Security Researcher Successfully Hacked Apple's Just-Released AirTag
City of Tulsa shutters systems following a ransomware attack, CISA publishes analysis of Five Hands ransomware, US and UK intel agencies publish details on SVR's hacking techniques, more
Please take a look at my column today for CSO Online that examines the OT cybersecurity implications of the Colonial Pipeline ransomware attack. For more on that attack, check out our special report on this major development.
German security researcher Stack Smashing said he was able to break into the microcontroller of Apple’s just-released AirTag and modify elements of the item tracker software.
The researcher was able to modify the AirTag NFC URL for Lost Mode to open a non-related URL, which miscreants could use for phishing or other malicious activity. It remains to be seen if Apple can implement a server-side blocking mechanism to prevent a modified AirTag from accessing the Find My Network. (José Adorno / 9to5Mac)
Related: iDownloadBlog.com, 9to5Mac, AppleInsider, Slashdot, iPhone Hacks, Macworld, Macworld, Times of India, Ubergizmo, iDownloadBlog.com, WCCFtech, SlashGear » security, Slashdot, The 8-bit
Keep reading with a 7-day free trial
Subscribe to Metacurity to keep reading this post and get 7 days of free access to the full post archives.