Apple Updates AirTag To Combat Stalkers

Apple AirTags are incredibly good at finding things. They can track your items down to 0.1 feet. But that accuracy means that, in the wrong hands, they can be used as sophisticated tracking tools. Apple has said that it will update the iPhone and AirTag software to show a message during setup that using AirTags to track people is a crime in many regions around the world.

The new safety feature comes after reports of women discovering the devices in their personal belongings.

The button-sized devices are designed to work with Apple's 'Find My' network to locate lost items. AirTag lets users keep track of personal items like their keys, wallet, purse, backpack, luggage, and more through the Find My app. Since AirTag’s launch in 2021, users have written in to share countless stories of AirTag being instrumental in reuniting them with the things they value. But the devices can be misused to track people by being hidden in a car, or on a personal item such as a bag.

A number of women have told the BBC that they had been followed by people using AirTags and part of the software changes to make this type misuse harder. The company said its changes to the device will make suspicious tags easier to find and alert users earlier that an AirTag may be travelling with them.

Apple says that every user setting up their AirTag for the first time will see a message warning that using the device to track people without consent is a crime in many regions around the world. The company said it will also add to a feature that makes an AirTag that hasn't been with the person who registered it for an extended period of time, play a sound when moved. This could reveal the presence of an AirTag to a stalking victim.

Currently, iPhone users (and Android users who download an app) receive "unwanted tracking" alerts if an unknown AirTag moves with them. Apple claims that people will be alerted earlier that an unknown AirTag is travelling with them. When people are warned of "unwanted tracking" by an AirTag, users of iPhone 11, iPhone 12, and iPhone 13 devices will be able to use "precision finding", to see the distance and direction to an unknown AirTag when it is in range. Previously only the owner of the AirTag could do this. Now, iOS users can send an unwanted tracking alert to make the suspect AirTag play tones and Apple has said tags will use louder tones in the future to make the tag easier to locate. 

Using AirTag to track people without consent is a crime in many jurisdictions around the world and the software upgrade is  designed to be detected by victims, so that law enforcement can request information about the owner of the AirTag and identify malicious users.

Apple:      BBC:      Reddit:     CNBC:       Guardian:      NYT

You Might Also Read: 

Google Sued over 'Deceptive' Location Tracking:

 

« Rewired: An AI That Can Learn Like A Human Brain
IT Technician Jailed For Revenge Attack After Being Fired »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ShmooCon

ShmooCon

ShmooCon is an annual east coast hacker convention offering three days of demonstrations and discussions of critical infosec issues.

Netskope

Netskope

Netskope, a global cybersecurity leader, is redefining cloud, data, and network security to help organizations apply Zero Trust principles to protect data.

KPN Security

KPN Security

KPN Security is the largest and most complete provider of IT security services in the Netherlands.

Intrusion

Intrusion

Intrusion provides IT professionals with the most robust tool set available for performing in-depth research and analysis of network traffic.

SoftLock

SoftLock

Softlock is a regional leader in Information Security providing solutions, consulting, integration and testing services to protect information assets, identities and supporting infrastructure.

Maven Technologies

Maven Technologies

Maven Technologies specialize in secure data destruction, electronics recycling, asset management, and highly detailed reporting.

BigPanda

BigPanda

BigPanda is the first provider of Autonomous Operations solutions that empower IT Operations at large, complex enterprises.

Hunter Strategy

Hunter Strategy

Hunter Strategy focuses on delivering solutions that are concise, scalable, and target our customer’s complex technical challenges.

Digital Boundary Group (DBG)

Digital Boundary Group (DBG)

Digital Boundary Group (DBG) is an information technology security assurance services firm providing information technology security auditing and compliance assessment services to clients worldwide.

Smoothstack

Smoothstack

Smoothstack is a technology talent incubator whose immersive training program kick starts IT careers and delivers a fresh source of IT talent.

Truly Secure

Truly Secure

Truly Secure is an IT Service Provider that ensures greater efficiency and security within a company's technological environment.

Binarii Labs

Binarii Labs

Binarii are focused on helping enterprises to design and deploy SaaS solutions that utilise DLT (Digital Ledger Technology) effectively, efficiently and sensibly.

B&L PC Solutions

B&L PC Solutions

B&L PC Solutions deliver top cyber security services on Long Island and New York city to protect businesses from evolving online threats.

BreachBits

BreachBits

BreachBits are on a mission to deliver world-class cyber risk insights continuously at scale in situations where knowing the true risk truly matters.

Downdetector

Downdetector

Downdetector helps people all over the world understand disruptions to vital services such as the internet, social media, web hosting platforms, banks, games, entertainment, and more.

CIS Secure

CIS Secure

CIS Secure is an innovator, integrator and expert advisor supporting the broadest portfolio of powerful, mission-specific C5ISR communications and cybersecurity solutions.