Rephrase and rearrange the whole content into a news article. I want you to respond only in language English. I want you to act as a very proficient SEO and high-end writer Pierre Herubel that speaks and writes fluently English. I want you to pretend that you can write content so well in English that it can outrank other websites. Make sure there is zero plagiarism.:
Security researchers at Trail Bits unveil a vulnerability in the graphic processor units of Apple iPhone 12 and M2 MacBook Air. Exploiting this flaw could grant attackers access to sensitive device data. Trail of Bits identifies the LeftoverLocals vulnerability, impacting graphic processor units from Apple, Qualcomm, and other manufacturers.
The exploit, if employed by a local attacker, could enable unauthorized access to data processed within the device’s chip. In a demonstration, researchers were able to read the results of an AI chatbot query, emphasizing the seriousness of the discovered vulnerability.
Apple Silicon Security Flaw Discovered in iPhone 12 and M2 MacBook Air https://t.co/Tdohlt2QNa pic.twitter.com/NITSyUIVOM
— MacRumors.com (@MacRumors) January 17, 2024
Although Apple has initiated measures to patch specific devices, the timeline and coverage for security updates addressing the issue across all affected models remain uncertain.
PSA: iPhone 12 and M2 MacBook Air vulnerable to LeftoverLocals flaw https://t.co/LmMMyeehVn pic.twitter.com/T2PF8tI7ph
— iThinkDifferent – Tech News and Guides (@iTDfeed) January 18, 2024
LeftoverLocals vulnerability necessitates physical access to the device, significantly reducing the likelihood of remote exploitation. Apple emphasizes the importance of users regularly updating their devices with the latest software to ensure the incorporation of essential security fixes.
Apple GPU security flaw confirmed in iPhone 12 and M2 MacBook Air pic.twitter.com/I7HiDyK33y
— Michael N. Nguyen (@MacMike1000) January 17, 2024
Should you worry?
Yes, but not as much. Even though this GPU exploit is quite easy for hackers to use, the main worry is whether it can be combined with other attacks. Since hackers need to be physically close to the device, regular users don’t need to be too worried

I have over 10 years of experience in the cryptocurrency industry and I have been on the list of the top authors on LinkedIn for the past 5 years. I have a wealth of knowledge to share with my readers, and my goal is to help them navigate the ever-changing world of cryptocurrencies.