What WikiLeaks’ CIA Hacking Dump Reveals About Your Privacy

WikiLeaks, the website that specializes in exposing secrets, released thousands of documents that described internal U.S. Central Intelligence Agency discussions on hacking techniques it used between 2013 and 2016 to circumvent security on electronic devices for spying.U.S. officials said on Wednesday that CIA contractors were the likely source of the leak. The following are some questions and answers users of consumer electronics may have:

How many of the vulnerabilities described in the Wikileaks document are still open to exploit by hackers or spies?

There is no definitive answer in the documents, which describe attack techniques but often do not give enough detail for even the device and software vendors to understand fully how their products were targeted and close the security holes. Software updates have solved many of the flaws but it is
unclear how many remain. In a chart of exploits for Apple’s (aapl, +0.33%) iPhone, the most recent version listed as hackable was iOS 9.2, which was released in late 2015.


What did we learn about the CIA's hacking program?

WikiLeaks published documents that it says describe CIA tools for hacking into devices including mobile phones, computers and smart televisions.
N/A by N/A is licensed under N/A N/A
Sign Up For Our Newsletter