Cyber Affairs
No Result
View All Result
  • Login
  • Register
[gtranslate]
  • Home
  • Live Threat Map
  • Books
  • Careers
  • Latest
  • Podcast
  • Popular
  • Press Release
  • Reports
  • Tech Indexes
  • White Papers
  • Contact
Social icon element need JNews Essential plugin to be activated.
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
COMMUNITY
NEWSLETTER
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
NEWSLETTER
No Result
View All Result
Cyber Affairs
No Result
View All Result
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

Apple & Google Working Together to Combat Airtag Stalking

admin by admin
May 4, 2023
in News
A A
0

Airtag, Smart tags are devices used to find the location of lost items like Luggage, keys, purses, or mobile phones.

These location trackers are very handy for people who often lose their valuable items on travel. 

Though this technology has helped numerous people worldwide, they are still being misused by cybercriminal using these trackers for unauthorized tracking or stalking of individuals.

As per reports, Apple and Google have come together to draft a plan for preventing this illegal tracking of individuals.

The draft suggests that these Bluetooth location-tracking devices must be able to show the location of the lost items and be capable of detecting if threat actors are tracking them.

This is a new initiative proposed by both tech giants to prevent attackers from ordinary users who fall prey to them.

Industry manufacturers like Samsung, Tile, Chipolo, eufy Security, and Pebblebee have shown high interest and support towards this draft specification.

The draft specification also shows manufacturers’ best practices and instructions for building their products.

Dave Burke, Google’s Vice President of Engineering for Android, said, “Bluetooth trackers have created tremendous user benefits but also bring the potential of unwanted tracking, which requires industry-wide action to solve. Android has an unwavering commitment to protecting users and will continue to develop strong safeguards and collaborate with the industry to help combat the misuse of Bluetooth tracking devices.”

On the other hand, Ron Huang, Apple’s Vice President of Sensing and Connectivity, said, “Apple launched AirTag to give users the peace of mind of knowing where to find their most important items. We built AirTag and the Find My network with proactive features to discourage unwanted tracking, a first in the industry. We continue to make improvements to help ensure the technology is being used as intended. “This new industry specification builds upon the AirTag protections and, through collaboration with Google, results in a critical step forward to help combat unwanted tracking across iOS and Android.”

Joining the Hands of Apple and Google, the National Network to End Domestic Violence and The Center for Democracy & Technology have supported this initiative.

The draft specification was submitted through the Internet Engineering Task Force (IETF), as stated by Google.

The plan also invited any Interested parties to show their support or provide a suggestion for this proposal.

Building Your Malware Defense Strategy – Download Free E-Book

EHA

Read the full article here

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

[mc4wp_form id=”387″]

Recent News

  • Understanding the Implications & Guarding Privacy- Axios Security Group
  • Hackers Actively Using Pupy RAT to Attack Linux Systems
  • Buckle Up_ BEC and VEC Attacks Target Automotive Industry

Topics

  • AI
  • Books
  • Careers
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • News
  • Podcast
  • Reports
  • Tech Indexes
  • Uncategorized
  • White Papers

Get Informed

[mc4wp_form id=”387″]

Social icon element need JNews Essential plugin to be activated.

Copyright © 2022 Cyber Affairs. All rights reserved.

No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

Copyright © 2022 Cyber Affairs. All rights reserved.

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.