logo
#

Latest news with #AppleAirPlay

This plug and play car display is only $80
This plug and play car display is only $80

New York Post

time6 days ago

  • Automotive
  • New York Post

This plug and play car display is only $80

Discover startups, services, products and more from our partner StackCommerce. New York Post edits this content, and may be compensated and/or receive an affiliate commission if you buy through our links. TL;DR: This 9-inch Wireless Car Display works with Apple CarPlay and Android Auto, and it's on sale for just $79.99 ($179). Say what you will about modern cars, but the dashboard displays are pretty useful. The only problem is it took a few years for them to really get the technology down, so older vehicles either end up with a low-quality display or no display at all. If you want to change that, it's easy to upgrade your vehicle, and you don't even need to visit a mechanic. This 9-inch Wireless Car Display offers a seamless way to integrate the latest tech advancements directly into your car's dashboard. Whether you're commuting to work, hitting the interstate on a road trip, or just running errands around town, this display can help enhance your ride for only $79.99 (reg. $179). Advertisement New York Post Composite If you're bummed that your car doesn't have the fancy wireless hub like most of the newer models, don't fret. Compatible with both Apple CarPlay and Android Auto, this wireless display (4-star rated!) bridges the gap between your smartphone and your vehicle, providing a safer and more enjoyable ride. Once you've connected your iPhone or Android device, you can access your phone's apps right from the touchscreen display, which boasts a large, responsive screen that makes interaction easy, while the clear, bright display ensures premium visibility day or night. There's even a phone mirroring option, which lets you add extra connectivity and entertainment options. Use Apple AirPlay to sync your phone's video-streaming apps like YouTube and more. Plus, this display offers Bluetooth transmission of your device's sound to your car's stereo speakers, and FM wireless transmission and AUX outputs are available. Adding this nifty car display to your vehicle is as easy as pie. It's widely compatible with most car models since it's powered by a wide-voltage cigarette lighter with 12V~24V. Use one of the two suction brackets to attach to your car's dash or windshield! Get this 9-inch Wireless Car Display for only $79.99 while you can. StackSocial prices subject to change.

Urgent warning to iPhone users: Turn off popular feature and take these steps for safety
Urgent warning to iPhone users: Turn off popular feature and take these steps for safety

Yahoo

time21-05-2025

  • Yahoo

Urgent warning to iPhone users: Turn off popular feature and take these steps for safety

Apple's AirPlay feature is beloved by many users — but it can leave you vulnerable to hackers. Researchers at cybersecurity firm Oligo found major security flaws in Apple AirPlay that allow hackers to hijack compatible devices on the same Wi-Fi network. AirPlay allows users to seamlessly stream audio, video or photos from their Apple device to another Apple device or third-party gadgets that integrate the protocol. The 23 vulnerabilities, dubbed 'AirBorne,' were found both in Apple's AirPlay protocol and the AirPlay Software Development Kit (SDK) used by third-party vendors to make devices AirPlay compatible, Wired reported. Researchers demonstrated in a video how vulnerabilities can be exposed to hackers by accessing an AirPlay-enabled Bose speaker on the same network and remotely executing a Remote Code Execution (RCE) attack, showing the 'AirBorne' logo on the speaker's display. They claimed that hackers realistically can use a similar strategy to gain access to devices with microphones for espionage. Oligo CTO Gal Elbaz told Wired that the total number of exposed devices could potentially be in the millions. 'Because AirPlay is supported in such a wide variety of devices, there are a lot that will take years to patch — or they will never be patched,' Elbaz explained. 'And it's all because of vulnerabilities in one piece of software that affects everything.' The risks were reported to Apple in the late fall and winter of last year, and Oligo worked with the tech giant for months on fixes before publishing their findings Tuesday. Apple devices with iOS 18.4, iPadOS 18.4, macOS Ventura 13.7.5, macOS Sonoma 14.7.5, macOS Sequoia 15.4 and visionOS 2.4 had fixes rolled out on March 31. However, third-party devices that support AirPlay protocol remain vulnerable. The researchers said that manufacturers would need to roll out updates for users to install themselves in order to avoid being exposed to hackers. Apple told Wired that it created patches available for these third-party devices, but it emphasized that there are 'limitations' to the attacks that would be possible on AirPlay-enabled devices due to the bugs. CarPlay-equipped systems are also at risk, the researchers noted, since hackers can carry out an RCE attack if they are near the unit and 'the device has a default, predictable, or known Wi-Fi hotspot password.' According to the report, there are several ways to help protect your device from the threat of hackers: ‍Update your devices: Researchers stressed that devices and other machines that support AirPlay need to be updated immediately to the latest software versions to mitigate potential security risks. Disable AirPlay Receiver: Oligo recommends fully disabling the AirPlay feature when not in use.‍ Only AirPlay to trusted devices: Limit AirPlay communication and stream content to only trusted devices. Restrict AirPlay Settings: Go to Settings > AirPlay & Continuity (or AirPlay & Handoff) and select Current User for the 'Allow AirPlay for' option. 'While this does not prevent all of the issues mentioned in the report, it does reduce the protocol's attack surface,' researchers noted. Disable on public Wi-Fi: It's best to avoid enabling or using AirPlay when on a public Wi-Fi network.

