{"id":335349,"date":"2017-03-09T08:43:11","date_gmt":"2017-03-09T00:43:11","guid":{"rendered":"http:\/\/techcrunch.com\/?p=1462540"},"modified":"2017-03-09T08:43:11","modified_gmt":"2017-03-09T00:43:11","slug":"google-is-the-latest-company-to-brush-off-most-of-the-wikileaks-vulnerabilities","status":"publish","type":"post","link":"https:\/\/people.utm.my\/asmawisham\/google-is-the-latest-company-to-brush-off-most-of-the-wikileaks-vulnerabilities\/","title":{"rendered":"Google is the latest company to brush off most of the Wikileaks vulnerabilities"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/tctechcrunch2011.files.wordpress.com\/2017\/03\/cia-headquarters.jpg?w=738\" class=\"\"\/><\/p>\n<p>Wikileaks dumped thousands of alleged CIA documents online yesterday that contained lists of vulnerabilities in popular tech products, sending companies scrambling to make sure their security patches were up-to-date. But as companies reviewed the documents, it became clear that most of the vulnerabilities they contained were outdated.<\/p>\n<p>Apple first <a target=\"_blank\" href=\"https:\/\/techcrunch.com\/2017\/03\/07\/apple-says-most-vulnerabilities-in-wikileaks-docs-are-already-patched\/\">dismissed the majority of the listed iPhone vulnerabilities<\/a> in a statement last night, and now Google and other firms are following suit.<\/p>\n<p>\u201cAs we\u2019ve reviewed the documents, we\u2019re confident that security updates and protections in both Chrome and Android already shield users from many of these alleged vulnerabilities. Our analysis is ongoing and we will implement any further necessary protections. We\u2019ve always made security a top priority and we continue to invest in our defenses,\u201d Google\u2019s director of information security and privacy Heather Adkins said in a statement.<\/p>\n<p>Finding flaws in iPhones and Android devices was important to the CIA\u2019s mission of surveilling targets because the security problems could allow the agency to eavesdrop on users\u2019 communications.<\/p>\n<p>It\u2019s important to note that, although Google and Apple both say that most of the vulnerabilities are fixed, that doesn\u2019t mean all of them are. Users concerned about the security of their devices need to make sure they\u2019re updating to the latest software to get all of the security patches.<\/p>\n<p>The Wikileaks disclosure has reignited a debate over whether U.S. intelligence agencies should disclose software vulnerabilities to companies so they can be fixed, or hoard them so they can be used for spying.<\/p>\n<p>Mozilla\u2019s chief legal and business officer\u00a0Denelle Dixon highlighted the importance of disclosure in conversation with the <a target=\"_blank\" href=\"https:\/\/www.nytimes.com\/2017\/03\/07\/technology\/wikileaks-silicon-valley-spy-agencies.html?_r=0\">New York Times<\/a>. \u201cThe C.I.A. seems to be stockpiling vulnerabilities, and WikiLeaks seems to be using that trove for shock value rather than coordinating disclosure to the affected companies to give them a chance to fix it and protect users,\u201d Dixon said. \u201cAlthough today\u2019s disclosures are jarring, we hope this raises awareness of the severity of these issues and the urgency of collaborating on reforms.\u201d<\/p>\n<p>Many tech industry advocates believe that the government has a responsibility to protect American businesses and consumers by notifying companies of security flaws, rather than keeping them secret and exploiting them. The Obama administration pushed a <a target=\"_blank\" href=\"https:\/\/epic.org\/privacy\/cybersecurity\/vep\/\">vulnerabilities equity process<\/a> to help government agencies determine when to disclose vulnerabilities to companies, but the Wikileaks documents raise questions about whether the VEP is effective.<\/p>\n<p>\u201cThe White House vulnerabilities equities process spells out what the government should be doing when it comes into possession of 0-days,\u201d Alex Rice, chief technology officer of HackerOne, told TechCrunch. \u201cIt\u2019s unclear if it\u2019s been honored properly in this case. Were these\u00a0vulnerabilities handled in the way outlined by the previous administration? And if not, what do we do about that? Was the process illegitimate to begin with? It\u2019s restarting a\u00a0conversation we thought we had a clear answer to.\u201d<\/p>\n<p>Rice, who worked on Facebook\u2019s security team before helping launch the bug bounty platform HackerOne, said the vulnerabilities Wikileaks reported in Samsung smart TVs had a personal impact on him: Wikileaks claimed the CIA spied on targets through their TVs, and Rice\u00a0has a Samsung TV facing his bed. \u201cI\u2019m not worried about the CIA eavesdropping on my television. If the CIA is going to conduct espionage on me, they have more than enough means to do so. What I am concerned about, if the U.S. government knows I have vulnerable tech in my bedroom, that has direct implications to my privacy. That\u2019s something I should know about as a taxpayer,\u201d Rice explained.