Title: AirTags can be weaponized by injecting code; Apple says fix on the way Post by: HCK on October 03, 2021, 04:05:26 pm AirTags can be weaponized by injecting code; Apple says fix on the way
<div class="feat-image">(https://9to5mac.com/wp-content/uploads/sites/6/2021/09/AirTags-can-be-weaponized-by-injecting-code.jpg?quality=82&strip=all&w=1600)</div> <p>A <a href="https://9to5mac.com/guides/security/" target="_blank" rel="noreferrer noopener">security[/url] researcher has shown that <a href="https://9to5mac.com/guides/airtag/" target="_blank" rel="noreferrer noopener">AirTags[/url] can be weaponized by injecting code into the phone number field before placing it into Lost mode and dropping it in strategic places. <a href="https://9to5mac.com/guides/aapl/" target="_blank" rel="noreferrer noopener">Apple[/url] has confirmed the finding.</p> <p>When someone finds the AirTag and scans it, they will be redirected to the website of the attacker’s choice, which could include a fake <a href="https://9to5mac.com/guides/icloud/" target="_blank" rel="noreferrer noopener">iCloud[/url] login to report the find … </p> <p> <a href="https://9to5mac.com/2021/09/29/airtags-can-be-weaponized/#more-757466" class="more-link">more…[/url]</p> <p>The post <a rel="nofollow" href="https://9to5mac.com/2021/09/29/airtags-can-be-weaponized/">AirTags can be weaponized by injecting code; Apple says fix on the way[/url] appeared first on <a rel="nofollow" href="https://9to5mac.com">9to5Mac[/url].</p><div class="feedflare"> <img src="http://feeds.feedburner.com/~ff/9To5Mac-MacAllDay?i=MVWwH9J275c:SFDrUoA43A8:D7DqB2pKExk" border="0"></img> (http://feeds.feedburner.com/~ff/9To5Mac-MacAllDay?a=MVWwH9J275c:SFDrUoA43A8:D7DqB2pKExk) </div><img src="http://feeds.feedburner.com/~r/9To5Mac-MacAllDay/~4/MVWwH9J275c" height="1" width="1" alt=""/> Source: AirTags can be weaponized by injecting code; Apple says fix on the way (http://feedproxy.google.com/~r/9To5Mac-MacAllDay/~3/MVWwH9J275c/) |