Web lists-archives.com

Re: Vault 7: CIA Hacking Tools Revealed




On 3/8/2017 8:21 AM, WaltS48 wrote:
On 03/08/2017 07:36 AM, David B. wrote:
Today, Tuesday 7 March 2017, WikiLeaks begins its new series of leaks
on the U.S. Central Intelligence Agency. Code-named "Vault 7" by
WikiLeaks, it is the largest ever publication of confidential
documents on the agency.

The first full part of the series, "Year Zero", comprises 8,761
documents and files from an isolated, high-security network situated
inside the CIA's Center for Cyber Intelligence in Langley, Virgina. It
follows an introductory disclosure last month of CIA targeting French
political parties and candidates in the lead up to the 2012
presidential election.

Recently, the CIA lost control of the majority of its hacking arsenal
including malware, viruses, trojans, weaponized "zero day" exploits,
malware remote control systems and associated documentation. This
extraordinary collection, which amounts to more than several hundred
million lines of code, gives its possessor the entire hacking capacity
of the CIA. The archive appears to have been circulated among former
U.S. government hackers and contractors in an unauthorized manner, one
of whom has provided WikiLeaks with portions of the archive.

Read more .... MUCH more .... here:-

https://wikileaks.org/ciav7p1/


From
<http://money.cnn.com/2017/03/08/technology/wikileaks-cia-hacking-protect-smartphone-smart-tvs/index.html?iid=hp-toplead-dom>


The WikiLeaks publication serves as a reminder that anyone with a
smartphone or another device connected to the internet is vulnerable
to hacking.

Keeping devices up to date is the best way to avoid vulnerabilities --
that includes software and hardware updates.

And keep it in your possession. Most of the hacks I have read about require access to the phone (physical access) in order to load their software. On an iPhone, if you have the Touch ID, turn it on. That way the phone locks immediately, and loading software at the low level requires the password to activate it. With this kind of protection, actual hardware changes need to be made to load a hack.

_______________________________________________
general mailing list
general@xxxxxxxxxxxxxxxxx
https://lists.mozilla.org/listinfo/general