Smart Device Manufacturers Effected by WikiLeaks’ Vault 7 Remark on Security Flaws

Standard

WikiLeaks published “Vault 7”, a collection of about 10,000 CIA documents created between 2014 and 2016, this past Tuesday. These documents contain the CIA’s collection on specific software vulnerabilities.

Tech companies such as, Apple, Microsoft and Samsung were specifically mentioned in the documents, in regard to, security holes the CIA uses to hack into their specific smart devices. For example, The CIA can use Samsung’s Smart TV to listen to people even when the TV appears to be off. All three of these companies have addressed the security flaws mentioned and state that they are “looking into” them.

Apple commented late Tuesday, “While our initial analysis indicates that many of the issues leaked today were already patched in the latest iOS, we will continue work to rapidly address any identified vulnerabilities.” They went on to say, “We always urge customers to download the latest iOS to make sure they have the most recent security updates.”

The Vault 7 leak has brought to light new criticism of the CIA and other intelligence agencies’ practice of discovering security flaws in popular hardware and software, and failing to disclose the flaws to the manufacturers. Both the CIA and Trump administration have denied any comment on the authenticity of these files.

Cybersecurity expert, Vinny Troia commented, “The CIA hiding the security holes in these devices from the manufacturers is frowned upon, but what I really find to be irresponsible is what Wikileaks did. In one breath, they are saying ‘look at all of this technology that the CIA has to spy and harm everyone’, and on the other hand they are saying ‘here it is. Enjoy!’ Just proves the importance of detecting security weaknesses within your own network before they can be used by cyber criminals.”

Advertisements

Apple versus the FBI

Standard

A recent, trending topic is the battle between Apple and the FBI over an iPhone recovered from the investigation of the San Bernardino massacre last December. The FBI asked Apple to help break into the phone and Apple refused. Then the FBI got a court order for Apple to create a forensics tool and Apple is in the midst of fighting the order.

As most people know, Apple is known for their guarantee of user privacy. The Feds are accusing the firm of selecting their “public brand marketing strategy” over a terrorism investigation. What a lot of people do not know is that creating this tool would be extremely dangerous because it would result in this hacking tool being made public, which means usable by any law enforcement, foreign governments and criminal organizations. This is the reason why Apple is fighting.

Visit St. Louis Cyber Forensics and Investigation Firm for any questions or in need of a free consultation.

 

Hacked Celebrity Photos-Discussion on ABC World News

Standard

Vinny Troia, Cyber Security Expert and CEO of Night Lion Security, a hacking investigation and digital forensics firm, discusses hacked celebrity photos with Rebecca Jarvis on ABC World News. Apple said that their system was not hacked but the celebrity’s user names, passwords and security questions were. This was a personal attack and Troia explained how these hackers could find most of the information on celebrity’s Wikipedia pages.

These hackers can find the latitude, longitude and altitude of where the photos were taken and are making a lot of money off of them. The only solution to these hacks is to create a unique password and to change it often.