An exploit in Apple’s Find My network allows hackers to turn any device with Bluetooth, such as a phone or a computer, into an AirTag tracker.
Find My exploit turns any device into an AirTag tracker

An exploit in Apple’s Find My network allows hackers to turn any device with Bluetooth, such as a phone or a computer, into an AirTag tracker.
In this comprehensive tutorial, we’ll explain Advanced Data Protection and show you how to enable it on your Apple Account to add end-to-end encryption for additional items like iCloud Notes, Photos, and more.
In case you weren’t already aware, there was a Safari-based remote code execution (RCE) bug in the wild that Apple patched in a rapid security update for iOS & iPadOS 16.5.1 dubbed CVE-2023-37450, and ENKI WhiteHat is credited with the original proof of concept (PoC) showcasing the bug. But what if we told you someone made an exploit out of it? Interestingly enough, that seems to be exactly what has happened.
Download Apple's iOS and iPadOS 18.3.1, watchOS 11.3.1, macOS Sequoia 15.3.1 and visionOS 2.3.1 updates to fix an actively exploited vulnerability.
The United Kingdom government wants Apple to break iCloud encryption and provide backdoor access to all user content anywhere in the world.
Interested in a new and nonchalant way to lock your iPhone when you’re finished using it? If so, then make sure you take some time to check out a free jailbreak tweak called GetDown by iOS developer uz.ra.
Kensington Security Mount for the redesigned Mac mini has arrived in Apple’s stores to protect your machine against grab-and-run thefts.
We’ve previously discussed the importance of changing your device’s root password after jailbreaking so that unauthorized individuals can’t exploit the default password to SSH into your handset and make potentially malicious changes unbeknownst to you.
Learn what Apple's Rapid Security Response feature is, how it keeps your iPhone, iPad, and Mac protected by delivering critical patches, and how to turn it off.
Starting with the iPhone 15 lineup, Apple moved from its proprietary Lightning iPhone connector to the more universally accepted USB-C connector for charging and data transfer. In doing so, Apple also incorporated an all-new USB-C controller chip that had never existed in any other Apple device before it.
Apple device security nerds, unless they’ve been living under a rock, have probably heard about CVE-2024-54498, or perhaps better known as the sharedfilelistd vulnerability. It was one of several vulnerabilities that Apple claims to have patched in macOS Sequoia 15.2, macOS Sonoma 14.7.2, and macOS Ventura 13.7.2, citing details shared on Apple’s About the security content of macOS Sequoia 15.2 web page.