<\/p>\n<p>After all, if the CIA discovers a\u00a0security vulnerability in a popular product, it\u2019s only a matter of time before hackers or other nations\u2019 spy agencies find it too. The CIA knew it had been breached late last year, according to a Reuters report, which calls into question why Apple, Google, Samsung and others weren\u2019t alerted sooner.<\/p>\n<p>\u201cEventually these vulnerabilities are not going to be secret any longer,\u201d Rice said. \u201cHow are we going to minimize the damage when that happens? This leak is proof of that. We are all at a disadvantage if Wikileaks has access to a 0-day in iPhone, Android, or\u00a0Samsung TV.\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" width=\"680\" height=\"383\" src=\"https:\/\/tctechcrunch2011.files.wordpress.com\/2017\/03\/cia-headquarters.jpg?w=680\" class=\"attachment-large size-large wp-post-image\" alt=\"\" srcset=\"https:\/\/tctechcrunch2011.files.wordpress.com\/2017\/03\/cia-headquarters.jpg?w=680 680w, https:\/\/tctechcrunch2011.files.wordpress.com\/2017\/03\/cia-headquarters.jpg?w=150 150w, https:\/\/tctechcrunch2011.files.wordpress.com\/2017\/03\/cia-headquarters.jpg?w=300 300w, https:\/\/tctechcrunch2011.files.wordpress.com\/2017\/03\/cia-headquarters.jpg?w=768 768w, https:\/\/tctechcrunch2011.files.wordpress.com\/2017\/03\/cia-headquarters.jpg 1280w\" sizes=\"(max-width: 680px) 100vw, 680px\" \/>&nbsp;Wikileaks dumped thousands of alleged CIA documents online yesterday that contained lists of vulnerabilities in popular tech products, sending companies scrambling to make sure their security patches were up-to-date. But as companies reviewed the documents, it became clear that most of the vulnerabilities they contained were outdated.<br \/>\nApple first dismissed the majority of the listed iPhone&#8230; <a href=\"https:\/\/techcrunch.com\/2017\/03\/08\/google-is-the-latest-company-to-brush-off-most-of-the-wikileaks-vulnerabilities\/?ncid=rss\">Read More<\/a><\/p>\n<div class=\"feedflare\">\n<a href=\"http:\/\/feeds.feedburner.com\/~ff\/Techcrunch?a=ll3WHfdTE_4:k59IKoYoU-0:2mJPEYqXBVI\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/Techcrunch?d=2mJPEYqXBVI\" border=\"0\"><\/img><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/Techcrunch?a=ll3WHfdTE_4:k59IKoYoU-0:7Q72WNTAKBA\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/Techcrunch?d=7Q72WNTAKBA\" border=\"0\"><\/img><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/Techcrunch?a=ll3WHfdTE_4:k59IKoYoU-0:yIl2AUoC8zA\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/Techcrunch?d=yIl2AUoC8zA\" border=\"0\"><\/img><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/Techcrunch?a=ll3WHfdTE_4:k59IKoYoU-0:-BTjWOF_DHI\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/Techcrunch?i=ll3WHfdTE_4:k59IKoYoU-0:-BTjWOF_DHI\" border=\"0\"><\/img><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/Techcrunch?a=ll3WHfdTE_4:k59IKoYoU-0:D7DqB2pKExk\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/Techcrunch?i=ll3WHfdTE_4:k59IKoYoU-0:D7DqB2pKExk\" border=\"0\"><\/img><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/Techcrunch?a=ll3WHfdTE_4:k59IKoYoU-0:qj6IDK7rITs\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/Techcrunch?d=qj6IDK7rITs\" border=\"0\"><\/img><\/a>\n<\/div>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~r\/Techcrunch\/~4\/ll3WHfdTE_4\" height=\"1\" width=\"1\" alt=\"\"\/> <\/p>\n","protected":false},"author":5817,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[25],"tags":[59,66,26],"class_list":["post-335349","post","type-post","status-publish","format-standard","hentry","category-technology","tag-media","tag-techcrunch","tag-technology"],"_links":{"self":[{"href":"https:\/\/people.utm.my\/asmawisham\/wp-json\/wp\/v2\/posts\/335349","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/people.utm.my\/asmawisham\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/people.utm.my\/asmawisham\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/people.utm.my\/asmawisham\/wp-json\/wp\/v2\/users\/5817"}],"replies":[{"embeddable":true,"href":"https:\/\/people.utm.my\/asmawisham\/wp-json\/wp\/v2\/comments?post=335349"}],"version-history":[{"count":0,"href":"https:\/\/people.utm.my\/asmawisham\/wp-json\/wp\/v2\/posts\/335349\/revisions"}],"wp:attachment":[{"href":"https:\/\/people.utm.my\/asmawisham\/wp-json\/wp\/v2\/media?parent=335349"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/people.utm.my\/asmawisham\/wp-json\/wp\/v2\/categories?post=335349"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/people.utm.my\/asmawisham\/wp-json\/wp\/v2\/tags?post=335349"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}