On Tuesday WikiLeaks released Vault 7, a collection of thousands of documents leaked from the CIA's Computer Operations Group.
The documents list the vulnerabilities of popular tech products and devices such as Android, Windows, iPhone and Samsung smart TVs.
The CIA's covert hacking program has produced more than a thousand hacking systems, using an arsenal that includes trojans, viruses and other weaponized malware, including remote control systems, WikiLeaks said in a press release.
For example, the CIA's Embedded Devices Branch (EDB) and the United Kingdom's MI5/BTSS agencies have developed a system called "Weeping Angel" which can penetrate smart TVs and turn them into covert microphones that listen in on conversations held at home.
"The CIA's Mobile Devices Branch (MDB) has developed numerous attacks to remotely hack and control popular smart phones. Infected phones can be instructed to send the CIA the user's geolocation, audio and text communications as well as covertly activate the phone's camera and microphone," Wikileaks reported.
"The hacking community will use this information to then create new vulnerabilities. So, effectively you are educating a lot of hackers out there in how to cause damage," Safa said.
Apple and Google have sought to reassure users that recent updates have already fixed many of the vulnerabilities identified by the CIA. All the companies have promised to work to address any further weaknesses.
Safa said corporate organizations will be greatly affected because programs like WhatsApp are widely used in the corporate world and could be subject to data breaches.
"If you can do that and exploit the vulnerabilities of the phone, then they can do whatever they want," Safa said.
"I don't think it (Vault 7) has been hacked, I think it's been leaked and the leak has probably occurred by people working internally. Significant amounts of content leakage is normally done by people working internally within an organization. It's obviously caught them very unaware. I think the difficulty for security services is that now this information is in the hands of hackers they will be able to exploit this information as well," Safa said.
Have you heard the news? Sign up to our Telegram channel and we'll keep you up to speed!