By Matt Agorist In June of 2016, as Instagram celebrated reaching 500 million monthly users, Mark Zuckerberg, CEO of Facebook, posted a photo of himself enjoying the moment. The photo quickly went viral, not because people like Zuckerberg, but because it showed the owner of a company—that requests permission to record through your camera and….Read more
ÖVERVAKNING. Trots att du stängt av platsdelning på din Androidtelefon vet Google ändå var du befinner dig. Det enda som krävs är att mobilen är uppkopplad till internet. Androidtelefoner har sedan början av året i smyg spionerat på användarna genom att skicka vidare data om vart mobilen befinner sig vidare till Google. Detta sker även…Läs mera
WikiLeaks has claimed the CIA planned to hack cars and trucks to carry out assassinations. The secretive organisation said the U.S. Central Intelligence Agency used the phone’s geolocation software to tap into vehicle control systems in modern cars. The hacking organisation made the statement as it announced a huge release of confidential documents from the…
The password to the first iteration of Wikileaks’ Vault7 series has been released. The first Vault7 iteration codenamed “Year 0” is a 500mb file which could be opened through your browser. The Vault7 series is the largest intelligence publication in history.
March 07, 2017 by: Mike Adams
While it’s going to take internet sleuths several days to pour through all the documents and find full details of what they reveal, some of the highlights include these bombshells:
Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized “zero day” exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.
“Year Zero” introduces the scope and direction of the CIA’s global covert hacking program, its malware arsenal and dozens of “zero day” weaponized exploits against a wide range of U.S. and European company products, include Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones………..