Just In
- 11 hrs ago Nothing Ear, Ear (a) With ANC, Up to 42.5 Hours of Battery Launched; Check Price and Availability
- 11 hrs ago Google Drive Gets Long-Awaited Dark Mode for Web - Here's How to Activate
- 12 hrs ago Vivo V30e Launch in India Teased 50 MP Sony IMX882 Camera, 5,500 mAh Battery Confirmed
- 13 hrs ago AMD Revamps Business Computing with AI-Fueled Ryzen PRO 8000 Series Processors
Don't Miss
- Finance 1:3 Bonus Share, Rs 13.25/Share Dividend: Buy Maharatna PSU, TP Rs 355, Fundraise Approved
- Lifestyle Kamada Ekadashi 2024 Wishes: Greetings, Messages, Texts, Images, Twitter Status And Instagram Captions
- Sports Who Won Yesterday's IPL Match 33? PBKS vs MI, IPL 2024 on April 17: Mumbai Indians Escape Last-Ditched Fight by Punjab Kings To Win
- Movies Do Aur Do Pyaar OTT Release Date & Platform: When & Where To Watch Vidya Balan’s Film After Theatrical Run?
- News BRS Chief K Chandrasekhar Rao Slams BJP, Says K Kavitha's Arrest Is Vendetta Politics
- Automobiles Aprilia RS 457 Accessories: A Detailed Look At The Prices
- Education Karnataka SSLC Result 2024 Soon, Know How to Check Through Website, SMS and Digilocker
- Travel Telangana's Waterfall: A Serene Escape Into Nature's Marvels
CIA hacked Apple Devices in ways users can't fix, says WikiLeaks
Your iPhones could be hacked!
New documents from WikiLeaks reveal that a CIA program hacks Apple's iPhones and Mac computers using techniques that can't be disabled by resetting the devices.
According to the security experts, although the exploits are feasible, they don't pose much threat to typical users. Many of the tricks such as the iPhone hack involving the 3G model from 2008, are older. Typically, the devices also needs to be accessed physically in these techniques, which the CIA would only do for targeted individuals, not a wider population.
WikiLeaks reveals that CIA can see your WhatsApp messages
"The most notable part of this latest WikiLeaks release is that it shows the CIA doing exactly what we pay them to - exploit specific targets with limited attacks to support our national interests," commented Rich Mogull, CEO of the security research firm Securosis.
As of now, Apple has not responded yet. While the CIA has not confirmed if the report is authentic, it has earlier said that it complies with a legal prohibition against electronic surveillance "targeting individuals here at home, including our fellow Americans."
The most recent disclosures consist of only 12 documents, all of which involve Apple products. The documents demonstrate the techniques used by CIA for rewriting device's firmware in a such a way that it would keep the hacker's access even after a phone or computer is reset.
The WikiLeaks had also published thousands of alleged CIA documents a couple of weeks back. It described the hacking tools the government allegedly use to break into computers, cell phones, and even smart TVs of companies such as Google, Apple, Microsoft and Samsung.
-
99,999
-
1,29,999
-
69,999
-
41,999
-
64,999
-
99,999
-
29,999
-
63,999
-
39,999
-
1,56,900
-
79,900
-
1,39,900
-
1,29,900
-
65,900
-
1,56,900
-
1,30,990
-
76,990
-
16,499
-
30,700
-
12,999
-
62,425
-
1,15,909
-
93,635
-
75,804
-
9,999
-
11,999
-
3,999
-
2,500
-
3,599
-
8,893