Tile trackers are being used for stalking, and their signals are unencrypted

Tile trackers, popular Bluetooth devices designed to help users locate lost items, have come under scrutiny due to their potential misuse in stalking. Recent research reveals that these devices transmit signals without encryption, making it easier for malicious actors to exploit them for unauthorized tracking. This vulnerability raises significant privacy and security concerns, especially as these trackers become more widespread. The unencrypted signals can be intercepted by anyone with the right equipment, allowing stalkers to monitor victims' locations without their knowledge. This issue highlights the broader risks associated with Internet of Things (IoT) devices that lack robust security measures. Users are advised to remain vigilant and consider the implications of using such trackers, while manufacturers are urged to implement stronger encryption protocols to protect user privacy. The findings underscore the urgent need for regulatory frameworks to address the security gaps in consumer tracking technologies and to safeguard individuals from digital stalking threats.

This Cyber News was published on www.theverge.com. Publication date: Tue, 30 Sep 2025 22:14:03 +0000


Cyber News related to Tile trackers are being used for stalking, and their signals are unencrypted

Lost and found: How to locate your missing devices and more - Physical trackers are small, circular or square-shaped objects that use simple replaceable batteries to remain charged for a long time. For travelers going around with luggage on trains and planes, there have been times when they come in really handy ...
1 year ago Welivesecurity.com
Tile trackers are being used for stalking, and their signals are unencrypted - Tile trackers, popular Bluetooth devices designed to help users locate lost items, have come under scrutiny due to their potential misuse in stalking. Recent research reveals that these devices transmit signals without encryption, making it easier ...
1 week ago Theverge.com
Europol Raises Alarm on Criminal Misuse of Bluetooth Trackers - Europol has issued a new warning regarding an emerging trend in organized crime involving the use of Bluetooth trackers. Originally designed to help individuals locate personal items and prevent vehicle theft, these small devices are being ...
1 year ago Infosecurity-magazine.com
Binary Options Trading Signals: A Deep Dive - Binary options trading, a form of financial trading where the payout is either a fixed amount or nothing at all, has seen significant growth in popularity. Central to this growth is the development and use of sophisticated trading signals. These ...
1 year ago Feeds.dzone.com
eBay pays $3M penalty for cyber-stalking newsletter critics The Register - eBay will pay $3 million to settle criminal charges that its security team stalked and harassed a Massachusetts couple in retaliation for their website's critical coverage of the online tat bazaar. Under the agreement [PDF], eBay admits ...
1 year ago Go.theregister.com Silence
Harnessing the Power of Trillions: DataDome Continues to Expand Signals Collection For Most Accurate ML Detection Models - The importance of accurate threat detection and mitigation of bots can't be overstated. The best way to ensure such accuracy is through massive-scale signal collection, paired with highly adaptive multi-layered machine learning models supervised by ...
1 year ago Securityboulevard.com
Think Twice Before Giving Surveillance for the Holidays - With the holidays upon us, it's easy to default to giving the tech gifts that retailers tend to push on us this time of year: smart speakers, video doorbells, bluetooth trackers, fitness trackers, and other connected gadgets are all very popular ...
1 year ago Eff.org
Apple and Google add alerts for unknown Bluetooth trackers to iOS, Android - On Monday, Apple and Google jointly announced a new privacy feature that warns Android and iOS users when an unknown Bluetooth tracking device travels with them. Named Detecting Unwanted Location Trackers, the new feature started rolling out ...
1 year ago Bleepingcomputer.com
Tile Tracking Tags Can Be Exploited by Tech-Savvy Stalkers, Researchers Say - Tile tracking tags, popular for locating lost items, have been found vulnerable to exploitation by tech-savvy stalkers, according to recent research. These small Bluetooth-enabled devices, designed to help users find personal belongings, can be ...
1 week ago Wired.com
A Bloody Pig Mask Is Just Part of a Wild New Criminal Charge Against eBay - After the security firm Mandiant had its X account compromised earlier this month, the US Securities and Exchange Commission dealt with a similar intrusion this week. Attackers wrested control of the agency's account for more than half an hour and ...
1 year ago Wired.com
