16 Mart 2017
By Wojtek Bogusz & Anastasia Vladimirova
On 7 March, Wikileaks published a trove of documents showing the United States Central Intelligence Agency’s (CIA) capabilities to remotely hack devices running Android, iOS, Windows, Mac OS X and others. These leaks demonstrate how the CIA and, very likely, other intelligence services, are able to exploit software and operating systems’ vulnerabilities.