Wikileaks reveals How is CIA hacking you through your devices?

Wikileaks reveals How is CIA hacking you through your devices? Wikileaks reveals thousands of documents that describes the methods and software tools which CIA used to break into smartphones, cars, computers and even smart TVs. Wikileaks leak name is Vault 7: CIA Hacking Tools Revealed.

The latest WikiLeaks release appears to show the CIA and allied Intelligence community who had found ways to bypass encryption on messaging apps such as Whatsapp, Signal and Telegram.

Signal and Telegram said that it is not the promblem of app, It is the problem of OS. If they can hack OS then they can hack all kind of apps in the phone.

Wikileaks claim Infected phones can be instructed to send the CIA the user geolocation, audio and text communications as well as covertly activate the phone’s camera and microphone.

A CIA program code-named the Weeping Angel allegedly uses Samsung Smart TVs as covert listening devices.The television can act as a bug to record conversations in the room and then send them over to a covert CIA server.

Apple and Google declined to comment on Wikileaks claims and Samsung has not responded yet.

WikiLeaks founder Julian Assange said Thursday his organization will work with tech giants like Apple, Google and Samsung to dismantle those exploits before it releases more details on the CIA’s hacking program.

CIA reaction

Nobody is able to verify the authenticity of the documents and in a statement provided by CBS news, A CIA spokesman Jonathan Liu said, “We do not comment on the authenticity or content of purported intelligence documents.”

An expert who has reviewed this material provided by CBS said that it appears to be Legitimate to CBS news.

Read More >>  Yahoo Messenger Serious Security Bug

What do WikiLeaks?

Wikileaks has a track record of releasing top secret documents from Hilary Clinton campaign Sherman’s emails to classified Baghdad airstrike footage from 2007.

It is a website which reveals important document from anonymous sources.

What should you do?

Right now, The claims are unverified and the company is still investigating the vulnerabilities.

It is really hard for us to know What we can do to protect ourselves from these hacking tools but generally, it is always good to have your software updated to the most recent version of your OS.

(1 raters, 5 scores, average: 5.00 out of 5)
Wikileaks reveals How is CIA hacking you through your devices?

Featured Posts

Posted in News Tagged with: ,