Apple Updates AirTag To Combat Stalkers

Apple AirTags are incredibly good at finding things. They can track your items down to 0.1 feet. But that accuracy means that, in the wrong hands, they can be used as sophisticated tracking tools. Apple has said that it will update the iPhone and AirTag software to show a message during setup that using AirTags to track people is a crime in many regions around the world.

The new safety feature comes after reports of women discovering the devices in their personal belongings.

The button-sized devices are designed to work with Apple's 'Find My' network to locate lost items. AirTag lets users keep track of personal items like their keys, wallet, purse, backpack, luggage, and more through the Find My app. Since AirTag’s launch in 2021, users have written in to share countless stories of AirTag being instrumental in reuniting them with the things they value. But the devices can be misused to track people by being hidden in a car, or on a personal item such as a bag.

A number of women have told the BBC that they had been followed by people using AirTags and part of the software changes to make this type misuse harder. The company said its changes to the device will make suspicious tags easier to find and alert users earlier that an AirTag may be travelling with them.

Apple says that every user setting up their AirTag for the first time will see a message warning that using the device to track people without consent is a crime in many regions around the world. The company said it will also add to a feature that makes an AirTag that hasn't been with the person who registered it for an extended period of time, play a sound when moved. This could reveal the presence of an AirTag to a stalking victim.

Currently, iPhone users (and Android users who download an app) receive "unwanted tracking" alerts if an unknown AirTag moves with them. Apple claims that people will be alerted earlier that an unknown AirTag is travelling with them. When people are warned of "unwanted tracking" by an AirTag, users of iPhone 11, iPhone 12, and iPhone 13 devices will be able to use "precision finding", to see the distance and direction to an unknown AirTag when it is in range. Previously only the owner of the AirTag could do this. Now, iOS users can send an unwanted tracking alert to make the suspect AirTag play tones and Apple has said tags will use louder tones in the future to make the tag easier to locate. 

Using AirTag to track people without consent is a crime in many jurisdictions around the world and the software upgrade is  designed to be detected by victims, so that law enforcement can request information about the owner of the AirTag and identify malicious users.

Apple:      BBC:      Reddit:     CNBC:       Guardian:      NYT

You Might Also Read: 

Google Sued over 'Deceptive' Location Tracking:

 

« Rewired: An AI That Can Learn Like A Human Brain
IT Technician Jailed For Revenge Attack After Being Fired »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

InfoWatch

InfoWatch

InfoWatch solutions allow you to protect data and information assets that are critically important to your business.

European Network for Cyber Security (ENCS)

European Network for Cyber Security (ENCS)

ENCS’s core focus is around educating and solving cyber security challenges in the development and operation of energy grids across Europe.

Leibniz-Rechenzentrum (LRZ)

Leibniz-Rechenzentrum (LRZ)

The LRZ supports ground-breaking research and teaching in a wide range of scientific disciplines including information security and data protection.

Acalvio Technologies

Acalvio Technologies

Acalvio provides Advanced Threat Defense (ATD) solutions to detect, engage and respond to malicious activity inside the perimeter.

Neowave

Neowave

Neowave designs, manufactures and markets strong authentication solutions based on smart card components and digital certificates.

MASS

MASS

MASS provides world-class capabilities in electronic warfare operational support, cyber security, information management, support to military operations and law enforcement.

Lumen Technologies

Lumen Technologies

Lumen is an enterprise technology platform that enables companies to capitalize on emerging applications and power the 4th Industrial Revolution (4IR).

Spire Solutions

Spire Solutions

Spire Solutions is the Middle East & Africa region’s leading cybersecurity solution provider and value-added distributor (VAD).

HOBI International

HOBI International

HOBI International is a leading mobile, IT and data center asset management provider with solutions for device management, reverse logistics, data erasure, refurbishment and recycling.

Stairwell

Stairwell

Stairwell is building a new approach to cybersecurity around a vision that all security teams should be able to determine what’s good, what’s bad, and why.

Aurora Systems Consulting

Aurora Systems Consulting

Aurora is a Cybersecurity solutions provider with a portfolio consisting of security consulting, products and services that proactively prevent, secure and manage advanced threats and malware.

Norma Inc.

Norma Inc.

Norma provides the secured wireless environment (WiFi and Bluetooth) with the unauthorized AP detection, and secures your IoT assets from various threats.

RNTrust

RNTrust

RNTrust provide solutions to meet today’s digital challenges utilizing digital technologies and services to make you more secured in digitally connected environment.

tTech

tTech

tTech is the first and foremost company providing outsourced Information Technology solutions to businesses in Jamaica.

Prikus Tech

Prikus Tech

Prikus is a full-fledged Cyber Security Company helping organizations worldwide to manage cyber risks. We offer Risk & Compliance Services, Security Testing & Managed Security Services.

Unified Infotech

Unified Infotech

Unified Infotech is a trusted partner for IT and software solutions dedicated to empowering businesses.