AirTag, the Bluetooth tracker launched by Apple only 10 days ago, has already been accessed and modified without authorization, writes news.ro.

Urmărește mai jos producțiile video ale Economedia:

- articolul continuă mai jos -

A German researcher managed to access and modify the microcontroller used by AirTag, and the tracking software used by the device.

The “breaking” of AirTag is comparable to the jailbreak made on iPhones. Once it gains access to the software, the hacker can change the behavior of the product and its functions.

Analize Economedia

om robot industria automotive
studenti, universitate, academie, absolventi
Piața de curierat, România, Cargus, Sameday, Fan Courier, Profit net, Cifră de afaceri, Pachet
Fermier cu legume
Linie asamblare uzina Dacia Mioveni (4)
Imagine apa piscină
Job, căutare de job, șomeri, tineri șomeri
Knauf Insulation, fabrica vata minerala sticla
George-Simion-Nicusor-Dan (1)
Steaguri Romania si UE
bani, lei, finante, bancnote, euro, 5 lei
bec iluminat, becuri
piata auto, uniunea europeana, romania
recesiune
sua dolari drapel ajutor steag flag us bani karolina-grabowska-4386425
Piata 9 restaurant
recesiune
tineri programatori foto
Corinthia
criza de ouă din SUA
2265634-800x534
retea electrica - Transelectrica
digitalizare, calculator, cod, programare
statele unite, sua, washington, china, beijing, putere, geopolitica, razboi economic comercial, sanctiuni economice
antreprenoare, femeie, business, tech
tineri joburi IUF- The International University Fair
parc nufarul
economie razboi bani
romania germania
Concedieri scaderi economie

The German researcher has chosen to change the NFC URL to demonstrate the vulnerability that AirTag suffers from.

Normally, when an object to which an AirTag has been attached is placed in “Lost Mode” (it is declared lost), the URL opens Find My application, to make it easier to locate the object on the map.

However, with access to the software used by the AirTag, a hacker can change the URL, which can lead to another website. For example, it can send the user to a site that asks for their personal data, in an attempt to phish personal information.

Apple has not yet responded to the release of this information but is expected to come up as soon as possible with a patch or server-level limitation.