Small Bluetooth tags for finding lost things have become a real gift for forgetful and frequent travelers. The coin-sized device contains a battery and a Bluetooth Low Energy (BLE) transmitter, and an application on a modern smartphone allows you to protect yourself determine the location of the beacon with an accuracy of several centimeters. If forgotten keys with a tag are far from the owner and his smartphone, other people’s smartphones can help find them: both Apple and Google have deployed a global network in which each smartphone reports the location of the nearest beacons to the server, so through a proprietary application (Locator or Find my … for iOS, Find my Accessory for Android) you can find the lost item, even if the distance to it exceeds the Bluetooth access radius of your phone. The main thing is that at least someone else’s smartphone with both Bluetooth and Internet access is nearby.
While the most popular tracker is the Apple AirTag
There are several other accessories that work on the same principle and are sometimes compatible with each other (Chipolo, Eufy, Filo, Samsung SmartTag, Tile, and others). Sometimes tracking features are built directly into frequently lost accessories, such as Bluetooth headsets and headphones.
The possibilities of remote tracking have quickly been appreciated not only by forgetful people, but also by scammers and people-watchers. By planting your AirTag on a victim — for example, by putting it in a pocket of a handbag or under a car’s license plate — you can track a person’s movements without their knowledge. Thieves use this technology before stealing expensive cars , and stalkers and jealous partners — for surveillance and stalking . How can you protect yourself from such an unwanted gift?
First generation of AirTag protection
As soon as the first reports of real cases of surveillance via AirTag appeared, Apple introduced several protective measures to protect yourself reduce the likelihood of successful stalking. Firstly, AirTag was equipped with a speaker. If the Bluetooth tag is away from the smartphone it is connected to, it will emit a loud beep from time to time. Secondly, iOS 14.5 introduced a function that notifies the smartphone owner if the same foreign AirTag is detected near it for a long time and at all movements. If this happens, you can protect yourself turn on the sound on this beacon to find it physically, and also check the AirTag serial number. Sometimes such a situation is quite innocent, if it is a tag hanging on the keys of a relative or friend with whom you are traveling together, or a beacon that parents put in a child’s backpack. In this case, the warning about the “foreign” AirTag can be disabled temporarily or permanently.
Unfortunately, these measures were not enough. They did not help Android owners in any way, and attackers bypassed the sound protection by disconnecting or damaging the speaker themselves or buying “silent” AirTags on online flea markets.
How to Protect Yourself from AirTags and Other Bluetooth Trackers in 2024
Apple and Google have teamed up to do this , implementing this functionality in iOS 17.5 and Android (the update is available for all versions, starting with the sixth). Tech giants have proposed a formal DULT (detecting unwanted location trackers) standard, which may become industrial in the future. In the meantime, some tag manufacturers jordan whatsapp data have promised to support the current specification: Chipolo, Eufy, Jio, Motorola, and Pebblebee.
For Android smartphone owners who want to comprehensively protect their privacy
As well as for those whose smartphone does not receive updates from Google, this problem is solved by the new version of Kaspersky protection for Android .
Starting with version 11.113, our Protect yourself not only detects stalker apps on your smartphone that are tracking you , but also warns about planted Bluetooth devices, including wireless tags. The app shows a list of detected suspicious devices, but if it is your wife’s keychain, you can add it to the trusted list. The function is available even in the free version of the app, but to activate it, you need to enable it and configure it according to the instructions .
What to do if you find an unknown Bluetooth tag
There are no clear rules on this matter, since everything depends on the personal situation of the victim of surveillance.
Having received a warning on your Protect yourself smartphone, the first thing you need to do is find the tracker and examine it carefully. To do this, you can use the “precision finding” function, for example, according to this instruction . If it is not clear from the appearance whether this is the tracker that the application warns about, you need to check the serial number.
This will help to exclude innocent scenarios
You accidentally took someone else’s headset instead of your own. A colleague dropped their keys in your car. In this case, it is enough to protect yourself return the lost item to the owner. Another situation of conditionally legitimate tracking is a beacon attached to rented equipment. This is especially true for cars and expensive electronics. In this case. You need to discuss surveillance with the person who gave the item out for rent. Decide whether it is acceptable for you. Such measures to protect property should be described in the rental agreement.
The situation with malicious surveillance is more complicated
If we are talking about victims of domestic violence, people going through a difficult divorce. Other situations in which the detection of surveillance may provoke its organizer to aggressive actions. It is recommended to remain secretive. The surveillance must be reported to protect yourself law enforcement agencies. But in such a way as not to reveal the fact of its discovery to the organizer. It is important that the beacon itself does not light up at the police station. To do this, you can either remove the battery from it, or organize a meeting with authorities on neutral territory.
If there is no risk of violence, you can simply hand the beacon over to the police. Throwing it away or turning it off is not enough. You need to prevent the attackers from starting all over again.
And for comprehensive privacy protection
Use our most advanced security solution, Kaspersky Premium. Which not only neutralizes viruses, but also provides the world’s best protection against phishing. Allows you to detect intrusions into your Wi-Fi networks , protect yourself personal data. Payment information online, notifies you of password leaks and identity theft. Does many other useful things to keep you completely protected.
We’ve prepared a detailed step-by-step guide to help you choose the best subscription and quickly set everything up from scratch. Switch from other vendors to our applications. The most awarded of all security solutions in the world.
Phishing-as-a-Service: Everything for Fishing and Hunting
The center of operations of this phishing service, as already mentioned above, is Telegram. The creators of ONNX make full use of the protect yourself possibilities of automation – all interaction with buyers occurs through Telegram bots.
The attackers provide phishing services on a subscription basis.
Even small cybercriminals can afford such expenses. At the same time, with a small investment, they get access to very effective phishing services. All that remains for them is to choose a suitable target and come up with a monetization scheme.
How to Protect Your Organization from Advanced Phishing Attacks
This is what makes Phishing-as-a-Service a dangerous threat. Such a model significantly expands the range of attackers who have serious tools at protect yourself their disposal. You need to consider the possibility of an attack on your organization using advanced phishing services. Take care of protection against them. Here is what we can advise here: