Technology
How hackers are breaking into Apple devices through AirPlay

Apple’s AirPlay was designed to make life easier, letting users stream music, photos and videos from iPhones and MacBooks to TVs, speakers and other compatible devices with just a tap. But now, cybersecurity researchers have revealed that this same convenience may be opening the door to hackers. A new set of vulnerabilities, collectively called AirBorne, could turn AirPlay-enabled gadgets into stealthy entry points for malware and network infiltration.
Join The FREE “CyberGuy Report”: Get my expert tech tips, critical security alerts and exclusive deals, plus instant access to my free “Ultimate Scam Survival Guide” when you sign up.
A person holding an iPhone (Kurt “CyberGuy” Knutsson)
What you need to know
Researchers at Tel Aviv-based cybersecurity firm Oligo recently disclosed AirBorne, a group of security flaws in Apple’s proprietary AirPlay protocol. These bugs exist primarily in the AirPlay software development kit (SDK) used by third-party manufacturers to bring AirPlay support to smart TVs, speakers and other media devices. The security flaws mean if a hacker is on the same Wi-Fi network as a vulnerable device, they can hijack it without ever touching the device.
From there, attackers could move laterally within a home or corporate network, silently hopping from one device to another. They might install malware or ransomware, disrupt operations or even lock users out of their own systems. In some cases, compromised devices could be added to a botnet, a network of hijacked machines working in unison for larger attacks. And because many smart gadgets come equipped with microphones, hackers could even turn them into tools for eavesdropping and surveillance.

A woman scrolling on her smartphone (Kurt “CyberGuy” Knutsson)
200 MILLION SOCIAL MEDIA RECORDS LEAKED IN MAJOR X DATA BREACH
What is Apple doing about the AirBorne bugs?
Apple has already patched the AirBorne bugs on its own devices and issued updates to third-party vendors. However, researchers warn that many third-party AirPlay-enabled products, possibly tens of millions, may never receive a fix, either because they do not auto-update or because vendors are slow or unwilling to release security patches.
A striking demonstration by Oligo showed how easily a Bose speaker was taken over to display the firm’s logo, proving how simple it could be for a hacker to silently gain control. Though Bose was not specifically targeted, the example highlights the broader risk. Any unpatched device using AirPlay SDK could be a gateway for malicious actors.
The researchers also discovered that Apple CarPlay is affected. While exploiting it would be harder and would require Bluetooth or USB pairing, more than 800 car and truck models are potentially vulnerable.
HERTZ DATA BREACH EXPOSES CUSTOMER INFORMATION
How to update your iPhone’s software
- Go to Settings
- Tap General
- Click Software Update
- Download and install the latest update.
- Your iPhone will restart once the update is complete.

Steps to update your iPhone’s software (Kurt “CyberGuy” Knutsson)
HOW TO UPDATE ALL OF YOUR DEVICES AND KEEP THEM SAFE
5 ways to protect yourself from AirPlay hackers
1) Set up a separate Wi-Fi network for smart devices: Most modern routers allow you to create multiple networks. Use this feature to keep your smart home devices such as AirPlay-enabled speakers, TVs or receivers on a dedicated “IoT” (Internet of Things) network. Keep this separate from your main devices, like phones, laptops and work computers. This segmentation ensures that even if a hacker gains access to a vulnerable smart device, they cannot easily reach more critical or sensitive devices on the primary network.
2) Disable AirPlay when not actively using it: AirPlay is designed to always be on and discoverable, which makes it convenient but also leaves it exposed. If you rarely use AirPlay or only use it occasionally, go into your device settings and turn it off completely. On Apple devices, AirPlay settings can be found under “General” or “AirPlay & Handoff.” For third-party devices, check their companion apps or manuals. Turning off AirPlay removes it as an open door for attackers.
3) Avoid using AirPlay on public or unsecured Wi-Fi and use a VPN: One of the key conditions for exploiting AirBorne vulnerabilities is that the attacker must be on the same Wi-Fi network as the target device. This makes public Wi-Fi networks in places like cafés, airports, hotels or shared workspaces particularly risky. If you need to use your device in such environments, avoid casting, streaming or pairing with smart devices.
Consider using a VPN to protect against hackers snooping on your device as well. VPNs will protect you from those who want to track and identify your potential location and the websites that you visit. A reliable VPN is essential for protecting your online privacy and ensuring a secure, high-speed connection. For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices.
4) Strengthen and secure your home Wi-Fi network: Make it more difficult for attackers to gain access to your home network. Use a strong, unique password for your Wi-Fi that is different from your other account credentials. Ensure that your router firmware is updated and that encryption is set to WPA2 or WPA3. Avoid older and less secure options like WEP or open networks. Turn off features like WPS, which are designed for easy setup but can also make your network more vulnerable. If possible, disable universal plug and play (UPnP) and similar features that make all devices on your network easily discoverable. Also, consider using a password manager to generate and store complex passwords. Get more details about my best expert-reviewed password managers of 2025 here.
5) Limit device permissions and exposure: Smart devices with AirPlay support often include features like microphones, auto-pairing and remote access. Review each device’s settings and disable any features you do not actively use. For example, if your smart speaker has a microphone, but you never use voice commands, turn off the microphone or cover it. The fewer functions a device has exposed, the fewer opportunities a hacker has to exploit it. If your router supports it, use device-level firewall rules to limit which services or internet connections your smart gadgets can access.
Kurt’s key takeaway
Apple likes to market itself as the go-to for privacy and security, but the AirBorne vulnerabilities show that the company’s devices are far from bulletproof. While they patched their own products, millions of third-party AirPlay devices are still wide open to attack. It’s becoming clear that Apple’s control over its ecosystem isn’t as tight as they’d like you to believe. If they really want to be the privacy leader, they need to step up and fix these issues across the board, not just when it suits them.
Do you trust Apple’s claims about privacy and security after reading this article? Let us know by writing us at Cyberguy.com/Contact.
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.
Ask Kurt a question or let us know what stories you’d like us to cover.
Follow Kurt on his social channels:
Answers to the most-asked CyberGuy questions:
New from Kurt:
Copyright 2025 CyberGuy.com. All rights reserved.

