{"id":37966,"date":"2015-03-03T21:13:55","date_gmt":"2015-03-04T05:13:55","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=37966"},"modified":"2017-01-06T15:45:05","modified_gmt":"2017-01-06T23:45:05","slug":"freak-openssl-bug-what-apple-users-need-to-know","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/freak-openssl-bug-what-apple-users-need-to-know\/","title":{"rendered":"FREAK OpenSSL Bug: What Apple Users Need to Know"},"content":{"rendered":"<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/freak-openssl-bug-what-apple-users-need-to-know\/techno-pirate-with-spyglass\/\" rel=\"attachment wp-att-37990\"><img loading=\"lazy\" class=\"aligncenter size-full wp-image-37990\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/03\/freak-openssl-flaw.jpg\" alt=\"FREAK OpenSSL bug\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/03\/freak-openssl-flaw.jpg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/03\/freak-openssl-flaw-150x75.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/03\/freak-openssl-flaw-300x150.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/a><\/p>\n<p>Security researchers have discovered a crippling\u00a0OpenSSL bug\u00a0in Apple and Google devices, as well as many high profile websites, which could allow \u201cman in the middle\u201d attacks. These attacks can occur when Apple users are on public Wi-Fi networks, where they can\u00a0be fooled into connecting to rogue servers claiming to belong\u00a0to someone else.<\/p>\n<p>The \u201cFREAK\u201d vulnerability (<a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-0204\" target=\"_blank\">CVE-2015-0204<\/a>), short for Factoring attack on RSA-EXPORT Keys, makes it possible for attackers to decrypt and monitor HTTPS-protected traffic.<\/p>\n<p>A FREAK attack is possible when someone with a vulnerable device\u2014Mac OS X computers, iOS and Android devices\u2014connects to an HTTPS-protected website configured to use an easily breakable key <a title=\"\u2018FREAK\u2019 flaw undermines security for Apple and Google users, researchers discover\" href=\"http:\/\/www.washingtonpost.com\/blogs\/the-switch\/wp\/2015\/03\/03\/freak-flaw-undermines-security-for-apple-and-google-users-researchers-discover\/\" target=\"_blank\">once thought to be dead<\/a>. It requires that the attacker be in a position where they can intercept packets between the endpoint device and the HTTPS-protected website.<\/p>\n<h3>How did we get here?<\/h3>\n<p>The flaw resulted from a former policy of the Clinton administration, which required weak 512-bit keys to be used in any software or hardware that was exported out of the United States. The U.S. government forbade the export of strong encryption in products shipped to customers in other countries.<\/p>\n<p>These restrictions were lifted in the late 1990s, but somehow the weaker encryption have managed to remain in widely used software and hardware around the world, including the United States, and went unnoticed by the public\u00a0until recently.<\/p>\n<h3>How to tell if a website is vulnerable<\/h3>\n<p>If you have a Mac OS X system, open Terminal and run this line of code:<\/p>\n<pre>openssl s_client -connect www.akamai.com:443 -cipher EXPORT<\/pre>\n<p>If it returns &#8220;alert handshake failure&#8221; in its answer, then the host site is safe.<\/p>\n<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/freak-openssl-bug-what-apple-users-need-to-know\/how-to-tell-if-website-vulnerable-to-freak-attack\/\" rel=\"attachment wp-att-37969\"><img loading=\"lazy\" class=\"aligncenter size-full wp-image-37969\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/03\/how-to-tell-if-website-vulnerable-to-freak-attack.png\" alt=\"how to tell if a web site is vulnerable to FREAK flaw\" width=\"541\" height=\"338\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/03\/how-to-tell-if-website-vulnerable-to-freak-attack.png 541w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/03\/how-to-tell-if-website-vulnerable-to-freak-attack-150x93.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/03\/how-to-tell-if-website-vulnerable-to-freak-attack-300x187.png 300w\" sizes=\"(max-width: 541px) 100vw, 541px\" \/><\/a><\/p>\n<p>To check if another site is safe, substitute &#8220;www.akamai.com&#8221; with another hostname.<\/p>\n<h3>How to tell if your browser is vulnerable<\/h3>\n<p>Type this web address directly into your browser address bar:<\/p>\n<p style=\"padding-left: 120px;\">https:\/\/freakattack.com<\/p>\n<p>On this page, you can see if your browser is vulnerable, and it has a list of every vulnerable website. At the time of writing this post, only Firefox is safe to use on Mac OS X (both Safari and Google Chrome are vulnerable).<\/p>\n<h3>Have hackers figured out how to exploit the FREAK flaw?<\/h3>\n<p>There is no published attack using this vulnerability, but that doesn\u2019t mean it&#8217;s not happening. Given the age of this vulnerability, someone has probably figured out how to exploit it, at least by the NSA. However, successful exploitation is not exactly easy to accomplish without physical access to the hotspot hardware.<\/p>\n<p>This means that attacks can be launched by anyone who has access to Internet traffic, which includes governments, Internet Service Providers (ISPs), coffee shops or airports, and any other locations offering Wi-Fi hotspots. A malicious hotspot owner could exploit the vulnerability, or someone spoofing the Starbucks hotspot from a nearby location. And a well-versed hacker could pull it off, but it\u2019s really not that simple.<\/p>\n<p><a title=\"\u201cFREAK\u201d flaw in Android and Apple devices cripples HTTPS crypto protection\" href=\"http:\/\/arstechnica.com\/security\/2015\/03\/freak-flaw-in-android-and-apple-devices-cripples-https-crypto-protection\/\" target=\"_blank\">Dan Goodin at Ars Technica<\/a>\u00a0described what can happen, and said:<\/p>\n<blockquote>[A]ttackers on a coffee-shop hotspot or other unsecured network can masquerade as the official website, a coup that allows them to read or even modify data as it passes between the site and the end user.<\/p><\/blockquote>\n<h3>How can the FREAK vulnerability be resolved?<\/h3>\n<p>Apple can patch this on the client side, and they no doubt will soon. Web server hosts can also patch this on the server side, which they no doubt are doing as well.<\/p>\n<p><strong>UPDATE: <a title=\"Apple Releases FREAK Fix for OS X, iOS and Apple TVs\" href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-freak-fix-for-os-x-ios-and-apple-tvs\/\" target=\"_blank\">Apple Releases FREAK Fix for OS X, iOS and Apple TVs<\/a><\/strong><\/p>\n<p>Intego is continuing to research this threat and will continue to provide updates as new information becomes available.<\/p>\n<h3>What can you do to stay protected?<\/h3>\n<p>To stay safe on Macs, use Firefox.<\/p>\n<p>On iOS devices, avoid using any public Internet access options (i.e. sitting in Starbucks or using free airport Wi-Fi) and doing things like banking and email. If you must use a public Wi-Fi hotspot, use a VPN (see\u00a0<a title=\"Cloak VPN for OS X and iOS review\" href=\"http:\/\/www.technologytell.com\/apple\/114385\/cloak-vpn-review\/\" target=\"_blank\">Cloak <\/a>as a\u00a0paid\u00a0option, or\u00a0<a title=\"Onavo Protect Keeps Your iPhone or iPad Safe and Secure\" href=\"http:\/\/lifehacker.com\/onavo-protect-keeps-your-iphone-or-ipad-safe-and-secure-486934809\" target=\"_blank\">Onavo Protect<\/a> as a free option), don&#8217;t send\u00a0personal or private information if you can avoid it, and never accept any software updates.<\/p>\n<div>\n<hr>\n<div>\n<p>Protect your Mac using\u00a0a multi-layered approach to security: Download\u00a0Intego\u2019s award-winning\u00a0<strong><a title=\"Complete Mac Protection and Security | Mac Premium Bundle X8\" href=\"https:\/\/www.intego.com\/mac-protection-bundle-x8\" target=\"_blank\">Mac Premium Bundle X8<\/a><\/strong>.<\/p>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Security researchers have discovered a crippling\u00a0OpenSSL bug\u00a0in Apple and Google devices, as well as many high profile websites, which could allow \u201cman in the middle\u201d attacks. These attacks can occur when Apple users are on public Wi-Fi networks, where they can\u00a0be fooled into connecting to rogue servers claiming to belong\u00a0to someone else. The \u201cFREAK\u201d vulnerability [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":38005,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[151,13,5],"tags":[3151,2020,2023,80,946,2026],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Security researchers have discovered a crippling\u00a0OpenSSL bug\u00a0in Apple and Google devices, as well as many high profile websites, which could allow \u201cman in\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/freak-openssl-bug-what-apple-users-need-to-know\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"FREAK OpenSSL Bug: What Apple Users Need to Know - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Security researchers have discovered a crippling\u00a0OpenSSL bug\u00a0in Apple and Google devices, as well as many high profile websites, which could allow \u201cman in\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/freak-openssl-bug-what-apple-users-need-to-know\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2015-03-04T05:13:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-01-06T23:45:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/03\/freak-bug-apple-users.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Derek Erwin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/freak-openssl-bug-what-apple-users-need-to-know\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/03\/freak-bug-apple-users.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/03\/freak-bug-apple-users.jpg\",\"width\":400,\"height\":260,\"caption\":\"FREAK bug Apple users\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/freak-openssl-bug-what-apple-users-need-to-know\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/freak-openssl-bug-what-apple-users-need-to-know\/\",\"name\":\"FREAK OpenSSL Bug: What Apple Users Need to Know - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/freak-openssl-bug-what-apple-users-need-to-know\/#primaryimage\"},\"datePublished\":\"2015-03-04T05:13:55+00:00\",\"dateModified\":\"2017-01-06T23:45:05+00:00\",\"description\":\"Security researchers have discovered a crippling\\u00a0OpenSSL bug\\u00a0in Apple and Google devices, as well as many high profile websites, which could allow \\u201cman in\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/freak-openssl-bug-what-apple-users-need-to-know\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/freak-openssl-bug-what-apple-users-need-to-know\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/freak-openssl-bug-what-apple-users-need-to-know\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"FREAK OpenSSL Bug: What Apple