Legal peril looms over companies hoping to acquire CIA intel from WikiLeaks
A cloud of legal uncertainty hangs over a cohort of private companies that hope to receive software vulnerability information from WikiLeaks, according to top national security lawyers.
WikiLeaks publishes MacBook, iPhone hacking toolkit supposedly used by CIA
WikiLeaks published Thursday a new batch of supposed CIA documents that reveal how the spy agency has hacked into Apple computers and smartphones over the last decade. The 12 newly released folders provide insight into some of the CIA’s methods and techniques, which evidently require physical access to compromise a target device in many cases. Cybersecurity researchers tell CyberScoop that the documents, some of which are marked as recent as 2013, generally prove that the CIA boasts a “robust” Mac attack toolkit.
Where’s Assange? Tech firms are still waiting to receive CIA documents from Wikileaks
A cohort of technology firms named in CIA documents that were leaked more than two weeks ago are still waiting to receive important software vulnerability information promised by WikiLeaks.
Leaked CIA documents show just how complicated computer warfare really is
According to WikiLeaks' dump, even elite hackers at the CIA have to depend on StackOverflow for answers.
Armies of pro-Trump Twitter bots are now promoting WikiLeaks’ CIA dump
The Twitter bots we saw during the presidential campaign have found a new topic to direct their focus on.
Some companies listed in CIA leak have yet to receive assistance from WikiLeaks
Microsoft has been contacted by WikiLeaks, while others — including Google — are waiting to hear from the group.