Brie Larson has scored a sweet new TV deal with Apple the day before her new movie, Captain Marvel, is set to light the box office on fire.
Larson will both star and executive produce a new TV drama series for Apple under the new deal. The TV show will be based on an intriguing spy novel that hasn’t even been published yet.
The iOS and macOS vulnerabilities revealed by the latest WikiLeaks data dump of CIA hacking tools have already been fixed.
Apple says that an early evaluation of the info released by WikiLeaks hasn’t found any new bugs or attacks that can be used on iPhone or Mac users. Some of the exploits contained in the leaks were able to grant access to an iPhone’s call logs and SMS conversations, but only if the CIA had physical access to the device.
Just over two weeks after revealing the true extent of the Central Intelligence Agency’s hacking arsenal, WikiLeaks today released more information on its infections designed for Mac and iOS.
These are the tools the agency used to exploit vulnerabilities in Apple’s software and gain persistent access to target computers and mobile devices.
This week on The CultCast: The CIA loses control of its iPhone-hacking arsenal, and computer crooks turn your gadgets against you. Plus: Why iPhone 8 may arrive later than you hoped; our favorite Apple AirPort replacement routers; and we discuss the non-Apple gear we’re currently obsessing over in an all-new and aptly named “What We’re Into.”
Our thanks to Squarespace for supporting this episode. It’s simple to accept Apple Pay and sell your wares with your very own Squarespace.com website. Enter offer code CultCast at checkout to get 10 percent off any hosting plan.
WikiLeaks founder Julian Assange has vowed to give technology firms like Apple access to the CIA’s “cyberweapons” arsenal so they can develop fixes that make our devices more secure.
Earlier this week, thousands of leaked documents and files revealed the full extent of the CIA’s cyber attacks on smartphones, computers and even smart TVs. WikiLeaks says the spy agency has lost control of it all in a “historic act of devastating incompetence.”
FBI director James Comey has warned that we should not expect “absolute privacy” in America. His comments come just days after a WikiLeaks dump revealed the CIA’s incredible arsenal of malware and viruses used to spy on iPhones and other smart devices.
Speaking at a Boston College conference on cybersecurity this week, Comey said that while the government cannot invade our privacy without good reason, “there is no place outside of judicial reach.”
Cupertino says it is working to address any identified holes that weren’t already patched, and the company reminds fans that the software built for iPhone boasts the best data security available to consumers.
WikiLeak’s trove of CIA cyber documents is being hyped as one of the biggest leaks since Edward Snowden blew the whistle on the NSA. But according to one of the world’s top jailbreakers, you shouldn’t believe the hype.
Cyber security expert Will Strafach, who gained notoriety under the name Chronic for finding zero-day exploits used for jailbreaking, says iOS users don’t need to be worried.
Although Google’s Android dominates the worldwide smartphone market, the CIA concentrated on Apple’s iOS because of its popularity among global elites, WikiLeaks reports.
The huge trove of leaked CIA documents, codenamed “Vault 7” and released Tuesday by WikiLeaks, reveals that the CIA formed a special unit called the Mobile Development Branch (MDB) to infect smartphones. And within that unit, Apple’s iOS was a prime target.
A secret document buried in WikiLeaks’ “Vault 7” data dump serves as a sort of Rosetta Stone for the CIA’s extensive hacking operations targeting iOS devices and other consumer electronics.
The entire hacking arsenal of the CIA has been dumped online and the entire internet is freaking out.
WikiLeaks dropped a data bomb Tuesday with its massive document dump, which it claims is one of the biggest in history. Secrets on how the CIA hacked devices made by Apple, Google, Samsung and Microsoft are now available for all to see. But should you start freaking out just yet?
Cult of Mac talked to a number of iOS security experts to make sense of all the new info. While it’s tempting to panic, there’s a lot more you need to know first.
The Central Intelligence Agency has been using malware to spy on iPhone and Android users, according to the largest-ever publication of confidential documents from WikiLeaks — and the spy tools are now in the hands of others.
As part of a covert hacking program, the CIA created a “malware arsenal” and dozens of “zero day exploits” to infiltrate smartphones, tablets and even smart TVs to extract data and turn them into covert microphones.
But the agency recently lost controls of these tools. Those who have obtained them now have “the entire hacking capacity of the CIA” at their disposal, according to WikiLeaks.
Never mind that espionage is a dangerous line of work. The secret agent game promises plenty of intrigue and lots of fun spy gadgets.
If I knew exactly what today’s tools of the trade are, someone would probably have to kill me. Politics and enemies change but spies’ needs are essentially timeless: Disguises and false papers maintains a cover, tracking and listening devices record movements and conversations, and small, secret cameras copy documents and photograph dubious characters.
A hidden weapon can get a spy out of a jam. A concealed cyanide pill — so the intensely devoted might say — beats interrogation.
We love our spy stories. It is why the James Bond film franchise endures, James Patterson sells books and there are spy museums from Prague to Washington, D.C. (where there are two). Here’s a less-than-clandestine peek into the shadowy spy gadgets that filled the world of espionage over the years.
The CIA has been been involved in a multi-year effort to crack iOS security, according to new information provided to The Intercept by whistleblower Edward Snowden. The attempts have been the focal point of multiple yearly CIA conferences called “The Jamboree.”
Among the possible solutions proposed include a means of “whacking” Xcode, the software used to create apps for iOS and Macs. Researchers claimed they had discovered a means by which Xcode could be manipulated to allow devices to be infected, so as to allow for the extraction of private data — thereby creating a “remote backdoor” that would disable core security features and allow undetected access to Apple devices.
There’s a belief that Apple makes new engineers work on fake products until they can be trusted. According one of the company’s former employees, Adam Lashinsky, who published the book Inside Apple last January, the Cupertino company hires people into so-called “dummy positions” until it’s confident that they can be a part of upcoming products without leaking information.
But how accurate are those claims? We know Apple takes secrecy very seriously, but would it really waste time and money on giving people fake projects just to ensure they won’t squeal?