sm.badsha111

24/7 Customer Support

WhatsApp: +8801792717002

The risks of using an Apple Air Tag and other pagers

Mobile lead B2B Fax Email list is required for Marketing and advertising online business. You can get here world wide Business and Consumer Mobile lead Fax Email List. You can use phone list for your business offer SMS and cold calling campaign. At present if you need to promote your online business with digital marketing. Digital marketing is one of the best ways to grow your business. So if you want to develop your business by digital Mobile lead marketing, then you must be needed right and valid database list like fax list, phone number list, email database list. If your business is on the brink of failure, then you need a direct mass mobile lead marketing campaign that B2C work in a small amount of time. One of B2B best ways to achieve success in less than a month is through the use of mobile lead fax lists.

The risks of using an Apple Air Tag and other pagers

Among the most recent additions to the Apple catalog is the Air Tag, a tracking device that allows you to locate your objects from your mobile devices using the “Find your iPhone or iPad” through Bluetooth, however, this product has already registered one of his first problems, which seems to be very serious.

Although the Air Tag is not a 100% innovative product, locator tags have been targeted by large technology companies as one more business opportunity for 2021, despite the fact that they have been on the market for several years.

But what happened? Just 10 days after its launch, a German managed to hack into the system of the new product that could well threaten the privacy Albania Email List of users, who in one way or another already share it with the company on many occasions when carrying one of their devices.

Despite the fact that Apple’s own website indicates that user privacy is high since the device does not store information or your location history, that only you can see where it is and even that all data remains encrypted Since neither Apple will have access to your location nor the identity of the device that helps you find it, there are always ways to attack user privacy.

The case of the German
The Air Tags could be placed on the key chain so as not to lose the keys, suitcases, valuables or anything you want to locate or be afraid of losing, except children and pets, to be located within a range of 15 meters with Bluetooth or anywhere around the world with the help of other users and the Apple network.

See also  Trailers of the Week: The Great The French Dispatch, A Look at The Batman, and More

Given how shocking the product sounds on its own, a German security expert shared on Twitter (Stack Smashing) claimed that he hacked the device, and demonstrated it with a video posted on the social network.

he managed to have control of the Air Tag’s micro controller, which allows him to perform actions such as changing the website that the device shows to people who connect by NFC to try to return the object to its owner.

The risks that the hack presented to Apple
By being able to make the change to the page that is displayed when you lose your device, replacing Apple’s contact information page, this could mobile lead generate a phishing trend , which translates to impersonating the identity of the company and redirecting the user to a malicious website in which you could be scammed, either by asking for your personal passwords or other data.

Although this situation was carried out under a citizen who did not seek more than to verify the security of the device, in the wrong hands this security hole would have caused problems for the brand by exposing user information in a “very simple” way .

 

Leave a comment

Your email address will not be published.