This Week in Security: Find My Keylogger, Zephyr, and Active Exploitation

Keyloggers. Such a simple concept — you secretly record all the characters typed on a keyboard, and sort through it later for interesting data. That keyboard sniffer could be done …read more Continue reading This Week in Security: Find My Keylogger, Zephyr, and Active Exploitation

Check Your Mailbox Using The AirTag Infrastructure

A small round NRF51822 board glued to the underside of a mailbox lid, with a small vibration sensor attached

When a company creates an infrastructure of devices, we sometimes subvert this infrastructure and use it to solve tricky problems. For example, here’s a question that many a hacker has …read more Continue reading Check Your Mailbox Using The AirTag Infrastructure

Get Apple to Track Your Bluetooth Devices For You

Apple’s “Find My” service allows users to track their missing devices by leveraging a worldwide network of location-aware iGadgets. With millions of iPhones and Macs out in the wild listening for the missing device’s Bluetooth advertisements and relaying their findings …read more

Continue reading Get Apple to Track Your Bluetooth Devices For You