Urgent warning to iPhone users: Turn off popular feature and take these steps for safety
Urgent warning to iPhone users: Turn off popular feature and take these steps for safety

Yahoo

time21-05-2025

  • Yahoo

Urgent warning to iPhone users: Turn off popular feature and take these steps for safety

Apple's AirPlay feature is beloved by many users — but it can leave you vulnerable to hackers. Researchers at cybersecurity firm Oligo found major security flaws in Apple AirPlay that allow hackers to hijack compatible devices on the same Wi-Fi network. AirPlay allows users to seamlessly stream audio, video or photos from their Apple device to another Apple device or third-party gadgets that integrate the protocol. The 23 vulnerabilities, dubbed 'AirBorne,' were found both in Apple's AirPlay protocol and the AirPlay Software Development Kit (SDK) used by third-party vendors to make devices AirPlay compatible, Wired reported. Researchers demonstrated in a video how vulnerabilities can be exposed to hackers by accessing an AirPlay-enabled Bose speaker on the same network and remotely executing a Remote Code Execution (RCE) attack, showing the 'AirBorne' logo on the speaker's display. They claimed that hackers realistically can use a similar strategy to gain access to devices with microphones for espionage. Oligo CTO Gal Elbaz told Wired that the total number of exposed devices could potentially be in the millions. 'Because AirPlay is supported in such a wide variety of devices, there are a lot that will take years to patch — or they will never be patched,' Elbaz explained. 'And it's all because of vulnerabilities in one piece of software that affects everything.' The risks were reported to Apple in the late fall and winter of last year, and Oligo worked with the tech giant for months on fixes before publishing their findings Tuesday. Apple devices with iOS 18.4, iPadOS 18.4, macOS Ventura 13.7.5, macOS Sonoma 14.7.5, macOS Sequoia 15.4 and visionOS 2.4 had fixes rolled out on March 31. However, third-party devices that support AirPlay protocol remain vulnerable. The researchers said that manufacturers would need to roll out updates for users to install themselves in order to avoid being exposed to hackers. Apple told Wired that it created patches available for these third-party devices, but it emphasized that there are 'limitations' to the attacks that would be possible on AirPlay-enabled devices due to the bugs. CarPlay-equipped systems are also at risk, the researchers noted, since hackers can carry out an RCE attack if they are near the unit and 'the device has a default, predictable, or known Wi-Fi hotspot password.' According to the report, there are several ways to help protect your device from the threat of hackers: ‍Update your devices: Researchers stressed that devices and other machines that support AirPlay need to be updated immediately to the latest software versions to mitigate potential security risks. Disable AirPlay Receiver: Oligo recommends fully disabling the AirPlay feature when not in use.‍ Only AirPlay to trusted devices: Limit AirPlay communication and stream content to only trusted devices. Restrict AirPlay Settings: Go to Settings > AirPlay & Continuity (or AirPlay & Handoff) and select Current User for the 'Allow AirPlay for' option. 'While this does not prevent all of the issues mentioned in the report, it does reduce the protocol's attack surface,' researchers noted. Disable on public Wi-Fi: It's best to avoid enabling or using AirPlay when on a public Wi-Fi network.

Urgent warning to iPhone users — turn off popular feature and take these steps for safety
Urgent warning to iPhone users — turn off popular feature and take these steps for safety

New York Post

time20-05-2025

  • New York Post

Urgent warning to iPhone users — turn off popular feature and take these steps for safety

