Monday, July 23, 2018
Search
  
Submit your own News for
inclusion in our Site.
Click here...
Breaking News
Sony Releases 48-Megapixel Stacked CMOS Image Sensor for Smartphones
Samsung to Showcase Large QLED, microLED TVs Net Year
Google, Facebook, Microsoft, and Twitter Partner on New Data Project
Foxconn Breaks Ground in In Wisconsin Plant, Looks at AI and Beyond Apple
Western Digital and Toshiba Begin Sampling 96-layer QLC NAND
Cloud Services Keep Boosting Microsoft's Revenue
Comcast Won't Pursuit Fox assets, Focuses on Sky Offer
EU to Probe Qualcomm Over Pricing Case
Active Discussions
Which of these DVD media are the best, most durable?
How to back up a PS2 DL game
Copy a protected DVD?
roxio issues with xp pro
Help make DVDInfoPro better with dvdinfomantis!!!
menu making
Optiarc AD-7260S review
cdrw trouble
 Home > News > General Computing > CIA Use...
Last 7 Days News : SU MO TU WE TH FR SA All News

Thursday, March 23, 2017
CIA Used Sophisticated Hack Techniques To Apple Devices: WikiLeaks


New documents from WikiLeaks point to a CIA program to hack Apple's iPhones and Mac computers using techniques that users couldn't disable, even by resetting their devices.



The latest disclosures describe techniques for rewriting devices' firmware in ways that would maintain a hacker's access even if a user resets a phone or computer to factory settings. Doing so wipes out all apps and the operating system and installs a clean version; it is an extreme measure sometimes used to deal with technical problems, but is also the sort of step that someone suspicious of surveillance might take when getting a brand new phone.

A December 2008 document describes "NightSkies," a tool apparently designed to target the iPhone 3G; the document claims it can retrieve files such as contact lists and call logs and execute other commands. WikiLeaks suggested that the CIA has been infecting the iPhone supply chain of its targets since at least 2008.

However, the document describes only how to install the malware on a "factory fresh" version of the 3G - specifically, the iPhone 3G running the 2.1 version of Apple's operating system.

Other documents released describe similar exploits for Mac computers. One hides in the firmware of Apple's Thunderbolt-to-Ethernet adapter and requires someone to plug in that adapter to install the malware. Another targets a specific Mac model, the MacBook Air with the Leopard version of the Mac OS system - current at the time, but now seven generations old.

Obviously, the exploits pose little threat to typical users, as they involve old Apple devices models and the require physical access to devices.

Apple didn't respond to a request for comment.

Two weeks ago, WikiLeaks published thousands of alleged CIA documents describing hacking tools it said the government employed to break into computers, mobile phones and even smart TVs from companies like Apple, Google, Microsoft and Samsung.



Previous
Next
New Alcatel A30 and Moto G5 Plus Available On Amazon        All News        Samsung Adds 4G LTE Capability to Gear S3 Classic
Microsoft Delivers Telemetry-free Windows 10 To China     General Computing News      Micron's Revenue Increased Due To Strong Memory Chip Sales

Get RSS feed Easy Print E-Mail this Message

Related News
U.S. DoJ Indicts 12 Russian Intelligence Officers for Hacking Offenses Related to the 2016 Election
Adidas Servers Hacked, User Data Potentially Leaked
Hackers Breached Satellite, Defense Companies
U.S., UK Accuse Russia Of Backing Global Cyber Espionage Campaign
U.S. and UK Government Websites Carried Crypto-mining Malware: report
Hackers Attacked PyeongChang 2018 Winter Olympic Games
Intel Has to Deal With New Security Issue in Laptops
North Korea Behind attacks on Cryptocurrency Exchanges: report
Hackers Hit ATM Networks In U.S. and Russian Bank Breaches
Uber Paid Hackers to Keep Massive Data Breach Secret
Windows OS is Protected Against KRACK Wi-Fi Attacks
Deloitte Email Platform and Client Data Hacked

Most Popular News
 
Home | News | All News | Reviews | Articles | Guides | Download | Expert Area | Forum | Site Info
Site best viewed at 1024x768+ - CDRINFO.COM 1998-2018 - All rights reserved -
Privacy policy - Contact Us .