Security

ComputerWorldIndependent

Newer car tech opens doors to CIA attacks

Credit to Author: Lucas Mearian| Date: Fri, 10 Mar 2017 03:01:00 -0800

The revelation through Wikileaks that the CIA has explored hacking vehicle computer control systems should concern consumers, particularly as more and more cars and trucks roll off assembly lines with autonomous features.

“I think it’s a legitimate concern considering all of the computers being added to cars,” said Kit Walsh, a staff attorney with the privacy group Electronic Frontier Foundation (EFF). “There’s no reason the CIA or other intelligence agencies or bad actors couldn’t use those vulnerabilities to hurt people.

To read this article in full or to leave a comment, please click here

Read More
ComputerWorldIndependent

WikiLeaks plans to share CIA hacking details, but can companies use it?

Credit to Author: Michael Kan| Date: Thu, 09 Mar 2017 19:06:00 -0800

WikiLeaks plans to share details about what it says are CIA hacking tools with the tech companies so that software fixes can be developed.

But will software companies want it?

The information WikiLeaks plans to share comes from 8,700-plus documents it says were stolen from an internal CIA server. If the data is classified — and it almost certainly is — possessing it would be a crime.

That was underlined on Thursday by White House press secretary Sean Spicer, who advised tech vendors to consider the legal consequences of receiving documents from WikiLeaks.

To read this article in full or to leave a comment, please click here

Read More
ComputerWorldIndependent

WikiLeaks plans share CIA hacking details, but can companies use it?

Credit to Author: Michael Kan| Date: Thu, 09 Mar 2017 19:06:00 -0800

WikiLeaks plans to share details about what it says are CIA hacking tools with the tech companies so that software fixes can be developed.

But will software companies want it?

The information WikiLeaks plans to share comes from 8,700-plus documents it says were stolen from an internal CIA server. If the data is classified — and it almost certainly is — possessing it would be a crime.

That was underlined on Thursday by White House press secretary Sean Spicer, who advised tech vendors to consider the legal consequences of receiving documents from WikiLeaks.

To read this article in full or to leave a comment, please click here

Read More
ComputerWorldIndependent

After CIA leak, Intel Security releases detection tool for EFI rootkits

Credit to Author: Lucian Constantin| Date: Thu, 09 Mar 2017 13:32:00 -0800

Intel Security has released a tool that allows users to check if their computer’s low-level system firmware has been modified and contains unauthorized code.

The release comes after CIA documents leaked Tuesday revealed that the agency has developed EFI (Extensible Firmware Interface) rootkits for Apple’s Macbooks. A rootkit is a malicious program that runs with high privileges — typically in the kernel — and hides the existence of other malicious components and activities.

The documents from CIA’s Embedded Development Branch (EDB) mention an OS X “implant” called DerStarke that includes a kernel code injection module dubbed Bokor and an EFI persistence module called DarkMatter.

To read this article in full or to leave a comment, please click here

Read More
ComputerWorldIndependent

After WikiLeaks' CIA dump, China tells U.S. to stop spying

Credit to Author: Gregg Keizer| Date: Thu, 09 Mar 2017 10:37:00 -0800

China today asked the U.S. government to stop spying on it, China’s first reaction to WikiLeaks’ disclosure of a trove of CIA documents that alleged the agency was able to hack smartphones, personal computers, routers and other digital devices worldwide.

“We urge the U.S. to stop listening in, monitoring, stealing secrets and [conducting] cyber-attacks against China and other countries,” said Geng Shuang, a Foreign Ministry spokesman said today in a Beijing press briefing.

Geng also said that China would protect its own networks, was willing to work with others toward what he called “orderly cyberspace,” and repeated his government’s stock denunciation of hacking.

To read this article in full or to leave a comment, please click here

Read More