How to Know If Someone Screengrabs Your Instagram Story? - Instagram doesn't inform its users when their Story or Reel has been screengrabbed - no matter whether they have millions of followers or just an everyday account - which means their content could go unnoticed if it gets screengrabbed. Once again, ...
1 year ago Hackercombat.com
Helping to keep the lights on in Ukraine in the face of electronic warfare - Ukraine's high-voltage electricity substations rely on GPS for time synchronization. Many of Ukraine's high-voltage electrical substations - which play a vital role in the country's domestic transmission of power - make extensive use of the ...
1 year ago Blog.talosintelligence.com
Critical Start Asset Visibility helps customers become more proactive within their security program - Critical Start launched their Asset Visibility offering. As part of an MCRR strategy, Asset Visibility helps customers become more proactive within their security program, helping them uncover assets that need protection, validate that the expected ...
1 year ago Helpnetsecurity.com
The Embedded Systems and The Internet of Things - The Internet of Things is a quite new concept dealing with the devices being connected to each other and communicating through the web environment. This concept is gaining its popularity amongst the embedded systems that exist - let's say - 10 or ...
1 year ago Cyberdefensemagazine.com
How to Improve Performance with Client-Side JavaScript Tag Optimizations - Browser fingerprints used in the context of bot detection. Information about the end-user device, browser, and OS such as the device memory, number of CPU cores, and GPU information. Specially crafted JavaScript challenges that aim to detect side ...
1 year ago Securityboulevard.com
Fly Catcher: Detect aircraft spoofing by monitoring for malicious signals - Fly Catcher is an open-source device that can detect aircraft spoofing by monitoring for malicious ADS-B signals in the 1090MHz frequency. Angelina Tsuboi, the developer of Fly Catcher, is an enthusiastic pilot, cybersecurity researcher, and ...
1 year ago Helpnetsecurity.com
CVE-2020-26825 - SAP Fiori Launchpad (News tile Application), versions - 750,751,752,753,754,755, allows an unauthorized attacker to use SAP Fiori Launchpad News tile Application to send malicious code, to a different end user (victim), because News tile does not ...
4 years ago
CVE-2023-39353 - FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions are subject to a missing offset validation leading to Out Of Bound Read. In the `libfreerdp/codec/rfx.c` file there is no ...
1 year ago
This Clever New Idea Could Fix AirTag Stalking While Maximizing Privacy - Apple has been working with companies like Google, Samsung, and Tile on a cross-industry effort to address the threat of tracking from products similar to AirTags. For now, at least, the researchers say that the consortium seems to have adopted ...
1 year ago Wired.com
Cyber Signals: How Microsoft protects AI platforms against cyberthreats - AI is at the forefront of this change, and has the potential to empower organizations to defeat cyberattacks at machine speed, address the cyber talent shortage, and drive innovation and efficiency in cybersecurity. Adversaries can use AI as part of ...
1 year ago Microsoft.com
Cohesity Research Reveals Most Companies Pay Millions in Ransoms - PRESS RELEASE. SAN JOSE, Calif. - January 30, 2024 - Research commissioned by Cohesity, a leader in AI-powered data security and management, reveals today's pervasive cyberattacks are forcing the majority of companies to pay ransoms and break their ...
1 year ago Darkreading.com
Google Online Security Blog: Google and Apple deliver support for unwanted tracking alerts in Android and iOS - Google and Apple have worked together to create an industry specification - Detecting Unwanted Location Trackers - for Bluetooth tracking devices that makes it possible to alert users across both Android and iOS if such a device is unknowingly being ...
1 year ago Security.googleblog.com
Online safety laws: What's in store for children's digital playgrounds? - As children's safety and privacy online becomes a matter of increasing urgency, lawmakers around the world push ahead on new regulations in the digital realm. Tomorrow is Safer Internet Day, an annual awareness campaign that started in Europe in 2004 ...
2 years ago Welivesecurity.com
CVE-2024-38614 - In the Linux kernel, the following vulnerability has been resolved: openrisc: traps: Don't send signals to kernel mode threads OpenRISC exception handling sends signals to user processes on floating point exceptions and trap instructions (for ...
1 year ago Tenable.com
Wearable Tech Future: Where Fashion Meets Function - From fitness trackers and smartwatches to augmented reality glasses, the future of wearable tech is full of potential. In this article, we will explore the current benefits and challenges of wearable technology, uncover its different types and ...
1 year ago Securityzap.com

Cyber Trends (last 7 days)