the time of publishing.
This information is general information only and is intended for use by private individuals and small to medium sized businesses. If you are concerned about a specific cyber security issue you should seek professional advice.
The Commonwealth and all other persons associated with this advisory accept no liability for any damage, loss or expense incurred as a result of the provision of this information, whether by way of negligence or otherwise.
Nothing in this information (including the listing of a person or organisation or links to other web sites) should be taken as an endorsement of a particular product or service.
Please note that third party views or recommendations included in this information do not reflect the views of the Commonwealth, or indicate its commitment to a particular course of action. The Commonwealth also cannot verify the accuracy of any third party material included in this information.