Technology
How to Install a VPN on a Fire TV Stick

Technology
How to free up space on a PC

Using a PC is all fun and games until you run out of storage. We’ve all been there, and the problem becomes more frequent if you’ve been using your PC for years. Over time, the hard disk starts filling up with everything, including PDFs, video files, random screenshots, and duplicate photos transferred from an SD card or your phone.
Once your PC’s storage fills up, it slows down because the resources required to process tasks become limited. I will discuss some proven methods to reclaim valuable space and improve your computer’s performance.
If you’re not a PC user, find more ways to free up space on these devices: iPhone | Android | Mac
JOIN THE FREE CYBERGUY REPORT: GET MY EXPERT TECH TIPS, CRITICAL SECURITY ALERTS, AND EXCLUSIVE DEALS — PLUS INSTANT ACCESS TO MY FREE ULTIMATE SCAM SURVIVAL GUIDE WHEN YOU SIGN UP!
Empty recycle bin
When you delete something on your PC, it remains in the Recycle Bin and still takes up space on your hard disk. The Recycle Bin usually holds deleted files for 30 days, but if you need to free up space right away, emptying it is a good first step. Note that “Recycle Bin” is the term used on Windows. To free up disk space from the Recycle Bin:
- Search for Recycle Bin on your desktop and right-click it.
- Select Empty Recycle Bin.
- Confirm the deletion.
HOW TO FREE UP SPACE ON YOUR ANDROID

Step to empty recycle bin on PC. (Kurt “CyberGuy” Knutsson)
BEST ANTIVIRUS FOR PCS & MACS — CYBERGUY PICKS 2025
Delete unnecessary apps
After clearing the Recycle Bin, the next step is to delete unnecessary apps. Unused applications take up valuable storage space and can slow down your system. Removing them will free up space and improve performance on your Windows PC.
- Go to Settings
- Click Apps
- Select Installed apps.
- Sort apps by size to find large ones.
- Click an app and select Uninstall.

Image of Installed apps on a PC. (Kurt “CyberGuy” Knutsson)
WHAT TO DO IF YOU THINK YOUR PC HAS A VIRUS
Delete the files you don’t need
Take some time to go through your files and delete anything you no longer need. Old documents, large video files, duplicate photos, and outdated downloads can take up a surprising amount of space. If you are unsure about deleting certain files, move them to an external drive or cloud storage before permanently removing them from your Windows PC.
- Open Settings
- Click System.
- Select Storage.
YOUR IPHONE HAS A HIDDEN FOLDER EATING UP STORAGE SPACE WITHOUT YOU EVEN KNOWING

Steps to delete the files you don’t need on a PC. (Kurt “CyberGuy” Knutsson)

Steps to delete the files you don’t need on a PC. (Kurt “CyberGuy” Knutsson)
- Check the boxes for items like temporary files, downloads and recycle bin.

