Apple Already Patched Bugs, Claim After CIA Documents Leaked by Wikileaks
In the official statement of Apple claims that all exploits already have patched after recent Wikileaks CIA leaked documents which is originating from CIA's Center of Cyber Intelligence (CCI).
Wikileaks released documents yesterday. Approx 14 iOS exploits mentioned in the documents, which works to remotely command on your iPhone and other devices.
U.S. Intelligence officials confirmed to BuzzFeed, that the documents they reviewed appear legitimate, and that they not only put current US cyber operations in danger, but provide a road map for adversaries around the world who want to study US methods and, one day, deploy those methods themselves.
In the statement Apple said,
Apple is deeply committed to safeguarding our customers' privacy and security. The technology built into today's iPhone represents the best data security available to consumers, and we're constantly working to keep it that way.
Our products and software are designed to quickly get security updates into the hands of our customers, with nearly 80 percent of users running the latest version of our operating system.
While our initial analysis indicates that many of the issues leaked today were already patched in the latest iOS, we will continue work to rapidly address any identified vulnerabilities. We always urge customers to download the latest iOS to make sure they have the most recent security updates.
These bugs are refer to as "Zero days". Currently Apple is working on more security updates.
According to leaked documents of Wikileaks, Android Mobiles, Microsoft Windows and Samsung Smart Tv's can be turned into Microphones. CIA also runs a very substantial effort to infect and control Microsoft Windows users with its malware. This includes multiple local and remote weaponized "zero days", air gap jumping viruses such as "Hammer Drill" which infects software distributed on CD/DVDs, infectors for removable media such as USBs, systems to hide data in images or in covert disk areas ( "Brutal Kangaroo") and to keep its malware infestations going.
0 comments:
Post a Comment
Note: only a member of this blog may post a comment.