Pages: [1]   Go Down
  Print  
Author Topic: AirTags can be weaponized by injecting code; Apple says fix on the way  (Read 204 times)
HCK
Global Moderator
Hero Member
*****
Posts: 79425



« on: October 03, 2021, 04:05:26 pm »

AirTags can be weaponized by injecting code; Apple says fix on the way

<div class="feat-image"></div>
<p>A <a href="https://9to5mac.com/guides/security/" target="_blank" rel="noreferrer noopener">security[/url] researcher has shown that <a href="https://9to5mac.com/guides/airtag/" target="_blank" rel="noreferrer noopener">AirTags[/url] can be weaponized by injecting code into the phone number field before placing it into Lost mode and dropping it in strategic places. <a href="https://9to5mac.com/guides/aapl/" target="_blank" rel="noreferrer noopener">Apple[/url] has confirmed the finding.</p>
<p>When someone finds the AirTag and scans it, they will be redirected to the website of the attacker’s choice, which could include a fake <a href="https://9to5mac.com/guides/icloud/" target="_blank" rel="noreferrer noopener">iCloud[/url] login to report the find … </p>
<p> <a href="https://9to5mac.com/2021/09/29/airtags-can-be-weaponized/#more-757466" class="more-link">more…[/url]</p>
<p>The post <a rel="nofollow" href="https://9to5mac.com/2021/09/29/airtags-can-be-weaponized/">AirTags can be weaponized by injecting code; Apple says fix on the way[/url] appeared first on <a rel="nofollow" href="https://9to5mac.com">9to5Mac[/url].</p><div class="feedflare">
<img src="[url]http://feeds.feedburner.com/~ff/9To5Mac-MacAllDay?i=MVWwH9J275c:SFDrUoA43A8:D7DqB2pKExk" border="0"></img>[/url]
</div><img src="http://feeds.feedburner.com/~r/9To5Mac-MacAllDay/~4/MVWwH9J275c" height="1" width="1" alt=""/>

Source: AirTags can be weaponized by injecting code; Apple says fix on the way
Logged
Pages: [1]   Go Up
  Print  
 
Jump to: