Apple fixes FREAK Security Bug with latest iOS Update

Apple has fixed the FREAK security flaw in its iPhone’s and iPad’s with the release of iOS 8.2. A Security researcher team told the company that this flaw will allow hackers to interpret encrypted connections. The update was released on Monday in a media event took place in San Francisco.

Source : Apple

The flaw could allow an attacker to conduct man-in-the-middle attacks on common encrypted networks, including Secure Sockets Layer (SSL) and Transport Layer Security (TLS) connections.

Apple was the first company which fixes this bug in its products. The other major companies like Google and Microsoft are still working on the security patches to fix this bug. Their products are still not secure as we speak.

Apple Inc. said in an advisory note the flaw affects iPhone 4s handsets and later, iPod touch (5th generation) and later, and iPad 2 and later. Users who think they are affected by the bug can run a client checking tool, and should upgrade to iOS 8.2 sooner rather than later.

Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

Top 5 Techniques Hackers Use to hack Social Media Accounts

These days, Social Media have become a significant need in our everyday life. It encourages us to associate and connect with anyone over the...

5 Top Programming Languages for Hacking

We live in the 21st century, which is very fast-changing. This is a century of competition for information and computing resources. Every year the...

OSINT Tutorial to Track An Aircraft And Flight Information In Real-Time

No doubt Internet is said to be the world's largest repository of data and information. It contains an enormous amount of data related to...

Preventing SQL Injection in PHP Applications

SQL injection is one of the most common cybersecurity threats and as the name suggests, it is a form of injection attack. Injection attacks, on...