Apple Updates AirTag To Combat Stalkers

Apple AirTags are incredibly good at finding things. They can track your items down to 0.1 feet. But that accuracy means that, in the wrong hands, they can be used as sophisticated tracking tools. Apple has said that it will update the iPhone and AirTag software to show a message during setup that using AirTags to track people is a crime in many regions around the world.

The new safety feature comes after reports of women discovering the devices in their personal belongings.

The button-sized devices are designed to work with Apple's 'Find My' network to locate lost items. AirTag lets users keep track of personal items like their keys, wallet, purse, backpack, luggage, and more through the Find My app. Since AirTag’s launch in 2021, users have written in to share countless stories of AirTag being instrumental in reuniting them with the things they value. But the devices can be misused to track people by being hidden in a car, or on a personal item such as a bag.

A number of women have told the BBC that they had been followed by people using AirTags and part of the software changes to make this type misuse harder. The company said its changes to the device will make suspicious tags easier to find and alert users earlier that an AirTag may be travelling with them.

Apple says that every user setting up their AirTag for the first time will see a message warning that using the device to track people without consent is a crime in many regions around the world. The company said it will also add to a feature that makes an AirTag that hasn't been with the person who registered it for an extended period of time, play a sound when moved. This could reveal the presence of an AirTag to a stalking victim.

Currently, iPhone users (and Android users who download an app) receive "unwanted tracking" alerts if an unknown AirTag moves with them. Apple claims that people will be alerted earlier that an unknown AirTag is travelling with them. When people are warned of "unwanted tracking" by an AirTag, users of iPhone 11, iPhone 12, and iPhone 13 devices will be able to use "precision finding", to see the distance and direction to an unknown AirTag when it is in range. Previously only the owner of the AirTag could do this. Now, iOS users can send an unwanted tracking alert to make the suspect AirTag play tones and Apple has said tags will use louder tones in the future to make the tag easier to locate. 

Using AirTag to track people without consent is a crime in many jurisdictions around the world and the software upgrade is  designed to be detected by victims, so that law enforcement can request information about the owner of the AirTag and identify malicious users.

Apple:      BBC:      Reddit:     CNBC:       Guardian:      NYT

You Might Also Read: 

Google Sued over 'Deceptive' Location Tracking:

 

« Rewired: An AI That Can Learn Like A Human Brain
IT Technician Jailed For Revenge Attack After Being Fired »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Civica

Civica

Civica provides cloud-based managed IT services, hosting and outsourcing.

Cellebrite

Cellebrite

Cellebrite delivers comprehensive solutions for mobile data forensics and mobile lifecycle management.

Sysmosoft

Sysmosoft

Sysmosoft specializes in providing highly secured telecommunication solutions for mobile devices for companies requiring protected access to sensitive data remotely.

Modux

Modux

Modux focus on a number of core competencies across cyber security including; cyber intelligence & analytics, penetration testing and training.

Bounga Informatics

Bounga Informatics

Bounga Informatics provides Digital Forensics, E-Discovery, and Endpoint Security software, hardware, and training in Singapore and other countries in Asia Pacific.

State e-Government Agency (SEGA) - Bulgaria

State e-Government Agency (SEGA) - Bulgaria

The State e-Government Agency (SEGA) is responsible for matters relating to electronic governance in Bulgaria.

IXDen

IXDen

IXDen provides a novel software-based approach to OT systems protection, covering Industrial IoT cybersecurity and sensor data integrity.

AVORD

AVORD

AVORD is a cloud-based security testing platform that allows clients to manage security testing requirements in a far more productive and efficient way.

Cyber Threat Alliance

Cyber Threat Alliance

CTA is working to improve cybersecurity of our digital ecosystem by enabling near real-time cyber threat information sharing among companies and organizations in the cybersecurity field.

Stratus Cyber

Stratus Cyber

Stratus Cyber is a premier Cyber Security company specializing in Managed Security Services. Our services include Blockchain Security, Pentesting, and Compliance Assessments.

Athreon

Athreon

Athreon utilizes a fusion of AI technology, human interpretation, and the latest in cybersecurity to deliver sound business solutions that help our clients make better data-driven decisions.

Scrut Automation

Scrut Automation

Scrut Automation's mission is to make compliance less painful and time consuming, so that businesses can focus on running their business.

OX Security

OX Security

OX is a DevOps software supply chain security solution. Teams can verify the integrity and security of every artifact using a pipeline bill of materials (PBOM).

Somos

Somos

From voice to messaging to fraud prevention and beyond, Somos are committed to developing innovative solutions that ensure that our ability to maintain trustworthy connections never stops.

MergeBase

MergeBase

Reduce software supply chain risk with MergeBase proven Software Composition Analysis (SCA).

NetDescribe

NetDescribe

NetDescribe, part of Xantaro Group, advises and supports companies in building secure and stable IT environments.