CIA Dump does not Threaten Updated iPhones
WikLeaks discarded thousands of documents on Tuesday detailing the techniques and hacking tools used by the Central Intelligence Agency for foreign spying, in what seems to be the biggest leak of CIA documents in history.
Businessinsider.in posted on March 9th, 2017, stating that the documents, which experts usually believe to be genuine, describe the development of malware, Trojans, viruses, weaponized "zero day" exploits and other tools by the Center of Cyber Intelligence of the agency to hack devices such as Android phones, Samsung "smart" TVs and iPhones.
The CIA lost control of bulk of its hacking arsenal which includes viruses, malware, Trojans, malware remote control systems, weaponized "zero day" exploits and associated documentation. This unusual collection, which amounts to over several hundred million lines of code, gives its carrier the entire hacking capacity of CIA. The archive seems to have been distributed among former hackers and contractors of U.S. government in an illegal manner, one of whom has provided portion of the archive to WikLeaks.
"Year zero" introduces possibility and direction of the global secret hacking program of CIA, its malware arsenal and dozens of "zero day" weaponized exploits against a large range of European and U.S. company products including Google's Android, Apple"s iPhone and Microsoft's Windows and even Samsung TVs which are turned into secret microphones.
The CIA installs malicious software to collect information about particular individual; the documents provide the first detailed sight into the hacking capabilities of the agency. That unwanted spotlight on U.S. spycraft could give an edge to enemies and raise fresh troubles for both President Trump and a digital-spying community which has been damaged by repeated leaks this decade. Most worrying is that whether more disclosures might divulge an agency that's crossed its boundaries.
Matt Suiche, a popular hacker who founded cybersecurity start-up Comae Technologies, said that the data confirm CIA maintains "an extensive database of cyberweapons. The material of WikLeaks contains lists of software tools which C.I.A. uses to produce exploits and malware to carry out hacking.
Cyber war takes several forms, not just the destruction and damage of physical objects connected to the internet. When Russians play cyber war, it can destruct and damage truth and trust.
» SPAMfighter News - 3/13/2017
We are happy to see you are reading our IT Security News.
We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!