Wikileaks: The CIA spies on you through your iPhone, your computer or your television

What has long been suspected seems to have been confirmed, of course, through Wikileaks. The well-known website has revealed a series of documents in which the details about a division of the company that worked specifically on creating malware of all kinds (viruses, Trojans, etc.) to infect mobile devices (iOS and Android), computers and even other technological devices such as televisions that occupy any of our room in order to spy on their targets. Yes, even the "supposedly invulnerable" iOS would be compromised according to these documents, with a team specially dedicated to this operating system, with the aim of getting zero-day vulnerabilities to directly attack the iPhone.

Why a team especially dedicated to the iPhone? Although their market share is much lower than that of Android, the fact that finding vulnerabilities that allow malware to be installed is more complicated than in Android makes them highly valued by personalities likely to be targets of the CIA. Large businessmen, politicians, diplomats ... choose the iPhone precisely because its system "prevents" this type of attack, but the reality is that the CIA would have found vulnerabilities to be able to use the iPhone's camera and microphone without its owner noticing. These vulnerabilities are unknown by security companies and by Apple itself, hence why they are called "zero-day."

But the fact that we have more and more devices connected to the internet means that other devices, until now unrelated to this type of attack, are also targets of the CIA and its hacker teams, like Samsung smart TVs. Directly mentioned by Wikileaks, some of which have a microphone and it is used to spy directly on their targets from their living room, comfortably seated without realizing that everything they say is being intercepted. Windows, Android ... no system is saved from these attacks according to Wikileaks.

But all this can get worse, because the most surprising and dangerous thing is that Wikileaks claims that Much of this malware created by the CIA is no longer controlled by the agency itself and would have passed into the hands of outside the CIA, including companies whose intentions are completely unknown.. It is precisely one of these unauthorized "hands" that would have leaked all this documentation to Wikileaks.


Follow us on Google News

A comment, leave yours

Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: AB Internet Networks 2008 SL
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.

  1.   iOS 5 Forever said

    Yes, they spy on me on TV, especially when I remove the power cable ...