ALERT: Update Your iPhone, iPad, Apple Watch, and Mac NOW.

ALERT: Update Your iPhone, iPad, Apple Watch, and Mac NOW.

If you use almost any Apple products, you’ll want to check for and apply an update that will prevent your devices from being spied on. Apple has just issued an emergency software update for a critical vulnerability that was recently discovered.

The new updates were pushed out on Monday, September 13th, 2021, and include a major security fix for the Apple iPhone, Apple iPad, Apple Watch, and Apple Mac computers and laptops.

The vulnerability is a very serious one known as a “zero click remote exploit.” It allows invasive spyware to infect any of these devices without any sort of end-user action. Whereas the majority of malware requires the user to download something, click on a fraudulent link, join an unsecure network, or hand over a password, this new breed of malware can infect most Apple devices without a single click.

Security researchers have traced the spyware back to Israel’s NSO Group, a technology firm that develops remote surveillance spyware. The spyware, called Pegasus, can be deployed to any Apple iPhone, iPad, Apple Watch, or Mac without the user being aware of it, and can allow both governments or criminals to turn on your camera and microphone, record messages, texts, emails, and calls, even if you are using encrypted services. It’s essentially giving the cybercriminal full control over your device without you knowing it.

How to Check If You’ve Been Infected by the Pegasus Zero-Click Spyware

Here’s the worst part—you’ll never know if you have this on your phone or device. If the spyware is on your device, it’s virtually invisible to you. You won’t see the typical tell-tale signs of an infection, such as strange text messages, suspicious links, or any other notification. It’s simply there, possibly running at any given moment, recording what you are doing and sending everything to NSO Group and their clients.

If that’s not bad enough, security researchers believe that this spyware has been around since at least March of 2021, and with more than 1.65 billion Apple products on the market today… Let's just say we should all be taking this very seriously.

Update Your Apple Devices Right Now: Here’s How to Do It

Apple iPhone and iPad

Before you update, back up your device using iCloud or your computer.

  • Plug your device into power and make sure you are connected to the Internet with Wi-Fi.
  • Go to Settings > General, then tap Software Update.
  • Tap Install Now. If you see Download and Install instead, tap it to download the update, enter your passcode, then tap Install Now.

Apple macOS on a Mac Computer

  • Go to the Apple menu in the corner of your screen. Choose System Preferences.
  • Click Software Update.
  • Click Update Now or Upgrade Now.
  • Repeat this process in case further updates are available.

For more information, check out Apple’s Update documentation.

Apple Watch

Connect your Apple Watch to Wi-Fi. Ensure that your watch is at least 50% charged, or plug it in to power. You’ll want to make sure your iPhone is running the latest version of iOS.

  • On your iPhone, open the Watch app and tap My Watch.
  • Tap General > Software Update.
  • Download the update.
  • Wait for the progress wheel to appear on your Apple Watch. It could take several minutes to an hour for the update to finish.

For more information, check out Apple’s Watch Update Guide.

Update Your Apple Device NOW

We can’t stress this enough. This update is incredibly important to protect your privacy, as there is no telling if you actually already have this spyware on your Apple device. It’s likely that more news will come of this over the next few days, but for now, be sure to check for updates on your iPhone, iPad, Apple Watch, and Mac and make sure you are running the latest version.

If you have questions or need help, don’t hesitate to give White Mountain IT Services a call at 603-889-0800.

By accepting you will be accessing a service provided by a third-party external to

Related Posts

If you ever question why your business needs to take advantage of network security and all of its components, consider this fact: the average cost of data breaches, worldwide, has increased by 29 percent since 2013. Believe it or not, the average cos...
Sharing your Netflix password with a friend so they too can enjoy a vast catalogue of movies seems harmless enough. However, due to a recent ruling by judges of the Ninth Circuit of the United States Court of Appeals, this common action is now a fede...
Ransomware is such a popular method of attack used by hackers that new variants of it pop up every few months. Among these is Petya, a nasty new ransomware that masquerades as an unsolicited resume in an organization’s email inbox. Don’t be fooled, t...
Which database management system is running on your company’s server units? For end users, it’s not something that they put a whole lot of thought into. However, if you completely overlook your Microsoft SQL Server, you may end up running an expired ...
One of the most popular methods of online hacking attacks involves what’s called a brute force attack. This is when a hacker overwhelms a login system with multiple attempts until the hacker is able to log in and access the system. They are dangerous...
Accessibility and mobility are important parts of a business’s data infrastructure. To this end, some businesses take advantage of a Virtual Private Network (VPN), which has the power to extend a personal network over a private network like the Inter...
Smartphones may have been some of the first Internet-connected mobile devices, but they are still as vulnerable to attack as ever. This is especially true for those who forsake any sort of mobile device security policy. With modern businesses utilizi...
Today’s headlines are dominated by stories of major companies getting hacked, making the average computer user feel uneasy about their security. If you’re solely dependent on a measly password to protect you from hackers, then you’ve got good reason ...
The online world is a scary place. Viruses, malware, spyware, adware, and more are all out there trying to get at your network. These threats are almost always prevalent, but compared to each other, some are vastly superior and far more dangerous and...
It’s the nature of technology to grow more complex over time, and as it does, the types of threats grow alongside it. Security is now more important than ever before, and if your business is not prepared to handle the threats that lurk in the shadows...
Getting hacked is a scary occurrence. It’s a major reason why you have security measures put into place. You try to avoid it as much as you can, but getting outsmarted by hackers happens to the best of us. The good news is that as long as you approac...
One minute you’re browsing trusted sites on the Internet, the next, your PC freezes up and displays the dreaded blue screen of death, along with a fake tech support message. This strain of malware is duping plenty of computer users into calling the p...

Onsite Service Coverage Area

Although we provide remote services and support to businesses in over 20 states, onsite services are limited to within reasonable driving distance from our offices in NH.  We will manage a local vendor for locations outside of our service area to provide onsite assistance when needed.


Onsite Computer Support Services are available to businesses within 60 miles of Nashua New Hampshire. We have excellent onsite coverage from Concord NH, south through Manchester NH, and then down into Boston. From Northern and Central Mass, we cover from Worcester, east to the North Shore, including the Salem and Portsmouth NH area.


White Mountain IT Services

33 Main Street, Suite 302
Nashua, NH 03064


121 Riverfront Drive
Manchester, NH 03102


Open Positions