Another example of using Bluetooth for something it was not intended for

Earlier this week, I wrote about the Bluetooth weaknesses that would allow someone to drive off with your Tesla: How to unlock a Tesla that does not belong to you! – Smart Thinking Solutions Here is a research paper, from UC San Diego, that examines how the cryptographic anonymity that …

Research that shows it is possible to hack an iPhone when it is turned off and drive off in your Tesla – UPDATED 18 May 2022 with real world examples of Bluetooth vulnerabilities

This is theoretical research that shows it may be possible to run malware on an iPhone that is still active even when the phone is powered off, by abusing a lack of authentication in the Bluetooth system and the fact that the Bluetooth is used in the Apple “find my…” …

Apple Personal Safety guide

apple logo

Apple has issued a straight forward document advising people how they can stay safe when using their products. Personal Safety User Guide – Apple Support (UK) There are stalking concerns around it’s AirTag and Find My products. Apple unveils AirTag safety guide amid stalker fears – BBC News