Apple, Samsung and Microsoft React to Wikileaks’ CIA Data & Product Hacking Dump

 

MAKES ONE  ALMOST WANT TO GO BACK TO A ROTARY DIAL LAND LINE OR BETTER YET, TELEGRAPH AND A PHILCO BLACK & WHITE TV WITH RABBIT EARS ANTENNA…

In the wake of the latest Wikileaks dump, several of the tech firms whose products have been allegedly compromised by the CIA have given their first reactions to the claims. Companies like Apple looked quell worries from their users by issuing a statement to TechCrunch designed to alleviate concerns that the company’s products might still be vulnerable to a laundry list of CIA exploits. In short, Apple maintains that many of the iOS vulnerabilities the CIA previously relied upon have already been patched.

CIA Hacking

From Apple:

Apple’s statement was the most detailed, saying it had already addressed some of the vulnerabilities.

“The technology built into today’s iPhone represents the best data security available to consumers, and we’re constantly working to keep it that way,” it said.

“Our products and software are designed to quickly get security updates into the hands of our customers, with nearly 80% of users running the latest version of our operating system.

“While our initial analysis indicates that many of the issues leaked today were already patched in the latest iOS, we will continue work to rapidly address any identified vulnerabilities.

“We always urge customers to download the latest iOS to make sure they have the most recent security update.”

From Samsung:

Samsung – whose F8000 series of televisions was reportedly compromised via a USB connection-based hack co-developed with the UK’s MI5 agency – was briefer.

“Protecting consumers’ privacy and the security of our devices is a top priority at Samsung,” it said.

“We are aware of the report in question and are urgently looking into the matter.”

From Microsoft:

The leaks also claimed that the CIA had created malware to target PCs running Microsoft’s Windows operating system.

“We are aware of the report and are looking into it,” a spokesman from Microsoft said.

Google declined to comment about allegations that the CIA was able to “penetrate, infest and control” Android phones due to its discovery and acquisition of “zero day” bugs – previously unknown flaws in the operating system’s code.

From Linux:

Likewise, the Linux Foundation has yet to publicly react to claims the agency had created “attack and control systems” that could hijack computers powered by Linux-based software.

The World Wide Web Foundation – which campaigns for internet privacy – said the US government needed to issue a detailed response.



If you liked this post, you may also like these:

  • Third Data Dump: Wikileaks Releases Another 1,100 Emails From John Podesta
  • Move Over iPhone, the Launch of New Samsung Galaxy IV Rumored to Feature Eye Control Including ‘eye pause’ and ‘eye scroll’
  • WikiLeaks Publishes ‘Biggest Ever Leak of Secret CIA Documents’ & Exposes CIA Hacking Processes Through Smartphones & TV’s
  • Red, here is what you can get me for my Birthday!
  • Wikileaks Warned DNC Chairperson Donna Brazile and Vice Presidential Candidate Tim Kaine, #You’re Next!




  • Comments

    One Response to “Apple, Samsung and Microsoft React to Wikileaks’ CIA Data & Product Hacking Dump”

    1. A Texas Grandfather on March 8th, 2017 6:43 pm

      Rotary phones used a pulse code dialing system and had zero smarts in them. Wire taps could only be made at a switch or at field amplifier unit or at a pole mounted junction box.

      The android operating system just uses the core of Linux. All other parts of that system is code that applies to the operation of the phone chip and its I/O.

      One can feed a signal to a “smart” TV from a internet connection or via a computer with a USB port. Otherwise, the TV must receive the signal from a cable connection or wireless connect to a router in the home or other structure. If cable is the source of TV and the internet, it could be hacked.

      Cyber security is constantly in a state of change. Hackers find a way to compromise a device and the software and hardware people scramble to close the access point.
      __________________
      SM: Maybe we can use smoke signals ;)

      R

    Leave a Reply




    Support Scared Monkeys! make a donation.

     
     
    • NEWS (breaking news alerts or news tips)
    • Red (comments)
    • Dugga (technical issues)
    • Dana (radio show comments)
    • Klaasend (blog and forum issues)
     
     
     
     
     
     
     
    Close
    E-mail It