Wikileaks reveals How is CIA hacking you through your devices?

Wikileaks reveals How is CIA hacking you through your devices? WikiLeaks hack 1

Wikileaks reveals How is CIA hacking you through your devices? Wikileaks reveals thousands of documents that describes the methods and software tools which CIA used to break into smartphones, cars, computers and even smart TVs. Wikileaks leak name is Vault 7: CIA Hacking Tools Revealed.

The latest WikiLeaks release appears to show the CIA and allied Intelligence community who had found ways to bypass encryption on messaging apps such as Whatsapp, Signal and Telegram.

Signal and Telegram said that it is not the promblem of app, It is the problem of OS. If they can hack OS then they can hack all kind of apps in the phone.

Wikileaks claim Infected phones can be instructed to send the CIA the user geolocation, audio and text communications as well as covertly activate the phone’s camera and microphone.

A CIA program code-named the Weeping Angel allegedly uses Samsung Smart TVs as covert listening devices.The television can act as a bug to record conversations in the room and then send them over to a covert CIA server.

Apple and Google declined to comment on Wikileaks claims and Samsung has not responded yet.

WikiLeaks founder Julian Assange said Thursday his organization will work with tech giants like Apple, Google and Samsung to dismantle those exploits before it releases more details on the CIA’s hacking program.

CIA reaction

Nobody is able to verify the authenticity of the documents and in a statement provided by CBS news, A CIA spokesman Jonathan Liu said, “We do not comment on the authenticity or content of purported intelligence documents.”

Read More >>  Avast Mobile Security review 2015

An expert who has reviewed this material provided by CBS said that it appears to be Legitimate to CBS news.

What do WikiLeaks?

Wikileaks has a track record of releasing top secret documents from Hilary Clinton campaign Sherman’s emails to classified Baghdad airstrike footage from 2007.

It is a website which reveals important document from anonymous sources.

What should you do?

Right now, The claims are unverified and the company is still investigating the vulnerabilities.

It is really hard for us to know What we can do to protect ourselves from these hacking tools but generally, it is always good to have your software updated to the most recent version of your OS.

Editorial Staff

Editorial Staff

Hi! I am ready to secure your smartphone or pc. Let's review antivirus and antimalware software and apps.

You may also like...

What is the Most Secure Mobile OS: iOS, Android, Windows or BB?

Which is better: Sony Xperia ZX1, Xiaomi Mi6, HTC u11 or OnePlus 5t?

Which is better: Samsung Note 8, Galaxy S9 or Pixel 2 XL, iPhone X?

Do NOT follow this link or you will be banned from the site!