The fact that software vendors have taken the WikiLeaks CIA Hacks seriously is even more evident as Apple has claimed that they were able to fix the purported hacking vulnerabilities disclosed by WikiLeaks in recent iPhones and Mac computers.
The documents released by the whistle-blowing portal pointed to an apparent CIA program designed to hack into devices using techniques that users couldn't possibly disable by resetting the device.
Apple said the Mac vulnerabilities were all fixed in all Macs launched after 2013, as many of the vulnerabilities were only present in older systems. While the iPhone hack, limited to the 3G model of 2008, was fixed with the release of the iPhone 3GS a year later
While experts has described the exploits in the WikiLeaks documents as plausible, but suggest they pose little threat to typical users today.
Besides, the techniques also typically require physical access to devices, something the CIA would use only for apprehended individual targets, not a broader population.
WikiLeaks has offered to share further details with tech vendors to help in fixing the flaws, albeit, accepting such information might subject companies to some conditions and likely put contracts at risk.
Apple iterated its resolve to take users' security and privacy seriously; stating that "they do not condone theft or coordinate with those that threaten to harm users."
The fact that software vendors have taken the WikiLeaks CIA Hacks seriously is even more evident as Apple has claimed that they were able to fix the purported hacking vulnerabilities disclosed by WikiLeaks in recent iPhones and Mac computers.
The documents released by the whistle-blowing portal pointed to an apparent CIA program designed to hack into devices using techniques that users couldn't possibly disable by resetting the device.
Apple said the Mac vulnerabilities were all fixed in all Macs launched after 2013, as many of the vulnerabilities were only present in older systems. While the iPhone hack, limited to the 3G model of 2008, was fixed with the release of the iPhone 3GS a year later
While experts has described the exploits in the WikiLeaks documents as plausible, but suggest they pose little threat to typical users today.
Besides, the techniques also typically require physical access to devices, something the CIA would use only for apprehended individual targets, not a broader population.
WikiLeaks has offered to share further details with tech vendors to help in fixing the flaws, albeit, accepting such information might subject companies to some conditions and likely put contracts at risk.
Apple iterated its resolve to take users' security and privacy seriously; stating that "they do not condone theft or coordinate with those that threaten to harm users."
The documents released by the whistle-blowing portal pointed to an apparent CIA program designed to hack into devices using techniques that users couldn't possibly disable by resetting the device.
Apple said the Mac vulnerabilities were all fixed in all Macs launched after 2013, as many of the vulnerabilities were only present in older systems. While the iPhone hack, limited to the 3G model of 2008, was fixed with the release of the iPhone 3GS a year later
While experts has described the exploits in the WikiLeaks documents as plausible, but suggest they pose little threat to typical users today.
Besides, the techniques also typically require physical access to devices, something the CIA would use only for apprehended individual targets, not a broader population.
WikiLeaks has offered to share further details with tech vendors to help in fixing the flaws, albeit, accepting such information might subject companies to some conditions and likely put contracts at risk.
Apple iterated its resolve to take users' security and privacy seriously; stating that "they do not condone theft or coordinate with those that threaten to harm users."