However, this isn't the most effective, since AirTags are so small and can be easily hidden. The most basic form of protection is to manually search yourself and your car for places where an AirTag may have been slipped - the pockets of your clothes or bags, or under cushions, for example. Patrick Holland/CNET Manually search yourself But using a device like an AirTag to monitor someone's location could be a first stage of stalking, particularly if the abuser doesn't have physical access to your phone or laptop, said Victor Chebyshev, lead security researcher on the Global Research and Analysis Team at security firm Kaspersky.Ī hidden AirTag might not be as obvious as one on a keychain on your bag. The release of a product like AirTags is in some ways similar to a new operating system, she added - Apple will find issues and then mitigate them in later updates, as we've already seen.ĪirTags are different from stalkerware, or software that someone installs on your device without your knowledge or consent that transmits your private information - like your text messages, social media communications and your location - to their device. Sarah Tew/CNETĪny time a new Internet of Things product is introduced, it's going to raise some red flags, said Zarmeena Waseem, director of cybersecurity education at the National Cybersecurity Alliance. Apple has built in more protections to prevent AirTags from being used to track people.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |