Snoop Dogg – Super Crip (Video)

Dr. Greenthumb Strain Review “Shortcake” BREALTV

Kendrick Lamar – Humble (Video)

TI Gets Into Argument With Fan (News)

Snoop Dogg – BADBADNOTGOOD (Video)

TeeCee4800 feat. Vince Staples – Crippin (Rap Video)

CIA Attacks iPhone & Samsung Smart TVs with Malware & Trojan Horse Claims WikiLeaks (News)

Article By Rob Waugh

Among the 8,761 documents leaked by Julian Assange’s network in the so-called ‘Vault7’ leak are descriptions of viruses designed to hack into smart TVs – allegedly designed with help from MI5.

Other ‘weaponised’ malware targeted iPhone users and Android users, the documents reveal – with the aim of bypassing the encryption of privacy-focused apps such as WhatsApp and Confide.

The CIA’s hackers had produced more than 1,000 viruses, Trojans and other malware, the documents claim.

The release of 8,761 documents and files comes from an isolated, high-security network in the CIA’s Center for Cyber Intelligence in Langley, Virgina.

One piece of malware – ‘Weeping Angel’ – targeted Samsung TVs, and made the devices go into a ‘fake off’ mode, where they appeared to be off, but were actually listening to users and recording them, Wikileaks claims.

File photo dated 05/02/16 of Julian Assange, as the WikiLeaks founder told a press conference that he stands by his offer to go to the USA now that Chelsea Manning is being released. PRESS ASSOCIATION Photo. Issue date: Thursday January 19, 2017. See PA story LEGAL Assange. Photo credit should read: Dominic Lipinski/PA Wire
hoto credit should read: Dominic Lipinski/PA Wire

Today’s release is to be the first of a series of releases, detailing the CIA’s hacking capacity.

Wikileaks said, ‘”Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized “zero day” exploits, malware remote control systems and associated documentation.

‘This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA.

‘The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.’