With that in mind, it's worth seeing if the company's underlying fundamentals have been the driver of long term performance, or if there are some discrepancies. Only time will tell if there is still too much optimism currently reflected in the share price. In that time, the share price has soared some 476% higher! So it might be that some shareholders are taking profits after good performance. But that doesn't change the fact that the returns over the last half decade have been spectacular. ( NASDAQ:PLUG) shareholders might understandably be very concerned that the share price has dropped 53% in the last quarter. The researcher said Apple could mitigate these attacks by ensuring the Bluetooth devices connecting to an iPhone are legitimate and valid, and also reducing the distance at which iDevices can connect to other devices using Bluetooth.Īpple did not respond to a request for comment.Plug Power Inc. Anthony said he is not releasing details of that technique “due to major concerns,” such as giving others the ability to send spam pop-ups “across vast distances, potentially spanning miles.” Using this device, the researcher was able to mimic an Apple TV and spam nearby devices.Īnthony said that he devised an attack that can work over “thousands of feet,” using an “amplified board” that can broadcast Bluetooth packets at a higher range than regular Bluetooth Low Energy devices. The researcher used a $70 contraption made of a Raspberry Pi Zero 2 W, two antennas, a Linux-compatible Bluetooth adapter and a portable battery. During the Def Con hacking conference in Las Vegas in August, a researcher scared and confused attendees by making alerts pop-up on their iPhones. ![]() Security researchers have been focusing on highlighting how malicious hackers could abuse Bluetooth to annoy iPhone owners lately. The exploits worked on iPhones both when Bluetooth was enabled or switched-off in the Control Center, but could not reproduce the exploit when Bluetooth was fully switched off from the Settings. We also successfully tested the code designed to trick a nearby iPhone into displaying a phone number transfer dialog, but found that the Bluetooth range was far greater and captured multiple iPhones at the same time using a Flipper Zero on the other side of a room. ![]() Using the proof-of-concept code, we tricked two nearby iPhones into thinking they were close to two AirTags, but found that the Bluetooth range was limited to close proximity, such as tapping the iPhone with the Flipper Zero. Both tests worked, though we could not immediately reproduce the barrage of notifications. We used the proof-of-concept code to imitate a nearby AirTag, and the other code for transferring a phone number. Once we replaced the Flipper Zero’s firmware with our custom compiled code, simply switching on Bluetooth from the Flipper Zero device began broadcasting the pop-up signals to the nearby iPhones. TechCrunch tested the exploit by compiling the proof-of-concept code from the security researcher’s blog into a firmware software file, which we then loaded into a Flipper Zero device we have. Using a Flipper Zero, TechCrunch was able to reproduce this attack on an iPhone 8 and a newer iPhone 14 Pro. Example of 'DDOS: /5FGhK7QYoGĪnthony said he tweaked the Flipper Zero firmware to broadcast what are called Bluetooth Advertisements, a type of transmission in the Bluetooth Low Energy protocol that Apple uses to give iDevices owners the ability to connect to an Apple Watch, other Apple devices and send pictures to other iDevice owners using the Bluetooth file sharing system AirDrop.Īs Anthony put it, these are “broadcast signals that devices use to announce their presence and capabilities.”
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |