Microsoft is actually probably smiling on the inside about this one.
Probably - because they know that if they smiled publicly they would be massively criticised for their past security failings.
Microsoft is actually probably smiling on the inside about this one.
Proof that Apple is more secure than Android of Windows. This should shut those boys up.
Not by me at least, so it's a completely misdirected comment at me. (please don't quote, I can go back and read)![]()
But to say that "66% of the Internet" is affected is actually quite a bit of an exaggeration. It might well be 66% of the web sites using SSL, but even it was 100%, that still would not be "66% of the Internet."
You realize that Mac OS X is based off of linux as well... but they stuck to version OpenSSL 0.9.8y
Would we have encouraged Google to get their brag on after Apple's GotoFail? Both were bad SSL coding errors... One could argue that Apple was directly at fault for lack of code review in that case, whereas Heartbleed was shared by a great many companies.
And before too much bragging takes place, Apple only said that "key services" weren't affected. Meaning that non-key services likely were affected. Our definition of key might differ from theirs, but it doesn't look like Apple is going to be transparent...
To be clear... 66% of internet facing websites that are secured use OpenSSL.
Probably - because they know that if they smiled publicly they would be massively criticised for their past security failings.
Mashable website has compiled a list of of the biggest sites hit by Heartbleed. They are saying to change your password for these 15 sites asap. Check out all the sites they show as affected and not affected...it's a long long list.
IFTTT
Tumblr
Yahoo
Gmail
Amazon Web Services
Turbotax
Dropbox
OKCupid
Soundcloud
GoDaddy
Minecraft
What is odd is I saw another article earlier today that said, Amazon was not affected and also Google.
I don't think we will ever really know and I also read this has been happening for years.
I also just got an update for OS Chrome Version 34.0.1847.116. If you use Chrome check for your update now.
Wrong!Do you know why Apple services and products were not affected? Pure dumb luck.
Apple is just lazy - they keep their BSD subsystem ridiculously outdated:
Apple Inc. said:From:
https://developer.apple.com/library...eneralPurposeCrypto/GeneralPurposeCrypto.html
Although OpenSSL is commonly used in the open source community, OpenSSL does not provide a stable API from version to version. For this reason, although OS X provides OpenSSL libraries, the OpenSSL libraries in OS X are deprecated, and OpenSSL has never been provided as part of iOS. Use of the OS X OpenSSL libraries by apps is strongly discouraged.
From:
https://developer.apple.com/library...ationAPIs/SecureNetworkCommunicationAPIs.html
In addition to these APIs, a number of open source tools use OpenSSL for secure networking. If you use OpenSSL in your publicly shipping apps, you must provide your own copy of the OpenSSL libraries, preferably as part of your app bundle; the OpenSSL libraries that OS X provides are deprecated.
Apple does not use OpenSSL in OS X 10.7 and newer. They use their own GCD compatible library.The fact that you don't know what you're talking about is pretty hilarious, since Apple do use OpenSSL, but not the vulnerable version.
They made the switch with Lion correct? Immediately before then, Snow Leopard still included a 6 year old version of openssl.
The 1.x version of openssl was released 15 months prior to this. Had they updated during that 15 month period like everyone else did, we wouldn't be having this conversation.
Proof that Apple is more secure than Android of Windows. This should shut those boys up.
Do you know why Apple services and products were not affected? Pure dumb luck.
Apple is just lazy - they keep their BSD subsystem ridiculously outdated:
Although 0.9.8y was released earlier this year, it was a minor point release for a major version of SSL originally released in 2005.![]()
They do use openSSL, just not the versions impacted (1.0.1 through 1.0.1f ).
What is funny is people who have no clue commenting.
another win for ios & another loss for android![]()
Not really a win or a loss for any of them as the issue itself isn't something that is OS-specific in that way.another win for ios & another loss for android![]()
Wrong!
OpenSSL is a known entity that is constantly analyzed for security exploits.
A naked version number means nothing except to indicate where the code base started from. There's no way to know what patches, if any, have been separately applied from upstream versions as doing so doesn't bump the version. Apple and RedHat, among others, are good at doing things like this.
-bash-4.1# rpm -q --changelog openssl | grep CVE-2014-0160
- fix CVE-2014-0160 - information disclosure in TLS heartbeat extension
All open source. All "constantly analyzed for security exploits."
Just sayin'.
Only version 4.1.1 is affected
http://www.androidauthority.com/google-updates-its-services-to-stop-the-bleeding-366600/
Not really a win or a loss for any of them as the issue itself isn't something that is OS-specific in that way.
No, it didn't. You don't understand how software versioning and support works.
win for us ios users knowing we have one of the more secured os's out there
definitely can't say that about android, they come out the box with malware lol
Ohh! The irony of Apple complaining about openssl deprecating parts of their API too quickly. Apple are the kings of doing this kind of thing.
No. This vulnerability is primarily aimed at web servers, so its a website/service owner that'll determine whether or not they're vulnerable. Most updated shortly after the bug was found. You can attack clients with it, but it involves far more work, requires good timing, and requires additional information which attackers generally can't get.
Banks generally haven't used OpenSSL, Microsoft doesn't use OpenSSL, and its quite probable Google used their own SSL implementation for their servers. Same story with Apple.
With the exception of Yahoo, its generally smaller websites and services you have to worry about. The Verge, ArsTechnica, Anandtech, etc. Macrumors would probably be vulnerable, but SSL isn't used to begin with.