How many of the vulnerabilities described in the Wikileaks document are still open to exploit by hackers or spies?
There is no definitive answer in the documents, which describe attack techniques but often do not give enough detail for even the device and software vendors to understand fully how their products were targeted and close the security holes. Software updates have solved many of the flaws but it is
unclear how many remain. In a chart of exploits for Apple’s (aapl, +0.33%) iPhone, the most recent version listed as hackable was iOS 9.2, which was released in late 2015.
What did we learn about the CIA's hacking program?
WikiLeaks published documents that it says describe CIA tools for hacking into devices including mobile phones, computers and smart televisions.