Apple Updates AirTag To Combat Stalkers

Apple AirTags are incredibly good at finding things. They can track your items down to 0.1 feet. But that accuracy means that, in the wrong hands, they can be used as sophisticated tracking tools. Apple has said that it will update the iPhone and AirTag software to show a message during setup that using AirTags to track people is a crime in many regions around the world.

The new safety feature comes after reports of women discovering the devices in their personal belongings.

The button-sized devices are designed to work with Apple's 'Find My' network to locate lost items. AirTag lets users keep track of personal items like their keys, wallet, purse, backpack, luggage, and more through the Find My app. Since AirTag’s launch in 2021, users have written in to share countless stories of AirTag being instrumental in reuniting them with the things they value. But the devices can be misused to track people by being hidden in a car, or on a personal item such as a bag.

A number of women have told the BBC that they had been followed by people using AirTags and part of the software changes to make this type misuse harder. The company said its changes to the device will make suspicious tags easier to find and alert users earlier that an AirTag may be travelling with them.

Apple says that every user setting up their AirTag for the first time will see a message warning that using the device to track people without consent is a crime in many regions around the world. The company said it will also add to a feature that makes an AirTag that hasn't been with the person who registered it for an extended period of time, play a sound when moved. This could reveal the presence of an AirTag to a stalking victim.

Currently, iPhone users (and Android users who download an app) receive "unwanted tracking" alerts if an unknown AirTag moves with them. Apple claims that people will be alerted earlier that an unknown AirTag is travelling with them. When people are warned of "unwanted tracking" by an AirTag, users of iPhone 11, iPhone 12, and iPhone 13 devices will be able to use "precision finding", to see the distance and direction to an unknown AirTag when it is in range. Previously only the owner of the AirTag could do this. Now, iOS users can send an unwanted tracking alert to make the suspect AirTag play tones and Apple has said tags will use louder tones in the future to make the tag easier to locate. 

Using AirTag to track people without consent is a crime in many jurisdictions around the world and the software upgrade is  designed to be detected by victims, so that law enforcement can request information about the owner of the AirTag and identify malicious users.

Apple:      BBC:      Reddit:     CNBC:       Guardian:      NYT

You Might Also Read: 

Google Sued over 'Deceptive' Location Tracking:

 

« Rewired: An AI That Can Learn Like A Human Brain
IT Technician Jailed For Revenge Attack After Being Fired »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Bundesdruckerei

Bundesdruckerei

Bundesdruckerei specializes in secure identity technologies and services for protecting sensitive data, communications and infrastructures.

mmCERT

mmCERT

mmCERT is the national Computer Emergency Response Team for Myanmar.

Smokescreen

Smokescreen

Smokescreen's IllusionBLACK employs deception technology to detect, deflect and defeat advanced hacker attacks.

Vintegris

Vintegris

Vintegris are a Certification Authority and manufacturer of innovative systems and applications for the full cycle of digital identity.

Evanston Technology Partners (ETP)

Evanston Technology Partners (ETP)

ETP provides services and solutions to enable and transform businesses in the areas of cybersecurity, data protection, and efficient operations practices.

Secure Blockchain Technologies (SBT)

Secure Blockchain Technologies (SBT)

SBT is a team of Enterprise IT Security Professionals weaving security and Blockchain Technology into our customer’s operational fabric.

Authomize

Authomize

Authomize aggregates identities and authorization mechanisms from any applications around your hybrid environment into one unified platform so you can easily and rapidly manage and secure all users.

SynSaber

SynSaber

SynSaber is a data collection, detection, and visibility solution that forms the foundation of industrial cybersecurity.

Cybrella

Cybrella

Cybrella offers professional cybersecurity services for small to medium sized businesses and to larger enterprises looking to expand their cybersecurity capabilities.

Dawgen Global

Dawgen Global

Dawgen Global is an integrated multidisciplinary professional service firm in the Caribbean Region providing a range of services including Risk Management and Information Systems Assurance.

Harbottle & Lewis

Harbottle & Lewis

Harbottle & Lewis is a leading UK-based law firm focused on the Private Client and Technology, Media and Entertainment sectors.

Proximus Ada

Proximus Ada

Proximus Ada is the first Belgian center of excellence combining artificial intelligence and cybersecurity.

Snare

Snare

Snare is a comprehensive set of event monitoring and analysis tools designed to address critical auditing and security requirements.

Standard Notes

Standard Notes

Standard Notes is a secure digital notes app that protects your notes and files with audited, industry-leading end-to-end encryption.

Oak9

Oak9

Oak9's Security as Code platform dynamically secures Infrastructure as Code (IaC) and deployed cloud workloads, automatically.

Neo Auth

Neo Auth

Neo Auth is an identity and access management solution to help organizations optimize their cybersecurity processes.