*This must apply to many more companies than Google, but....
After the recent Vault 7 release from wikileaks, it looks as though some tech companies might be unable or not keen for one reason or another to implement measures to fix their systems.
http://www.washingtonexaminer.com/wikileaks-threatens-to-reveal-tech-companies-that-havent-responded-to-help-offer-against-cia-hacks/article/2617777?utm_campaign=WashingtonWikiLeaks said it plans to take action against technology companies that "continue to drag their feet" in communicating over software and products that might be vulnerable to the CIA's hacking program revealed in the "Vault 7" publication on March 7.
In a statement posted to Twitter late Friday, WikiLeaks founder and editor-in-chief Julian Assange said companies such as Mozilla have already exchanged letters after his organization offered its help in working with them by offering the technical details of the CIA's alleged hacking methods.
Other companies, like Google, have yet to "confirm receipt of our initial approach," Assange said. They may be unable to reach out because of conflicts of interest due to classified work with for the U.S. government, he noted.
Especially seeing as these exploits could be widely known.
http://www.newyorker.com/news/amy-davidson/five-questions-about-the-latest-wikileaks-release On Tuesday morning, WikiLeaks released eight thousand seven hundred and sixty-one files that it said were “from an isolated, high-security network situated inside the CIA’s Center for Cyber Intelligence,” in Langley, Virginia. The group called the collection “Year Zero,” the first installment of a larger project, Vault 7, which reveals the “hacking capacity” of the C.I.A.—and which is, in turn, part of a larger archive that, it claimed, had “been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.” In other words, WikiLeaks has the files because the C.I.A. had “lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized ‘zero day’ exploits, malware remote control systems and associated documentation.”