Apple Updates AirTag To Combat Stalkers

Apple AirTags are incredibly good at finding things. They can track your items down to 0.1 feet. But that accuracy means that, in the wrong hands, they can be used as sophisticated tracking tools. Apple has said that it will update the iPhone and AirTag software to show a message during setup that using AirTags to track people is a crime in many regions around the world.

The new safety feature comes after reports of women discovering the devices in their personal belongings.

The button-sized devices are designed to work with Apple's 'Find My' network to locate lost items. AirTag lets users keep track of personal items like their keys, wallet, purse, backpack, luggage, and more through the Find My app. Since AirTag’s launch in 2021, users have written in to share countless stories of AirTag being instrumental in reuniting them with the things they value. But the devices can be misused to track people by being hidden in a car, or on a personal item such as a bag.

A number of women have told the BBC that they had been followed by people using AirTags and part of the software changes to make this type misuse harder. The company said its changes to the device will make suspicious tags easier to find and alert users earlier that an AirTag may be travelling with them.

Apple says that every user setting up their AirTag for the first time will see a message warning that using the device to track people without consent is a crime in many regions around the world. The company said it will also add to a feature that makes an AirTag that hasn't been with the person who registered it for an extended period of time, play a sound when moved. This could reveal the presence of an AirTag to a stalking victim.

Currently, iPhone users (and Android users who download an app) receive "unwanted tracking" alerts if an unknown AirTag moves with them. Apple claims that people will be alerted earlier that an unknown AirTag is travelling with them. When people are warned of "unwanted tracking" by an AirTag, users of iPhone 11, iPhone 12, and iPhone 13 devices will be able to use "precision finding", to see the distance and direction to an unknown AirTag when it is in range. Previously only the owner of the AirTag could do this. Now, iOS users can send an unwanted tracking alert to make the suspect AirTag play tones and Apple has said tags will use louder tones in the future to make the tag easier to locate. 

Using AirTag to track people without consent is a crime in many jurisdictions around the world and the software upgrade is  designed to be detected by victims, so that law enforcement can request information about the owner of the AirTag and identify malicious users.

Apple:      BBC:      Reddit:     CNBC:       Guardian:      NYT

You Might Also Read: 

Google Sued over 'Deceptive' Location Tracking:

 

« Rewired: An AI That Can Learn Like A Human Brain
IT Technician Jailed For Revenge Attack After Being Fired »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Zerto

Zerto

Zerto provides enterprise-class disaster recovery and business continuity software specifically for virtualized data centers and cloud environments.

SharkGate

SharkGate

SharGate provide a cloud-based website security solution to protect websites from being hacked.

Illumio

Illumio

Illumio delivers adaptive security for every computing environment, protecting the 80% of data center and cloud traffic missed by the perimeter.

TokenOne

TokenOne

TokenOne is a Cyber Security software company that makes it easy to replace passwords, tokens and other forms of authentication with a more secure solution.

Cryptovision

Cryptovision

Cryptovision GmbH is one of the leading specialists for modern, user-friendly cryptography and solutions for secure electronic identities.

CIRISK

CIRISK

CIRISK offers a wide range of services from consulting to audit or project management to help you develop your cyber security or information security strategy.

Netacea

Netacea

Netacea provides a revolutionary bot management solution that protects websites, mobile apps and APIs from malicious attacks such as scraping, credential stuffing and account takeover.

JM Search

JM Search

JM Search’s Information Technology Executives Practice sources the most sought-after technology roles including CIO, CTO, CISO, CDO and other senior posts.

Neovera

Neovera

Neovera is a trusted provider of managed services including cyber security and enterprise cloud solutions, committed to delivering results through the innovative use of scalable enterprise-grade tech.

Cyber Security for Europe (CyberSec4Europe)

Cyber Security for Europe (CyberSec4Europe)

CyberSec4Europe is designing, testing and demonstrating potential governance structures for a European Cybersecurity Competence Network.

Cycurion

Cycurion

Cycurion is a global leading provider of Network Communications and Information Technology Security Solutions.

Evo Security

Evo Security

Evo Security is an Identity and Access Management company focused exclusively on serving MSPs, MSSPs and their SMB and Mid-Market customers.

ERCOM

ERCOM

Ercom, a subsidiary of the Thales Group, is a French company known for its mobility security solutions.

Astran

Astran

At Astran, we revolutionize data security by introducing a groundbreaking solution for data confidentiality headaches.

Triovega

Triovega

Triovega are a leading provider for production security and efficiency. Our solutions enhance OT security, and reduce production downtime.

Krash Consulting

Krash Consulting

Krash Consulting is a premier provider of Cyber Security solutions, offering a range of services to safeguard businesses against cyber-attacks, minimize fraud, and protect brand reputation globally.