iOS 17.3 and macOS Sonoma 14.3 Patch WebKit Vulnerability That May Have Been Exploited
Apple today released iOS 17.3, iPadOS 17.3, tvOS 17.3, and macOS Sonoma 14.3, and it's a good idea to update as soon as possible to the new operating systems because the software patches an actively exploited vulnerability.

The updates fix a bug in WebKit that could allow maliciously crafted content to lead to arbitrary code execution. Apple says on its security support page that it is aware of a report that the issue may have been exploited.
Apple's software releases also address several other security vulnerabilities that were not known to have been used in the wild. iOS 17.3, for example, fixes bugs with the Neural Engine, kernel, Mail, Safari, Shortcuts, and more.
Details on all of the security fixes for each update can be found on Apple's security support site.
Popular Stories
Starting as early as next week, customers who sign up for an Apple Card at Apple's retail stores in the U.S. will receive $249 cash back when they purchase AirPods Pro 3, according to Bloomberg's Mark Gurman. The promotion has yet to be officially announced by Apple, so exact terms and conditions are not available at this time.
AirPods Pro 3 are priced at $249 in the U.S., so customers who...
Apple's CarPlay system for accessing iPhone apps on a vehicle's dashboard screen has received six popular apps in recent weeks: ChatGPT, Perplexity, Grok, Google Meet, WhatsApp, and the indie artist streaming platform Audiomack.
Make sure you have the latest version of each app and they will automatically appear on CarPlay.
ChatGPT
Starting with iOS 26.4, CarPlay supports voice-based...
According to the latest rumors, Apple is close to launching its next-generation iPad mini. So what should we expect from the successor to the iPad mini 7 that Apple released over a year ago? Read on to find out.
Processor and Performance
Apple is working on a next-generation version of the iPad mini (codename J510/J511) that features the A19 Pro chip, according to information found in code...