. | . |
Tech sector scrambles after CIA hacking allegations By Rob Lever Washington (AFP) March 8, 2017
The tech sector was scrambling to understand the implications of an alleged broad CIA hacking arsenal, capable of spying on phones and other connected devices. Major tech firms said Wednesday they were looking at the allegations raised in the documents released by WikiLeaks on Tuesday. "While our initial analysis indicates that many of the issues leaked today were already patched in the latest iOS, we will continue work to rapidly address any identified vulnerabilities," Apple said in an emailed statement. Samsung offered a similar response, saying, "We are aware of the report in question and are urgently looking into the matter." Microsoft, meanwhile, said, "We're aware of the report and are looking into it." Security analysts, however, said the documents, if authentic, were not on the same scale as the explosive 2013 revelations from former national security contractor Edward Snowden, who revealed mass surveillance tools used by the National Security Agency. - Targeted, not bulk spying - "These are targeted mechanisms, they can't be used for bulk intelligence," said Joseph Hall, a technologist with the Center for Democracy and Technology, a digital rights organization. "It means they can't attack things in the middle and the core of the network, they have to go to the endpoints, and that's actually a nice thing. You have to be more precise about who you are targeting." But Hall said the report raises questions about the US government's pledge to disclose security flaws to technology firms under a so-called "vulnerabilities equities process." That pledge means "security flaws should get back to the companies so they can get fixed, and not languish for years," Hall said. The WikiLeaks documents, the authenticity of which has not been verified, said the CIA tools could turn smart TVs into listening devices, bypass popular encryption apps, and possibly control connected automobiles. The hacking tools have targeted iPhones, Android systems such as the personal phone reportedly still used by President Donald Trump, popular Microsoft software, and Samsung smart TVs, the documents indicated. Open Whisper Systems, the company that developed the technology for the communications tool Signal, said the CIA documents showed its encryption works. The WikiLeaks report "is about getting malware onto phones, none of the exploits are in Signal or break Signal Protocol encryption," the group said in a tweet. Other encryption experts agreed. - Strength of encryption - "The existence of these hacking tools is a testimonial to the strength of the encryption," said Steve Bellovin, a Columbia University computer science researcher, in a blog post. "It's hard or impossible to break, so the CIA is resorting to expensive, targeted attacks." Robert Graham, a researcher with Errata Security, said most of these hacks are simply methods to "trick you into installing their software." "Snowden revealed how the NSA was surveilling all Americans. Nothing like that appears in the CIA dump," Graham said in a blog post. "It's all legitimate spy stuff (assuming you think spying on foreign adversaries is legitimate)." Bruce Schneier, chief technology officer at IBM Resilient and a frequent critic of government surveillance, said on his blog, "There is absolutely nothing illegal in the contents of any of this stuff. It's exactly what you'd expect the CIA to be doing in cyberspace."
Beijing (AFP) March 2, 2017 /> Beijing said Thursday it will push a "China solution" to global cyber governance after releasing its first strategy paper outlining a vision of the web where individual countries control the information that flows across their borders. The roll out is part of an effort by Beijing to play a more active role in shaping the management of the internet, advocating what some critics have calle ... read more Related Links Cyberwar - Internet Security News - Systems and Policy Issues
|
|
The content herein, unless otherwise known to be public domain, are Copyright 1995-2024 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. All articles labeled "by Staff Writers" include reports supplied to Space Media Network by industry news wires, PR agencies, corporate press officers and the like. Such articles are individually curated and edited by Space Media Network staff on the basis of the report's information value to our industry and professional readership. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. General Data Protection Regulation (GDPR) Statement Our advertisers use various cookies and the like to deliver the best ad banner available at one time. All network advertising suppliers have GDPR policies (Legitimate Interest) that conform with EU regulations for data collection. By using our websites you consent to cookie based advertising. If you do not agree with this then you must stop using the websites from May 25, 2018. Privacy Statement. Additional information can be found here at About Us. |