Users Need to Know\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/freak-openssl-bug-what-apple-users-need-to-know\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/freak-openssl-bug-what-apple-users-need-to-know\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\"},\"headline\":\"FREAK OpenSSL Bug: What Apple Users Need to Know\",\"datePublished\":\"2015-03-04T05:13:55+00:00\",\"dateModified\":\"2017-01-06T23:45:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/freak-openssl-bug-what-apple-users-need-to-know\/#webpage\"},\"wordCount\":702,\"commentCount\":6,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/freak-openssl-bug-what-apple-users-need-to-know\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/03\/freak-bug-apple-users.jpg\",\"keywords\":[\"Apple\",\"CVE-2015-0204\",\"FREAK\",\"Mac OS X\",\"OpenSSL\",\"TLS\/SSL\"],\"articleSection\":[\"Recommended\",\"Security &amp; Privacy\",\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/freak-openssl-bug-what-apple-users-need-to-know\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\",\"name\":\"Derek Erwin\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"caption\":\"Derek Erwin\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Security researchers have discovered a crippling\u00a0OpenSSL bug\u00a0in Apple and Google devices, as well as many high profile websites, which could allow \u201cman in","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/freak-openssl-bug-what-apple-users-need-to-know\/","og_locale":"en_US","og_type":"article","og_title":"FREAK OpenSSL Bug: What Apple Users Need to Know - The Mac Security Blog","og_description":"Security researchers have discovered a crippling\u00a0OpenSSL bug\u00a0in Apple and Google devices, as well as many high profile websites, which could allow \u201cman in","og_url":"https:\/\/www.intego.com\/mac-security-blog\/freak-openssl-bug-what-apple-users-need-to-know\/","og_site_name":"The Mac Security Blog","article_published_time":"2015-03-04T05:13:55+00:00","article_modified_time":"2017-01-06T23:45:05+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/03\/freak-bug-apple-users.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Derek Erwin","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/freak-openssl-bug-what-apple-users-need-to-know\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/03\/freak-bug-apple-users.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/03\/freak-bug-apple-users.jpg","width":400,"height":260,"caption":"FREAK bug Apple users"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/freak-openssl-bug-what-apple-users-need-to-know\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/freak-openssl-bug-what-apple-users-need-to-know\/","name":"FREAK OpenSSL Bug: What Apple Users Need to Know - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/freak-openssl-bug-what-apple-users-need-to-know\/#primaryimage"},"datePublished":"2015-03-04T05:13:55+00:00","dateModified":"2017-01-06T23:45:05+00:00","description":"Security researchers have discovered a crippling\u00a0OpenSSL bug\u00a0in Apple and Google devices, as well as many high profile websites, which could allow \u201cman in","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/freak-openssl-bug-what-apple-users-need-to-know\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/freak-openssl-bug-what-apple-users-need-to-know\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/freak-openssl-bug-what-apple-users-need-to-know\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"FREAK OpenSSL Bug: What Apple Users Need to Know"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/freak-openssl-bug-what-apple-users-need-to-know\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/freak-openssl-bug-what-apple-users-need-to-know\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812"},"headline":"FREAK OpenSSL Bug: What Apple Users Need to Know","datePublished":"2015-03-04T05:13:55+00:00","dateModified":"2017-01-06T23:45:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/freak-openssl-bug-what-apple-users-need-to-know\/#webpage"},"wordCount":702,"commentCount":6,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/freak-openssl-bug-what-apple-users-need-to-know\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/03\/freak-bug-apple-users.jpg","keywords":["Apple","CVE-2015-0204","FREAK","Mac OS X","OpenSSL","TLS\/SSL"],"articleSection":["Recommended","Security &amp; Privacy","Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/freak-openssl-bug-what-apple-users-need-to-know\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812","name":"Derek Erwin","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","caption":"Derek Erwin"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/03\/freak-bug-apple-users.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-9Sm","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/37966"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=37966"}],"version-history":[{"count":21,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/37966\/revisions"}],"predecessor-version":[{"id":61003,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/37966\/revisions\/61003"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/38005"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=37966"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=37966"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=37966"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}