When you purchase through links on our site, we may earn an affiliate commission.Heres how it works.

Another experiment let them recreate the path of a persons flight by tracking a games console.

Proximity wasnt a factor either, with hackers able to do all this from thousands of miles away.

Find My iPhone

The hack effectively turns any Bluetooth enabled device into a fake AirTag

With the attack method we introduced, the attacker can achieve this.

What happens next?

That update was released on December 11 2024.

Person holding Apple AirTag

The hack effectively turns any Bluetooth enabled device into a fake AirTag

Apple also emphasized that the issue is not a vulnerability with Apple products.

It’s unclear whether this exploit has been utilized by bad actors right now.

They should also keep software up to date and consider privacy-focused operating systems for better protection against prying eyes.

AirTag vs. Tile

Apple AirTag Loop - Deep Navy

Prime

Apple - AirTag Loop - White

Best Buy

Apple AirTag | Verizon

Verizon

iPhone 16 Pro shown held in hand

iPhone 16 Pro shown held in hand

iPhone 15 Pro Max shown in hand

An Apple AirTag, held between a user�s fingers in front of a blurred green background

Apple iPhone 16 held in the hand.

Green skull on smartphone screen.

Galaxy S25 Plus held in the hand.

A woman�s hands holding a smartphone with a lock symbol on it, in front of a laptop that also has a lock symbol on it.

NYTimes Connections

iPhone X in hand

Michael B. Jordan as Stack and Smoke in "Sinners" movie

Casely Power Pod recall image

NYT Strands on a cellphone