Apple's AirPlay feature is beloved by many users — but it can leave you vulnerable to hackers. Researchers at cybersecurity firm Oligo found major security flaws in Apple AirPlay that allow hackers to hijack compatible devices on the same Wi-Fi network. AirPlay allows users to seamlessly stream audio, video or photos from their Apple device to another Apple device or third-party gadgets that integrate the protocol. The 23 vulnerabilities, dubbed 'AirBorne,' were found both in Apple's AirPlay protocol and the AirPlay Software Development Kit (SDK) used by third-party vendors to make devices AirPlay compatible, Wired reported. Researchers demonstrated in a video how vulnerabilities can be exposed to hackers by accessing an AirPlay-enabled Bose speaker on the same network and remotely executing a Remote Code Execution (RCE) attack, showing the 'AirBorne' logo on the speaker's display. They claimed that hackers realistically can use a similar strategy to gain access to devices with microphones for espionage. Oligo CTO Gal Elbaz told Wired that the total number of exposed devices could potentially be in the millions. 'Because AirPlay is supported in such a wide variety of devices, there are a lot that will take years to patch — or they will never be patched,' Elbaz explained. 'And it's all because of vulnerabilities in one piece of software that affects everything.' Oligo CTO Gal Elbaz told Wired that the total number of exposed devices could potentially be in the millions. Gorodenkoff – The risks were reported to Apple in the late fall and winter of last year, and Oligo worked with the tech giant for months on fixes before publishing their findings Tuesday. Apple devices with iOS 18.4, iPadOS 18.4, macOS Ventura 13.7.5, macOS Sonoma 14.7.5, macOS Sequoia 15.4 and visionOS 2.4 had fixes rolled out on March 31. However, third-party devices that support AirPlay protocol remain vulnerable. The researchers said that manufacturers would need to roll out updates for users to install themselves in order to avoid being exposed to hackers. AirPlay allows users to seamlessly stream audio, video or photos from their Apple device to another device. DenPhoto – Apple told Wired that it created patches available for these third-party devices, but it emphasized that there are 'limitations' to the attacks that would be possible on AirPlay-enabled devices due to the bugs. CarPlay-equipped systems are also at risk, the researchers noted, since hackers can carry out an RCE attack if they are near the unit and 'the device has a default, predictable, or known Wi-Fi hotspot password.' According to the report, there are several ways to help protect your device from the threat of hackers: ‍Update your devices: Researchers stressed that devices and other machines that support AirPlay need to be updated immediately to the latest software versions to mitigate potential security risks. Researchers stressed that devices and other machines that support AirPlay need to be updated immediately to the latest software versions to mitigate potential security risks. Disable AirPlay Receiver: Oligo recommends fully disabling the AirPlay feature when not in use. ‍ Oligo recommends fully disabling the AirPlay feature when not in use. Only AirPlay to trusted devices: Limit AirPlay communication and stream content to only trusted devices. Limit AirPlay communication and stream content to only trusted devices. Restrict AirPlay Settings: Go to Settings > AirPlay & Continuity (or AirPlay & Handoff) and select Current User for the 'Allow AirPlay for' option. 'While this does not prevent all of the issues mentioned in the report, it does reduce the protocol's attack surface,' researchers noted. Go to Settings > AirPlay & Continuity (or AirPlay & Handoff) and select Current User for the 'Allow AirPlay for' option. 'While this does not prevent all of the issues mentioned in the report, it does reduce the protocol's attack surface,' researchers noted. Disable on public Wi-Fi: It's best to avoid enabling or using AirPlay when on a public Wi-Fi network.

Apple users warned: Flaw means devices could be ‘weaponised'
Apple users warned: Flaw means devices could be ‘weaponised'

Perth Now

time02-05-2025

  • Perth Now

Apple users warned: Flaw means devices could be ‘weaponised'

Cybersecurity experts have discovered worrying flaws that have left tens of millions of Apple product users vulnerable to hackers who could take over and 'weaponise' their devices. iPhone, Mac, iPad, and Apple TV devices are all believed to be at risk from bugs in the systems linked to Apple AirPlay, a feature that allows users to wirelessly play music, and show photos on other Apple devices. These flaws, dubbed AirBorne, open the door to hackers who could take control of the device and deploy malware that then spreads to any local network the infected device connects to, according to Oligo Security Research. It claims to have discovered 23 vulnerabilities in Apple's AirPlay protocol and the AirPlay software development kit, used by third-party vendors to integrate AirPlay into third-party devices. 'The attacks that they make possible are transmitted via wireless networks or peer–to-peer connections, and allow attackers to fully take over devices and use that access as a launchpad for further exploitation,' an Oligo statement on the issue read. 'Oligo has demonstrated that two of the vulnerabilities (CVE-2025-24252 and CVE-2025-24132) allow attackers to weaponise wormable zero-click RCE exploits. 'This could lead to the delivery of other sophisticated attacks related to espionage, ransomware, supply-chain attacks, and more.' Oligo CTO Gal Elbaz told Wired: 'Because AirPlay is supported in such a wide variety of devices, there are a lot that will take years to patch — or they will never be patched. 'And it's all because of vulnerabilities in one piece of software that affects everything.' Oligo reported the bugs to Apple, which issued software updates on March 31. However, third-party devices supporting AirPlay remain exposed to hacking unless they are updated, too. Apple says the vulnerabilities require the attacker to be on the same wi-fi network as the affected third-party device, and the vast majority of such devices, such as speakers, have no meaningful access to private user date. Oligo says there are a number of steps people can take to reduce the risk. If you are using a device with Apple AirPlay, update it to the latest software version. Disable the AirPlay function when not in use. Only use AirPlay on trusted devices Change the 'Allow AirPlay for' to 'Current User'. You can do this by going to Settings > AirPlay & Continuity (or AirPlay & Handoff) and select Current User for the 'Allow AirPlay for' option. Apple has been approached for comment.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into the world of global news and events? Download our app today from your preferred app store and start exploring.
app-storeplay-store