Citing a report from foreign media Ars Technica, security experts from FireEye recently discovered that thousands of iOS and Android applications are at potential risk of being attacked by the "FREAK" (Factoring RSA Export Keys) vulnerability. After further investigation of software on various platforms, security experts found that 771 of the 14,079 popular applications on the iOS platform are vulnerable to attacks, while on the Android platform, 1,288 applications with more than 1 million downloads are vulnerable to attacks. According to researchers, these vulnerable applications all use the vulnerable keys generated by the affected encryption library to connect to the server, and many applications are still at risk of being attacked by FREAK today. FireEye security experts Yulong Zhang, Zhaofeng Chen, Hui Xue and Tao Wei said: "For example, using the FREAK attack to launch an attack on an online shopping application can steal customer login credentials and credit card information. Other vulnerable applications include multimedia applications, productivity applications and financial applications." access: Apple Online Store (China) |
<<: In-depth analysis of Android dynamic management fragment: "Do you know these components?"
>>: Introduction to six recommended Android open source frameworks
Nowadays, SEM promotions mostly revolve around mo...
What is the source of happiness? It must be carbo...
Being a qualified salesperson is definitely a tec...
Among the many traditional industries that have b...
According to iMedia Research data, the scale of C...
On August 21, the 2024 Volcano Engine AI Innovati...
A few days ago on October 15th, Google just relea...
On November 25, 2014, Kuaidi Dache, which was inv...
Produced by: Science Popularization China Produce...
We need to study not only human illusions, but al...
Compared with Toutiao ads, Baidu information flow...
As a marketing planner, planning promotion activi...
The antibody resistance of the new coronavirus va...
This translated article uses two methods to solve...