Wikileaks’ ‘Vault 7’ proves Big Brother and criminal hackers use the same tricks
The Vault 7 papers shed light on the CIA, its techniques, and its relationship with other agencies and the world of cybercrime. The revelations are troubling, but also offer insight into the serious problems facing security and privacy today. The post Wikileaks’ ‘Vault 7’ proves Big Brother and criminal hackers use the same tricks appeared first on Digital Trends....
Apple refutes the security vulnerabilities disclosed as part of WikiLeaks Vault 7 ‘Dark Matter’
A day after WikiLeaks published its second archive of the Central Intelligence Agency (CIA) files claiming the agency developed hacking devices for Apple products, the Cupertino-based tech company has refuted security vulnerabilities in its products. Wikileaks on Thursday released documents, originated with the CIA, which detailed methods for compromising Apple devices if an agent was able to gain physical access to the device, TechCrunch reported. “We have preliminarily assessed the Wikil...
WikiLeaks releases Vault 7 “Dark Matter” Apple malware, with Doctor Who inspired “Sonic Screwdriver”
The latest set of documents released under the WikiLeaks Vault 7 disclosures, is called “Dark Matter”. The Dark Matter release contains several CIA tools that infected Apple Mac firmware, that allowed CIA software to be persistently present on Apple hardware. The malware had the capability to survive on the compromised machines and continue to operate even after operating system re-installs. The Dark Matter tools were developed by the Embedded Development Branch (EDB) ...
Apple says recent Wikileaks CIA docs detail old, fixed iPhone and Mac exploits
 Apple says that its preliminary assessments of the Wikileaks documents released today indicate that the vulnerabilities it details for iPhone and Mac were fixed years ago. The documents, which originated with the CIA, detailed a variety of methods for compromising — breaking into — Apple devices if an agent was able to gain physical access to the device. The leaks were a part of… Read More ...
Wikileaks has hit some snags in its efforts to cooperate on fixing CIA hacks
It appears Wikileaks attached some conditions to its cooperation with companies affected by its Vault 7 cache of CIA hacks and meeting those conditions might be problematic for some of the companies involved. The post Wikileaks has hit some snags in its efforts to cooperate on fixing CIA hacks appeared first on Digital Trends....
WikiLeaks will give tech giants CIA zero-day exploits after they meet mystery demands
 WikiLeaks doesn’t ever make things easy. When it became clear that the organization possessed documents that detail exploits affecting a handful of major tech companies, it looked like Julian Assange would play nice. Now, a week has passed since Assange said he would disclose information about those vulnerabilities to the companies affected — standard practice for the discovery… Read More ...
WikiLeaks won’t publish zero-day exploit details until developers can fix them
WikiLeaks recently released a variety of malware, viruses, and remote control systems used by the CIA. The organization also has the details on a number of weaponized "zero-day" vulnerabilities, but it isn't releasing those right away. The post WikiLeaks won’t publish zero-day exploit details until developers can fix them appeared first on Digital Trends....
Wikileaks is willing to share CIA hacking tools with tech companies to help them patch flaws: Assange
Wikileaks will provide technology companies with exclusive access to CIA hacking tools that it possesses so they can patch software flaws, founder Julian Assange said on Thursday, presenting Silicon Valley with a potential dilemma on how to deal with the anti-secrecy group. If the offer is legitimate, it would place technology companies in the unusual position of relying on Assange, a man believed by some U.S. officials and lawmakers to be an untrustworthy pawn of Russian President Vladimir Puti...
Vault 7: China has urged Unites States to stop tapping and spying after latest CIA data leak
China on Thursday urged the US to stop tapping phones, monitoring, spying and launching cyber attacks on China and other countries, after WikiLeaks released what it called data on hacking carried out by the Central Intelligence Agency. Chinese Foreign Ministry spokesperson Geng Shuang said during a press conference that China is concerned about the situation and warned that Beijing will firmly safeguard its own cyber security, reported Efe news. China “is ready to enhance dialogue and coop...
Vault 7: China has urged Unites States to stop tapping and spying after latest CIA data leak
China on Thursday urged the US to stop tapping phones, monitoring, spying and launching cyber attacks on China and other countries, after WikiLeaks released what it called data on hacking carried out by the Central Intelligence Agency. Chinese Foreign Ministry spokesperson Geng Shuang said during a press conference that China is concerned about the situation and warned that Beijing will firmly safeguard its own cyber security, reported Efe news. China “is ready to enhance dialogue and coop...
