Apple

Hackers Exploit Apple's Find My Network to Track Any Bluetooth Device: What You Need to Know

Security researchers have discovered a way to exploit Apple's Find My network to track any Bluetooth device, effectively turning them into makeshift AirTags.

Researchers from George Mason University have discovered a method to exploit Apple's Find My network, enabling the tracking of any Bluetooth device as if it were an AirTag. The attack, dubbed 'nRootTag,' works by tricking the Find My network into accepting non-Apple hardware as legitimate trackable devices through a process that involves manipulating cryptographic keys and Bluetooth addresses. Experiments showed a 90% success rate, allowing for the tracking of various devices, including smart TVs, VR headsets, and e-bikes. The researchers used powerful GPU banks to perform the necessary computations quickly. While the attack requires significant resources, making it less likely to be used against the general public, it could still pose a threat in targeted scenarios, such as espionage. Apple was notified of the issue in July 2024, but the problem is expected to persist for years due to slow user updates.

#Apple #FindMy #Bluetooth

Latest News

xBloom

xBloom Studio: The Coffee Maker That Puts Science in Your Cup

2 weeks ago

HomeKit

Matter 1.4.1 Update: Daniel Moneta Discusses Future of Smart Home Interoperability on HomeKit Insider Podcast

2 weeks ago

Mac

OWC Unleashes Thunderbolt 5 Docking Station with 11 Ports for M4 MacBook Pro

2 weeks ago

Technology

Nomad Unveils Ultra-Slim 100W Power Adapter for On-the-Go Charging

2 weeks ago

iOS

iOS 19 Set to Debut Bilingual Arabic Keyboard and Virtual Calligraphy Pen for Apple Pencil

2 weeks ago

Apple

Big Tech Lawyers Accused of Encouraging Clients to Break the Law

2 weeks ago