OS X Yosemite 10.10.1 is a 311-MB patch the addresses several connectivity issues with the company's latest desktop OS.

Version 10.10.1 enhances Wi-Fi stability, improves the reliability of connections to Microsoft's Exchange Server, and resolves problems with connecting to email service providers.

The update addresses problems that prevented users from remotely connecting to Back to My Mac and issues with block sharing, the Notification Center's widget and Actions.

It fixes the Notification Center's inability to retain settings after a restart, resolved hibernation issues on Mac Minis, fixed a problem with entering Japanese text, addressed the Mac App Store's update woes and patched a bug that could prevent Time Machine from showing up in backups.

While fixes for connectivity issues and general improvements headline Yosemite's 311-MB update, the package of patches also addresses enterprise issues and includes security enhancements.

Yosemite version 10.10.1 enables enterprise users to place searches with partially qualified domain names (PQDN), addresses that don't give a full address when performing a domain name system query. The update also seeks to address a problem that could keep the Mac App Store offering updates to Apple Remote Desktop when no new software is needed.

Users can use Software Update to check for Yosemite's latest update package and to install it, or click here to download and apply the patch manually. It's recommended that users back up their systems in Time Machine, Apple's built-in backup feature, before initiating the update.

The update to OS X Yosemite comes days after Apple stated why it hasn't closed a pathway into iOS 8 that leaves the mobile OS vulnerable to Masque attacks. FireEye, a software security firm, and Homeland Security have been warning users of the vulnerability and have even pointed to cases in which malware has leveraged the exploit, but Apple says it is unaware of such attacks.

"We designed OS X and iOS with built-in security safeguards to help protect customers and warn them before installing potentially malicious software. We're not aware of any customers that have actually been affected by this attack," an Apple representative said to Reuters.

Masque attacks take advantage of an iOS compromise Apple made to enable enterprise organizations to install software en masse on devices that use the mobile OS.

Because a digital certificate isn't need when installing apps outside of the App Store, hackers can bait iOS users into installing malware that mimics the appearance of legitimate software. FireEye and Homeland Security have urged iOS users to avoid installing apps outside of the App Store.

ⓒ 2024 TECHTIMES.com All rights reserved. Do not reproduce without permission.
Join the Discussion