Names and definitions of leaked CIA hacking tools
 The WikiLeaks-hosted “Vault7” collection of documents allegedly leaked from within the CIA’s Computer Operations Group is a messy mix of jargon, incomplete info, and broken links. It’s quite difficult to find a basic description of many of the terms used, even using the search function. So for your convenience I’ve gone through the whole pile of docs and listed… Read More ...
Vault 7: China has urged Unites States to stop tapping and spying after latest CIA data leak
China on Thursday urged the US to stop tapping phones, monitoring, spying and launching cyber attacks on China and other countries, after WikiLeaks released what it called data on hacking carried out by the Central Intelligence Agency. Chinese Foreign Ministry spokesperson Geng Shuang said during a press conference that China is concerned about the situation and warned that Beijing will firmly safeguard its own cyber security, reported Efe news. China “is ready to enhance dialogue and coop...
WikiLeaks’ Vault7 CIA dump prompts Apple reaction and more
Apple, Microsoft, and others in the tech industry have responded to Wikileaks’ claims of CIA hacking abilities, pushing back on fears of federal agents turning smartphones and TVs into spies. The leak-focussed group, which has prompted controversy in recent months for the role it played in the US presidential election, released a cache of data earlier this week that it … Continue reading...
Vault 7: Insights, motive, timing behind Wikileaks’ latest leak of CIA’s alleged hacking tools
Wikileaks released a data dump of what it is calling as the alleged Central Intelligence Agency (CIA) tools used for hacking into smart devices. The leak is code-named Vault 7 and comprises around 8761 documents, which have been sourced from an isolated high-security network inside CIA’s Centre for Cyber Intelligence. These documents that have been released primarily deal with techniques that are allegedly used by CIA for hacking and surveillance. These tools are used to break into sm...
Apple says most vulnerabilities in Wikileaks docs are already patched
 Wikileaks today published a trove of documents, allegedly taken from the CIA, that detail the government’s efforts to hack popular devices like iPhones, Android phones, and Samsung smart TVs. But Apple is pushing back against claims that the CIA’s hoarded vulnerabilities for its devices were effective. The documents, if they are indeed legitimate, include charts that detail iOS… Read More ...
Wikileaks releases trove of CIA documents codenamed ‘Vault7’
Today Wikileaks released a cache of data codenamed ‘Vault7,’ claiming this is the single largest drop of confidential CIA documents ever. There are a total of 8,761 documents and files within this trove, and they detail a hidden world within the agency, one that operates with a fleet of hackers who work to help turn everyday gadgets like smartphones and … Continue reading...
No, you shouldn’t delete Signal or other encrypted apps
 As alarm bells sound around the latest document dump from Wikileaks, misinformation can spread like wildfire. Journalists are just starting to pore over the files, but a number of security researchers and privacy advocates are hoping to quash the misconception that encrypted chat apps like Signal and WhatsApp have been compromised. A now corrected tweet by the New York Times seems to have set… Read More ...
WikiLeaks suggests questionable database of verified Twitter users
WikiLeaks, a website that once stood for the disclosure of private and secretive government documents but has since gone a bit crazy, has come up with the bizarre idea of creating an “online database” of verified Twitter users and their financial, occupational, and even personal information. The idea was proposed on Twitter, of course, by the WikiLeaks Task Force, an … Continue reading...
Intel report on hacking says Russian interference with US election was ‘boldest yet’
 Today the U.S. intelligence community released a report claiming that the Russian government was behind hacks of American political organizations during the 2016 election cycle and that the hackers acted with Russian President Vladimir Putin’s direct approval. The new report is a joint effort backed by the CIA, FBI, and NSA and draws on intelligence gathered by all three agencies. A… Read More ...
‘Stop taking down the U.S. internet,’ WikiLeaks implores its supporters
In a message sent out via Twitter (one of the many internet sites affected by the attack on Dyn), WikiLeaks implored its "supporters" to stop attacking the web at large. "Mr. Assange is still alive and WikiLeaks is still publishing." The post ‘Stop taking down the U.S. internet,’ WikiLeaks implores its supporters appeared first on Digital Trends....