Microsoft and Apple patch FREAK bug – now you’ve got to update
Tech giants address the flaw that downgrades security of Android, iOS, Windows and OSX
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
You are now subscribed
Your newsletter sign-up was successful
Microsoft and Apple have moved to stem the bleeding caused by the FREAK vulnerability, releasing patches for the bug.
The tech giants are just two of the firms whose software FREAK has weakened, after the decade-old SSL vulnerability only came to light this month.
FREAK, an acronym for Factoring Attack on RSA-EXPORT Keys, was the US government's effort in the 1990s to downgrade encryption on exports during the 1990s.
It allows hackers to weaken software security from "strong RSA" to "export grade", according to Matthew Green, a research professor at Johns Hopkins University, one of the researchers who helped uncover the flaw.
Redmond admitted last week that all versions of Windows were susceptible to the bug, while it has also left Android and iOS devices at risk of hacking for a decade.
Now however, Apple and Microsoft have joined Google in patching the flaw.
Security researcher Graham Cluley wrote in a blog post: "Apple appears to have resolved the FREAK vulnerability for its users in a relatively short amount of time."
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Apple's Security Update 2015-002 protects the Mac's OSX operating system, while similar patches address the vulnerability in iOS and Apple TV, too.
Meanwhile, Microsoft has issued 14 security bulletins for this month's Patch Tuesday, one of which specifically addresses FREAK.
Alan Bentley, international senior vice president at IT security firm Heat Software, said: "Now that Apple and Microsoft have made fixes available, the onus is on organisations to address the vulnerability.
"Failure to apply the appropriate patch will mean organisations are knowingly leaving their back doors open and allowing hackers access to their personal and private data."
-
Mistral CEO Arthur Mensch thinks 50% of SaaS solutions could be supplanted by AINews Mensch’s comments come amidst rising concerns about the impact of AI on traditional software
-
Westcon-Comstor and UiPath forge closer ties in EU growth driveNews The duo have announced a new pan-European distribution deal to drive services-led AI automation growth
-
Millions of developers could be impacted by flaws in Visual Studio Code extensions – here's what you need to know and how to protect yourselfNews The VS Code vulnerabilities highlight broader IDE security risks, said OX Security
-
CVEs are set to top 50,000 this year, marking a record high – here’s how CISOs and security teams can prepare for a looming onslaughtNews While the CVE figures might be daunting, they won't all be relevant to your organization
-
Microsoft patches six zero-days targeting Windows, Word, and more – here’s what you need to knowNews Patch Tuesday update targets large number of vulnerabilities already being used by attackers
-
Experts welcome EU-led alternative to MITRE's vulnerability tracking schemeNews The EU-led framework will reduce reliance on US-based MITRE vulnerability reporting database
-
Veeam patches Backup & Replication vulnerabilities, urges users to updateNews The vulnerabilities affect Veeam Backup & Replication 13.0.1.180 and all earlier version 13 builds – but not previous versions.
-
Two Fortinet vulnerabilities are being exploited in the wild – patch nowNews Arctic Wolf and Rapid7 said security teams should act immediately to mitigate the Fortinet vulnerabilities
-
Everything you need to know about Google and Apple’s emergency zero-day patchesNews A serious zero-day bug was spotted in Chrome systems that impacts Apple users too, forcing both companies to issue emergency patches
-
Security experts claim the CVE Program isn’t up to scratch anymore — inaccurate scores and lengthy delays mean the system needs updatedNews CVE data is vital in combating emerging threats, yet inaccurate ratings and lengthy wait times are placing enterprises at risk