{"id":10686,"date":"2017-05-03T09:00:16","date_gmt":"2017-05-03T14:00:16","guid":{"rendered":"https:\/\/www.psafe.com\/en\/blog\/?p=10686"},"modified":"2017-05-03T16:02:59","modified_gmt":"2017-05-03T21:02:59","slug":"everyday-devices-targeted-cia","status":"publish","type":"post","link":"https:\/\/www.psafe.com\/en\/blog\/everyday-devices-targeted-cia\/","title":{"rendered":"The Everyday Devices Targeted By the CIA"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">WikiLeaks recently revealed how the CIA has a number of tools that can allow them to hack into smartphones and smart devices, such as Internet of Things devices. A <\/span><a href=\"https:\/\/twitter.com\/Snowden\/status\/839172609484914688\"><span style=\"font-weight: 400;\">former NSA employee tweeted<\/span><\/a><span style=\"font-weight: 400;\"> that this leak of the CIA\u2019s hacking tools for smart devices could fall into the wrong hands. He said that the \u201csecurity hole[s] [that] the CIA left open\u201d could be used to break into any smartphone in the world. So, what can you do to help protect your smartphone? One way is to use Anti-Hacking to block malicious websites as you browse the web:<\/span><\/p>\n<p><center><a href=\"psafe:\/\/launch\/safe_navigation\" rel=\"attachment wp-att-9860\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-9860\" src=\"https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2017\/04\/activate-safe-navigation-300x54.jpg\" alt=\"activate-safe-navigation\" width=\"300\" height=\"54\" srcset=\"https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2017\/04\/activate-safe-navigation-300x54.jpg 300w, https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2017\/04\/activate-safe-navigation.jpg 437w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/center><span style=\"font-weight: 400;\">If you land on a web page that is trying to steal your information, Anti-Hacking will notify you that the website is unsafe and that you should not enter any personal information on the website. Doing so could lead to a phishing scam or your login credentials being stolen. If you\u2019ve ever lost a cell phone, then you know how it feels to think that someone else could be scrolling through your photos and your private texts. Think about all of the personal information someone could find \u2014 and steal \u2014 from your devices. The following are some of the devices that have been targeted by the CIA.<\/span><\/p>\n<p><b>Read More: <\/b><a href=\"https:\/\/www.psafe.com\/en\/blog\/protect-social-engineering-attacks\/\"><b>How to Protect Yourself from Social Engineering Attacks<\/b><\/a><\/p>\n<p><b>Smart TVs<\/b><\/p>\n<p><span style=\"font-weight: 400;\">You may not want to have any private conversations in any room with your Samsung TV. Weeping Angel is one attack utilized by the CIA that can target a Samsung F8000 TV. It makes the TV look as though it is off, but it is in fact able to monitor a conversation. They call it &#8220;fake off.&#8221; <\/span><\/p>\n<p><span style=\"font-weight: 400;\">The public was unaware of this \u201cremote bug\u201d until the WikiLeaks documents were released. Reports believe one version of the malware was eliminated with a patch. However, this specific type of malware has not been used on U.S. citizens. Further, it must be manually installed onto a smart TV by using a flash drive.<\/span><\/p>\n<p><b>Smartphones and Tablets<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Both Apple and Android smartphones and tablets were targeted. According to WikiLeaks, the CIA could collect audio or messages from smartphones and tablets through apps like WhatsApp, Signal, and Telegram by intercepting the information before it\u2019s been encrypted. <\/span><\/p>\n<p><b>Laptops and PCs<\/b><\/p>\n<p><span style=\"font-weight: 400;\">The CIA also specifically targeted Microsoft\u2019s Windows operating system. They gained access to a system by spreading malware through CDs and flash drives.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">WikiLeaks revealed that the CIA didn\u2019t inform tech companies like Google and Microsoft of security vulnerabilities in various devices in order to continue with their experimentation and probes. Their failure to privately disclose crucial vulnerabilities allowed citizens\u2019 devices to remain less secure. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Since the leaks, the tech companies have been looking into the vulnerabilities in order to fix any issues. But don\u2019t just count on tech companies to keep your information secure, remember to install the necessary protection like <\/span><a href=\"https:\/\/play.google.com\/store\/apps\/details?id=com.psafe.msuite&amp;hl=en\"><span style=\"font-weight: 400;\">DFNDR\u2019s Anti-Hacking<\/span><\/a><span style=\"font-weight: 400;\">. Stay aware of developments through reliable news sources as well &#8212; keeping informed gives you control over your personal data.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The WikiLeaks documents \u2014 more than 8000 of them \u2014 detail how the CIA has ability to hack your everyday items. This includes phones, TVs, tablets, and PCs.<\/p>\n","protected":false},"author":83,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","footnotes":""},"categories":[5],"tags":[3671,942,252,306,195,309,4025,3715],"class_list":["post-10686","post","type-post","status-publish","format-standard","hentry","category-security","tag-antiphising","tag-app0","tag-app1","tag-app4","tag-app5","tag-app7","tag-dfndr","tag-wikileaks"],"_links":{"self":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/10686","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/users\/83"}],"replies":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/comments?post=10686"}],"version-history":[{"count":0,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/10686\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/media?parent=10686"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/categories?post=10686"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/tags?post=10686"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}