WikiLeaks is back at it again, this time with more than 8,700 leaked documents apparently from inside the CIA's Center for Cyber Intelligence.
The CIA refused to verify the authenticity of the leaked documents. This is the equivalent of saying that if your house is broken into and bugged, whispering softly on your phone in your bedroom is not going to make that conversation secure.
The collection of documents vastly outnumbered the trove released by NSA whistleblower Edward Snowden.
Our products and software are created to quickly get security updates into the hands of our customers, with almost 80 per cent of users running the latest version.
According to WikiLeaks, the spy agency can target computers running on Windows, Apple products running iOS, and even smart TVs from manufacturers such as Samsung.
According to the documents inside Vault 7, the Central Intelligence Agency was able to hack iOS and Android smartphones in a multitude of ways, What's more, a program called "Weeping Angel" let Central Intelligence Agency operatives listen in on citizens using the microphones of their Smart TVs.
Wikileaks said in its press release that Year Zero introduces the scope and direction of the CIA's global covert hacking program, its malware arsenal and dozens of zero-day weaponized exploits against a wide range of USA and European company products, include Apple's iPhone, Google's Android and Microsoft's Windows and even Samsung TVs, which are apparently turned into covert microphones. According to notorious NSA leaker Edward Snowden, the WikiLeaks documents reveal that the government developed vulnerabilities for USA products - then intentionally left the holes open so they could exploit them later.
Veterinarians remove almost 1000 coins from turtle's stomach
The endangered animal ate almost a thousand of them over the years after the money was thrown into her pool by wishful tourists. The surgical team found the ball too large to take out through a 10cm incision and were forced to remove them individually.
The agency's unethical hacking and surveillance have been detailed in the documents, which reveals the infiltration codes and details the strategies that the agency used to turn smartphones, tablets, smart TVs, PCs, laptops and even vehicles with remote control navigation systems into recording devices.
"There is an extreme proliferation risk in the development of cyber "weapons", WikiLeaks founder Julian Assange added in a statement.
"Apple is deeply committed to safeguarding our customers' privacy and security".
Reuters reported Wednesday that the intelligence community has been aware since previous year of a security breach that led to the publication of the records.
In 2013, German media reported claims that U.S. intelligence agencies used the American embassy in Berlin as a listening station.
Google did not immediately respond to a request for comment regarding its efforts to patch Android.
Some smartphone attacks developed by the CIA allow the agency to bypass the encryption in WhatsApp, Confide, and other apps by collecting audio and message traffic before encryption is applied, according to the WikiLeaks analysis.