Hundreds of iOS apps exposed to FREAK vulnerability risk

Hundreds of iOS apps exposed to FREAK vulnerability risk

Citing a report from foreign media Ars Technica, security experts from FireEye recently discovered that thousands of iOS and Android applications are at potential risk of being attacked by the "FREAK" (Factoring RSA Export Keys) vulnerability. After further investigation of software on various platforms, security experts found that 771 of the 14,079 popular applications on the iOS platform are vulnerable to attacks, while on the Android platform, 1,288 applications with more than 1 million downloads are vulnerable to attacks.

According to researchers, these vulnerable applications all use the vulnerable keys generated by the affected encryption library to connect to the server, and many applications are still at risk of being attacked by FREAK today. FireEye security experts Yulong Zhang, Zhaofeng Chen, Hui Xue and Tao Wei said: "For example, using the FREAK attack to launch an attack on an online shopping application can steal customer login credentials and credit card information. Other vulnerable applications include multimedia applications, productivity applications and financial applications."

access:

Apple Online Store (China)

<<:  In-depth analysis of Android dynamic management fragment: "Do you know these components?"

>>:  Introduction to six recommended Android open source frameworks

Recommend

【Tencent Bugly Tips】WeChat Files

Everyone uses WeChat, but what kind of informatio...

Online drama competition: Will a Chinese version of "House of Cards" be born?

House of Cards, which appeared on the Internet fi...

Uncovering the 6 “new” languages ​​of brand marketing

Six major trends and three values ​​interpret the...

How much does it cost to rent an IDC computer room?

How much does it cost to rent an IDC computer roo...

How to effectively regulate the frequent chaos in the short video industry?

Recently, four short dramas produced by Mi Meng&#...

Ali Xianyu’s event promotion and marketing rules!

To organize a good event, you cannot rely on sudd...

Douyin recommendation review mechanism, see here!

The number of monthly active users of Douyin worl...

New media operations: 3 writing strategies used by big Vs! Don't ignore it!

Since 2013, every year, people would ask, “What i...

6 secrets to achieve explosive growth at low cost

Why should I spread your activity? Why should I b...

Fun fact: How did toast come about and why has it existed for so long?

In 2015, China's Tusi sites were included in ...