CIA Articles

A look at the leaked CIA malware attacks on Apple software

  • 26/03/2017 at 23:32 by It's a Gadget Staff
  • News

Smartphone SpyWikileaks has once more released a series of documents that claim to show malware the CIA used to spy on owners of Apple products. And they are pretty hardcore.

The CIA’s Target: Macs

We have seen many examples of how the CIA, among other organizations, have used exploits to get backdoor access into people’s phones, computers, and other devices. But this is a new set of revelations, specifically targeting Mac computers using directly targeted malware installed by CIA operatives.

+Continue Reading

What you need to know about Wikileaks and CIA’s Hacking Program

  • 09/03/2017 at 01:09 by It's a Gadget Staff
  • News

Smartphone SpyWikileaks have released a new batch of classified documents, this time from the CIA. Per the documents, the CIA have a section like the NSA, but with less accountability and oversight.

The CIA’s Tools and Wikileak’s Vault 7

The new series of leaks is titled “Vault 7”, and the first load of documents released called “Year Zero”. The documents focus on a section in the CIA called the Center for Cyber Intelligence. The unit was tasked with creating and using an arsenal of hacking tools (Malware, viruses, Trojans, weaponized ‘zero day’ exploits) to perform a range of subversive and covert operations.

+Continue Reading

LulzSec Hackers are targeting CIA

LulzSec targets CIAThe hacker group LulzSec has attacked once again. This time it wasn’t Sony, but the very same CIA website. According to  a report by Reuters, this is the second time that the group hacks a government site. LulzSec made it public through their Twitter account that they were the ones responsible for the attack, and that they had the opportunity to even download information from the site.

On the other hand, the CIA announced that fortunately they have been a step ahead from LulzSec, and that so far they haven’t been able to get a hold of important information. The CIA has been able to block the group from the principal Senate network.

+Continue Reading