Wikileaks Vault 7: Did you say anything about security?

Yesterday we mentioned about it Wikileaks Vault 7 the latest leaks revealing the CIA's hacking capabilities. One of the many remarkable things it can do is to bypass the encryption used by popular messaging apps such as WhatsApp and Signal.

So everyone who uses the applications WhatsApp, Signal, Telegram, Weibo, Confide ή Cloackman and believe their messages are encrypted will rather be disappointed as the leak indicates that the encryption layers they use can be circumvented by the techniques developed by the CIA.Wikileaks Vault 7

According to files released by Wikileaks, the CIA has dedicated malware-only teams that intend to take control of not only iPhone and Android but also many others.

These groups use zero-day found in operating systems, and are constantly developing malware that can be used to bypass any encryption layers, in messaging apps or others.

WikiLeaks reports that the CIA's hacking tools and malware were developed by the Engineering Development Group (EDG), a ανάπτυξης λογισμικού στο Center for Cyber Intelligence (CCI), το οποίο είναι ένα τμήμα που ανήκει στη Διεύθυνση για την Ψηφιακή Καινοτομία ή Directorate for Digital Innovation (DDI) και εδρεύει εντός της CIA.

EDG develops, tests and provides operational support for all backdoors, exploits, malware, trojans, viruses and any other type of malware created by the CIA and used in its covert operations.

Another part of the CIA is Mobile Devices Branch, which has developed many remote attack methods targeting popular smartphones.

So the CIA can have the user's geolocation, audio and text communications. The Secret Service can also covertly activate the phone's camera and microphone and generally use the device as a tool s.

The CIA is reported to have created special sections working to find ways to bypass Android and iOS security. The iOS branch has created malicious software that can infect, control, and extract data from iPhones, iPads, and more. Similarly, the Android section has been able to turn Android into zero-day spy devices that have either been deployed within the CIA or borrowed from the British GCHQ, the NSA or bought by zero day marketing companies.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).