This article is from the source 'bbc' and was first published or seen on . It last changed over 40 days ago and won't be checked again for changes.

You can find the current article at its original source at http://www.bbc.co.uk/news/technology-39203724

The article has changed 5 times. There is an RSS feed of changes available.

Version 0 Version 1
Apple, Samsung and Microsoft react to Wikileaks' CIA dump Apple, Samsung and Microsoft react to Wikileaks' CIA dump
(about 1 hour later)
Several of the tech firms whose products have been allegedly compromised by the CIA have given their first reactions to the claims.Several of the tech firms whose products have been allegedly compromised by the CIA have given their first reactions to the claims.
Wikileaks published thousands of documents said to detail the US spy agency's hacking tools on Tuesday.Wikileaks published thousands of documents said to detail the US spy agency's hacking tools on Tuesday.
They included allegations the CIA had developed ways to listen in on smartphone and smart TV microphones.They included allegations the CIA had developed ways to listen in on smartphone and smart TV microphones.
Apple's statement was the most detailed, saying it had already addressed some of the vulnerabilities.Apple's statement was the most detailed, saying it had already addressed some of the vulnerabilities.
"The technology built into today's iPhone represents the best data security available to consumers, and we're constantly working to keep it that way," it said."The technology built into today's iPhone represents the best data security available to consumers, and we're constantly working to keep it that way," it said.
"Our products and software are designed to quickly get security updates into the hands of our customers, with nearly 80% of users running the latest version of our operating system."Our products and software are designed to quickly get security updates into the hands of our customers, with nearly 80% of users running the latest version of our operating system.
"While our initial analysis indicates that many of the issues leaked today were already patched in the latest iOS, we will continue work to rapidly address any identified vulnerabilities."While our initial analysis indicates that many of the issues leaked today were already patched in the latest iOS, we will continue work to rapidly address any identified vulnerabilities.
"We always urge customers to download the latest iOS to make sure they have the most recent security update.""We always urge customers to download the latest iOS to make sure they have the most recent security update."
Samsung - whose F8000 series of televisions was reportedly compromised via a hack co-developed with the UK's MI5 agency - was briefer.Samsung - whose F8000 series of televisions was reportedly compromised via a hack co-developed with the UK's MI5 agency - was briefer.
"Protecting consumers' privacy and the security of our devices is a top priority at Samsung," it said."Protecting consumers' privacy and the security of our devices is a top priority at Samsung," it said.
"We are aware of the report in question and are urgently looking into the matter.""We are aware of the report in question and are urgently looking into the matter."
The leaks also claimed that the CIA had created malware to target PCs running Microsoft's Windows operating system.The leaks also claimed that the CIA had created malware to target PCs running Microsoft's Windows operating system.
"We are aware of the report and are looking into it," a spokesman from Microsoft said."We are aware of the report and are looking into it," a spokesman from Microsoft said.
Google declined to comment about allegations that the CIA was able to "penetrate, infest and control" Android phones due to its discovery and acquisition of "zero day" bugs - previously unknown flaws in the operating system's code.Google declined to comment about allegations that the CIA was able to "penetrate, infest and control" Android phones due to its discovery and acquisition of "zero day" bugs - previously unknown flaws in the operating system's code.
Likewise, the Linux Foundation has yet to publicly react to claims the agency had created "attack and control systems" that could hijack computers powered by Linux-based software.Likewise, the Linux Foundation has yet to publicly react to claims the agency had created "attack and control systems" that could hijack computers powered by Linux-based software.
'Incredibly damaging''Incredibly damaging'
The CIA has not confirmed whether the documents are real. The CIA has not confirmed whether the documents - said to date between 2013 to 2016 - are real.
But one of its former chiefs was concerned by their publication.But one of its former chiefs was concerned by their publication.
"If what I have read is true, then this seems to be an incredibly damaging leak in terms of the tactics, techniques, procedures and tools that were used by the Central Intelligence Agency to conduct legitimate foreign intelligence," ex-CIA director Michael Hayden told the BBC."If what I have read is true, then this seems to be an incredibly damaging leak in terms of the tactics, techniques, procedures and tools that were used by the Central Intelligence Agency to conduct legitimate foreign intelligence," ex-CIA director Michael Hayden told the BBC.
"In other words, it's made my country and my country's friends less safe.""In other words, it's made my country and my country's friends less safe."
But one expert said the fact that the CIA had targeted such a wide range of technology was no surprise.But one expert said the fact that the CIA had targeted such a wide range of technology was no surprise.
"The story here isn't that the CIA hacks people. Of course they do; taxpayers would be right to be annoyed if that weren't the case," blogged Nicholas Weaver, a security researcher at the International Computer Science Institute in Berkeley."The story here isn't that the CIA hacks people. Of course they do; taxpayers would be right to be annoyed if that weren't the case," blogged Nicholas Weaver, a security researcher at the International Computer Science Institute in Berkeley.
"The CIA's job, after all, is [to] collect intelligence, and while its primary purview is human intelligence, hacking systems interacts synergistically with that collection."The CIA's job, after all, is [to] collect intelligence, and while its primary purview is human intelligence, hacking systems interacts synergistically with that collection.
"The actual headline here is that someone apparently managed to compromise a Top Secret CIA development environment, exfiltrate a whole host of material, and is now releasing it to the world... now the world wants to know who, and how, and why.""The actual headline here is that someone apparently managed to compromise a Top Secret CIA development environment, exfiltrate a whole host of material, and is now releasing it to the world... now the world wants to know who, and how, and why."
Embarrassment factor - Analysis by BBC's security correspondent Gordon CoreraEmbarrassment factor - Analysis by BBC's security correspondent Gordon Corera
These latest leaks - which appear to give details of highly sensitive technical methods - will be a huge problem for the CIA.These latest leaks - which appear to give details of highly sensitive technical methods - will be a huge problem for the CIA.
There is the embarrassment factor - that an agency whose job is to steal other people's secrets has not been able to keep its own.There is the embarrassment factor - that an agency whose job is to steal other people's secrets has not been able to keep its own.
Then there will be the fear of a loss of intelligence coverage against targets who may change their behaviour because they now know what the spies can do.Then there will be the fear of a loss of intelligence coverage against targets who may change their behaviour because they now know what the spies can do.
And then there will be the questions over whether the CIA's technical capabilities were too expansive and too secret.And then there will be the questions over whether the CIA's technical capabilities were too expansive and too secret.
Because many of the initial documents point to capabilities targeting consumer devices, the hardest questions may revolve around what is known as the "equities" problem.Because many of the initial documents point to capabilities targeting consumer devices, the hardest questions may revolve around what is known as the "equities" problem.
This is when you find a vulnerability in a piece of technology and have to balance the benefit to the public of telling the manufacturer so they can close it and improve everyone's security with the benefit to the spy agency of leaving it in place so it can be exploited to collect intelligence.This is when you find a vulnerability in a piece of technology and have to balance the benefit to the public of telling the manufacturer so they can close it and improve everyone's security with the benefit to the spy agency of leaving it in place so it can be exploited to collect intelligence.
The National Security Agency faced questions about whether it had this balance right when many of its secrets were revealed by Edward Snowden, and now it may be the CIA's turn.The National Security Agency faced questions about whether it had this balance right when many of its secrets were revealed by Edward Snowden, and now it may be the CIA's turn.
Read more from GordonRead more from Gordon