AirPlay and CarPlay flaw discovered that could be exploited by hackers

A new security flaw dubbed "Airborne" It could allow hackers to access your information or even listen to your conversations through speakers and TVs with AirPlay or the CarPlay system. from your car. We'll explain how it works so you know how to avoid it.

A group of researchers has discovered a security flaw in AirPlay and CarPlay. Both systems use a Wi-Fi connection to operate, and it's precisely through the Wi-Fi network that they could access your information. In the case of AirPlay, the hacker should access the WiFi network to which you're connected, so if your home network has adequate security measures, you can rest easy, but if someone accesses your Wi-Fi and you have an AirPlay speaker or a TV compatible with the Apple system, they could listen to your conversations through those devices' microphones. In the case of CarPlay, access would be through the Wi-Fi network generated by the car to connect to your iPhone. This network may have low-security passwords depending on the vehicle manufacturer, and hackers would be more easily able to access it. Cars with wired CarPlay are not immune, as they could also access your data by accessing the USB port.

Apple is already aware of the security flaws and has fixed them., so when we talk about devices manufactured by Apple (like the HomePod) we can rest easy, but other speakers or CarPlay systems are not known when they will be updated, or even if they'll ever be updated to fix the bug. If you have a product that's susceptible to this problem, you should contact the manufacturer to find out if they plan to address it. When Apple says that opening its features to all manufacturers could pose security issues, this is a very clear example of how right they are.


It may interest you:
How to use HomePod without a WiFi connection
Follow us on Google News

Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: AB Internet Networks 2008 SL
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.