WATCH: Cybercriminals have taken notice of leaked government spying techniques

The U.S. government's spy tools are being revealed.

Wikileaks continues to publish alleged CIA hacking techniques for smart devices, including smart TVs and smartphones. And recently a treasure trove of alleged hacking tools used by the NSA were leaked by hacking group, Shadow Brokers.

Experts say the leaks could open the door for cybercriminals to use the same tactics to target consumers. The government only uses these tools against persons of interest.

"Even though the actual source code for the exploit wasn't included, it does give you data around how information was transferred….That would allow a hacker or somebody malicious to develop their own exploits based off of that information," said Michael Buratwoski, the senior vice president of cybersecurity service at Fidelis Cybersecurity and a former law enforcement officer.

The CIA has not confirmed the documents are real. The NSA did not respond to our request for comment.

"Every device is exploitable…. There's always a risk of using smart technology that a threat actor could leverage to spy on you," said Kevin Mitnick, the author of "The Art of Invisibility." He was formerly on the FBI's most wanted list and served time behind bars for hacking. Now, Mitnick advises companies and consumers on how to protect themselves from cybercriminals.

Watch how to protect yourself here.

Source: CNBC

Topics: Speaking Engagements, spy tools, The Art of Invisibility, persons of interest, smart phones, WikiLeaks, default password, end-to-end encryption, IoT, NSA, Shadow Brokers, smart devices, smart TVs, voice commands, CIA hacking, Kevin Mitnick

Latest Posts

Kevin offers three excellent presentations, two are based on his best-selling books. His presentations are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

Mitnick Security: Ransomware Awareness Training

Ransomware is a type of malware that prevents accessibility to either a single computer or an entire network until a ransom is paid. This can result i..

Read more ›

Mitnick Security: Phishing Awareness Training

Phishing emails are one of the most common social engineering techniques used by threat actors today due to such high success rates. About 3.4 billion..

Read more ›

Mitnick Security Training: QR Code Cybersecurity Test

Nearly 90 million smartphone users in the U.S. alone have used QR codes on their mobile devices. By 2025, that number is projected to grow to 100 mill..

Read more ›
tech-texture-bg