WikiLeaks – PSafe Blog https://www.psafe.com/en/blog Articles and news about Mobile Security, Android, Apps, Social Media and Technology in general. Thu, 19 Jan 2023 14:49:21 +0000 en-US hourly 1 https://wordpress.org/?v=6.5.3 https://www.psafe.com/en/blog/wp-content/uploads/2018/05/cropped-psafe_blog_purple-shield-32x32.png WikiLeaks – PSafe Blog https://www.psafe.com/en/blog 32 32 <![CDATA[The Everyday Devices Targeted By the CIA]]> https://www.psafe.com/en/blog/everyday-devices-targeted-cia/ Wed, 03 May 2017 14:00:16 +0000 https://www.psafe.com/en/blog/?p=10686 WikiLeaks recently revealed how the CIA has a number of tools that can allow them to hack into smartphones and smart devices, such as Internet of Things devices. A former NSA employee tweeted that this leak of the CIA’s hacking tools for smart devices could fall into the wrong hands. He said that the “security hole[s] [that] the CIA left open” could be used to break into any smartphone in the world. So, what can you do to help protect your smartphone? One way is to use Anti-Hacking to block malicious websites as you browse the web:

activate-safe-navigation
If you land on a web page that is trying to steal your information, Anti-Hacking will notify you that the website is unsafe and that you should not enter any personal information on the website. Doing so could lead to a phishing scam or your login credentials being stolen. If you’ve ever lost a cell phone, then you know how it feels to think that someone else could be scrolling through your photos and your private texts. Think about all of the personal information someone could find — and steal — from your devices. The following are some of the devices that have been targeted by the CIA.

Read More: How to Protect Yourself from Social Engineering Attacks

Smart TVs

You may not want to have any private conversations in any room with your Samsung TV. Weeping Angel is one attack utilized by the CIA that can target a Samsung F8000 TV. It makes the TV look as though it is off, but it is in fact able to monitor a conversation. They call it “fake off.”

The public was unaware of this “remote bug” until the WikiLeaks documents were released. Reports believe one version of the malware was eliminated with a patch. However, this specific type of malware has not been used on U.S. citizens. Further, it must be manually installed onto a smart TV by using a flash drive.

Smartphones and Tablets

Both Apple and Android smartphones and tablets were targeted. According to WikiLeaks, the CIA could collect audio or messages from smartphones and tablets through apps like WhatsApp, Signal, and Telegram by intercepting the information before it’s been encrypted.

Laptops and PCs

The CIA also specifically targeted Microsoft’s Windows operating system. They gained access to a system by spreading malware through CDs and flash drives.

WikiLeaks revealed that the CIA didn’t inform tech companies like Google and Microsoft of security vulnerabilities in various devices in order to continue with their experimentation and probes. Their failure to privately disclose crucial vulnerabilities allowed citizens’ devices to remain less secure.

Since the leaks, the tech companies have been looking into the vulnerabilities in order to fix any issues. But don’t just count on tech companies to keep your information secure, remember to install the necessary protection like DFNDR’s Anti-Hacking. Stay aware of developments through reliable news sources as well — keeping informed gives you control over your personal data.

]]>
<![CDATA[The Facts: Which Countries are Hacking US Servers?]]> https://www.psafe.com/en/blog/facts-countries-hacking-us-servers/ Fri, 11 Nov 2016 23:30:34 +0000 https://www.psafe.com/en/blog/?p=5741 This election season has been a roller coaster ride for both parties. From emails to hacking, this election has been cyber-heavy. However, in the midst of all of the political rhetoric and bombast, it can be hard to decipher the true facts. Thus, information on American hacking this election has been opaque. Here are some of the countries who have hacking ties to the United States.

Russia

There have been ties to Russia attempting to hack into US servers. Keep in mind that this does not mean we are 100% sure Russia is hacking the United States. However, there is evidence showing the Democratic National Convention (DNC) has been under fire by the Russians. They were able to gain access to their email and chats, according to DNC security experts.

Read More: Are Voting Machines Susceptible to Hacking?

The DNC was not the only governmental agency under attack by Russian hackers. For instance, the Russians gained access to the entirety of the database of opposition research on the GOP presidential candidate Donald Trump.

Russian spies have also targeted the networks of both Hillary Clinton and Donald Trump. These spies also extended their targets to the Republican National Committee.

These hacks were performed using tactics utilized by Russian hacking groups known as APT28 and APT29, which go by the aliases of “Fancy Bear” and “Cozy Bear.” Following this trail, security experts were able to pinpoint that Guccifer 2.0 did not independently hack. Guccifer 2.0 is simply a decoy used to divert attention from the true suspects.

Ties to WikiLeaks

The accusations of these hacks surfaced around the time that WikiLeaks articles started exposing the DNC for supposed corruption. As a result, many people are connecting the dots and insinuating that the Russian hackers leaked this information to WikiLeaks, enabling them to broadcast these secretive documents.

Other Countries

As stated earlier, there is only circumstantial evidence that ties Russia to these hacks and WikiLeaks articles. That being said, a simple Google search will show you that no other countries are actively hacking the United States. As a result, it is imperative that we continue honing in on the details to make sure that Russia is indeed hacking the United States without making any brash assumptions.

]]>