File - This file photo taken on August 13, 2008 shows the seal of the Central Intelligence Agency (CIA) in the lobby of CIA Headquarters in Langley, Virginia.
/ AFP / AFP FILES / SAUL LOEB
Your feedback is important to us!
We invite all our readers to share with us their views and comments about this article.
Disclaimer: Comments submitted by third parties on this site are the sole responsibility of the individual(s) whose content is submitted. The Daily Star accepts no responsibility for the content of comment(s), including, without limitation, any error, omission or inaccuracy therein. Please note that your email address will NOT appear on the site.
Alert: If you are facing problems with posting comments, please note that you must verify your email with Disqus prior to posting a comment. follow this link to make sure your account meets the requirements. (http://bit.ly/vDisqus)
WikiLeaks has published thousands of documents that the anti-secrecy organization said were classified files revealing scores of secrets about CIA hacking tools used to break into targeted computers, cellphones and even smart TVs.They also targeted devices that included Apple's iPhones and iPads, Google's Android cellphones, Cisco routers and Samsung Smart TVs.Some of the technology companies said they were evaluating the newly released documents.WikiLeaks said the material came from "an isolated, high-security network" inside the CIA's Center for Cyber Intelligence, which conducts cyber offense and defense.Security experts who reviewed the material said the documents appeared to be authentic.The files do not describe the prospective targets, but the documents show broad exchanges of tools and information between the CIA and National Security Agency and other federal intelligence agencies, as well as intelligence services of close allies Australia, Canada, New Zealand and the United Kingdom.Microsoft said it was looking into the reports that its operating systems were potentially vulnerable to many of the malware and other hacking tools described in the purported CIA documents.
FOLLOW THIS ARTICLE