Next on the list is a project called "Dark Matter" which is an umbrella for a handful of other spying initiatives. Perhaps most troubling is that these infections can persist even if you reinstall OS X. Then there's "NightSkies 1.2" which, as of 2008, was used to infect brand new iPhone 3Gs.

"While CIA assets are sometimes used to physically infect systems in the custody of a target, it is likely that many CIA physical access attacks have infected the targeted organization's supply chain, including by interdicting mail orders and other shipments (opening, infecting and resending) leaving the United States or otherwise," WikiLeaks writes.

So, the CIA could intercept iPhone orders, put malware on them and then make sure the devices got to a target. WikiLeaks also notes that despite some of the comparatively ancient dates on the documents, it appears the CIA continues using and updating at least a few of them.

We've reached out to Apple for more information and will update this post should it arrive. In the case of the intercepted iPhones, there isn't much you can do (you've probably upgraded by now, and also are unlikely to be a target of CIA surveillance). But for everything else, just remember: Don't leave your laptop unattended in the open, and do not plug anything into your computer that was given to you by a stranger.

Update: Apple has responded, saying in a statement that it believes the security hole mentioned only affected the iPhone 3G, and was fixed in the follow-up iPhone 3GS model. Also, the Mac vulnerabilities mentioned were fixed in all Macs launched after 2013. Additionally, it says that WikiLeaks has not submitted any information to it under its standard terms.

In terms of the impact of these vulnerabilities, the Associated Press spoke to experts who explained how newer devices have technology that makes them harder to break into than an iPhone 3G. The addition of digital security certificates that can't be overwritten would make a warning pop up during setup of a compromised new device, while Thunderbolt revisions have made that hack harder to pull off.

Apple: