WikiLeaks has released another set of documents from the CIA, revealing details of a project known as Brutal Kangaroo that targets closed Windows networks by jumping the air gap using thumb drives.
WikiLeaks has released documents from the CIA that show the spy agency was, for years, building and maintaining tools to hack into commonly used routers. The dump is part of the Vault 7 series that the whistle-blowing site began releasing on 7 March.
WikiLeaks has resumed its release of material from the Vault 7 dump after missing a week, with the overnight release of documents from the CIA's Pandemic project, a persistent implant for Microsoft Windows machines that share files with remote users in a local network.
ANALYSIS WikiLeaks appears to have gone missing, with what has become more or less a regular release from its Vault 7 CIA document dump not being made on 26 May.
WikiLeaks has released details about two malware frameworks which it says were designed by the CIA, as part of its Vault 7 document dump.
WikiLeaks has dumped another tool from what it says is an archive of CIA material it has called Vault 7 that came into its possession and which it commenced releasing on 7 March.
WikiLeaks has released the source code and documentation for what it says is software used by the CIA to track documents written in Microsoft Word.
Two of America's spy agencies, the CIA and the FBI, have launched a bid to try and discover who leaked a massive load of documents — which has been labelled Vault 7 and released in drips since 7 March — to WikiLeaks.
A guide for recording and exfiltrating audio data from Samsung F Series Smart Televisions has been released by WikiLeaks in the latest of its Vault 7 data dumps which it says came from the CIA.
Cyber security company Symantec has found spying and hacking tools and operational protocols detailed in the recent Vault 7 leak have been used in cyber attacks against at least 40 targets in 16 different countries by a group Symantec has dubbed Longhorn.
WikiLeaks has released a fourth document dump from its CIA stockpile, dubbed Vault 7, with 27 documents from the Grasshopper framework — a platform used to create customised malware for Windows — being put online overnight.
WikiLeaks has released a third tranche of documents from Vault 7, its CIA document dump, with 676 source code files for the organisation's Marble Framework being released overnight.
Apple says an alleged iPhone vulnerability released by WikiLeaks overnight on Thursday affected the iPhone 3G only and was fixed in 2009.
Some organisations such as the Mozilla Foundation have received information from WikiLeaks to tend to vulnerabilities in their products which were recorded in the CIA document dump known as Vault 7 that was made a fortnight ago.
Cisco has released details of a vulnerability in its IOS and IOS XE software that would allow remote exploitation of any one of 318 of its routers.
WikiLeaks publisher Julian Assange says the organisation will share unpublished data from its CIA document dump with technology companies to enable them to fix vulnerabilities that are detailed in the documents released.
Contractors working for the CIA are coming under suspicion as being the likely source of a massive document leak to WikiLeaks. Vault 7, as it has been called, resulted in more than 8500 documents being released on Tuesday US time.
A number of personal security products from numerous vendors are listed in the Vault 7 CIA document dump released by WikiLeaks on Tuesday US time, indicating that it may have cracks for all of them.
With the document dump dubbed Vault 7, WikiLeaks publisher Julian Assange has shown that he not only knows how to run an organisation that caters to whistleblowers worldwide, but that he is also a very clever political operative.
The CIA does not only depend on its in-house hackers to craft exploits for use in its spying activities. It also borrows code from malware that is in the wild, judging by the Vault 7 dump by WikiLeaks overnight.
Most cybersecurity is making up for weak platforms. We need to address the fundamentals, design platforms that prevent out-of-bounds access[…]
For most developers the security/performance trade off is still the hardest one to tackle, even as the cost of processing[…]
RISC has been overhyped. While it is an interesting low-level processor architecture, what the world needs is high-level system architectures,[…]
There are two flaws that are widespread in the industry here. The first is that any platform or language should[…]
Ajai Chowdhry, one of the founders and CEO of HCL is married to a cousin of a cousin of mine.[…]