What is the Apple vulnerability, what is the risk to the public, and how do you protect yourself from it?

What is the Apple vulnerability, what is the risk to the public, and how do you protect yourself from it?