(Kurt “CyberGuy” Knutsson)
- Click Remove files.
- You can also use Disk Cleanup: Type “Disk Cleanup” in the Start menu, select a drive and choose files to delete.
Enable Storage Sense on Windows
If you’re using Windows, Storage Sense is a built-in feature that can automatically free up space by removing temporary files and old items from the Recycle Bin. How to enable storage sense on Windows:
- Open Settings and go to System > Storage.
- Click on Storage Sense and toggle it On.
- Under the Configure cleanup schedules section, choose how often it should run (every day, week or month). Once enabled, Storage Sense will automatically clean up space based on your preferences.
DOES YOUR WINDOWS 11 PC KEEP RESTARTING? LET’S FIX THAT FRUSTRATING PROBLEM
Transfer files to external storage
- Choose the right external drive: Opt for an external hard drive or solid-state drive (SSD) that suits your needs. SSDs offer faster speeds and better durability, while HDDs provide larger capacities at lower costs.
- Transfer files: Connect your external drive, copy your files to it and verify that all files are successfully transferred.
- Delete original files: After verifying the transfer, delete the original files from your PC to free up space. On Windows, use File Explorer to delete files and empty the Recycle Bin. On Mac, use Finder to move files to Trash and then empty it.
Consider cloud storage
Cloud storage services like Google Drive, Dropbox and Microsoft OneDrive offer convenient, flexible options for storing large files without consuming your laptop’s limited space. These services allow you to securely store your photos, videos and documents in the cloud, freeing up valuable storage on your device. One significant advantage of cloud storage is accessing files from any device with an internet connection, whether on your phone, tablet or another computer.
Most cloud services provide a certain amount of free storage (typically between 2GB and 15GB) before upgrading to a paid plan. For instance, Google Drive offers 15GB of free storage shared across Google services, while Dropbox provides 2GB for free with options to upgrade for more space. OneDrive provides 5GB for free, but Microsoft users can get additional storage through Office 365 subscriptions, granting access to the Microsoft Office suite.
Additionally, cloud storage services come with features like automatic syncing and backup, making it easier to organize and safeguard your files. This can be particularly helpful for large photo and video libraries, which can be set to upload automatically from your phone or computer. With features like file versioning and collaboration tools, cloud platforms offer more than just storage — they enhance productivity and allow seamless file sharing with friends, family or colleagues.
Finally, many cloud storage providers offer encryption and other security measures to protect your files for added peace of mind. However, it would be best always to take extra precautions, such as enabling two-factor authentication and using strong, unique passwords, to ensure your data is safe. Kurt’s favorite cloud services can be seen here.
Protect your data: Essential security steps after managing storage
After you’ve freed up space on your PC-whether by deleting old files, moving data to an external drive or leveraging cloud storage, it’s just as important to make sure your valuable information stays secure. The following steps will help you protect your files and personal data from cyber threats and accidental loss.
1. Use strong passwords: Create unique, complex passwords for all your accounts and devices. Consider using a password manager to generate and store secure passwords. Get more details about my best expert-reviewed Password Managers of 2025 here.
2. Enable encryption: Encrypt your external hard drives and cloud storage accounts to add an extra layer of protection to your data.
3. Implement two-factor authentication (2FA): Enable 2FA on all accounts that offer this feature, especially for cloud storage services.
4. Install and maintain strong antivirus software: Use a strong antivirus program and keep it updated to protect against malware and other security threats. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.
5. Regularly update your operating system and applications: Keep your devices and software up to date to ensure you have the latest security patches.
6. Be cautious with public Wi-Fi: Avoid accessing sensitive information when connected to public networks, or use a VPN for added security. Using a VPN (Virtual Private Network) service can enhance your privacy by encrypting your internet traffic, making it harder for hackers and third parties to intercept your data, especially on public Wi-Fi. A VPN masks your IP address, helping to obscure your location and online activity. While VPNs don’t directly prevent phishing emails, they reduce the exposure of your browsing habits to trackers that may use this data maliciously. With a VPN, you can securely access your email accounts from anywhere, even in areas with restrictive internet policies. For best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices
7. Backup your data regularly: Create multiple backups of your important files, including at least one offline copy.
8. Use secure file transfer methods: When sharing files, use encrypted transfer methods or password-protected links.
By following these steps, you can significantly enhance the security of your data and protect yourself from potential cyber threats.
Kurt’s key takeaway
Your PC’s storage can fill up fast, but you can always free up some space. I personally prefer storing images and videos that take up too much space on an external drive. This way, I can access them whenever I need to while keeping my PC storage free. If an external drive feels like too much of a hassle, you can always opt for cloud storage. Windows supports a range of cloud storage options, including its own services like OneDrive.
What’s the most surprising thing you’ve found taking up space on your computer? Let us know by writing us at Cyberguy.com/Contact
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter
Ask Kurt a question or let us know what stories you’d like us to cover.
Follow Kurt on his social channels:
Answers to the most-asked CyberGuy questions:
New from Kurt:
Copyright 2025 CyberGuy.com. All rights reserved.
Technology
Meta asks judge to throw out antitrust case mid-trial

Meta has filed a motion for judgment on the antitrust case it’s currently fighting in court. The motion argues that the Federal Trade Commission (FTC) has failed to produce any evidence that Meta unlawfully monopolized part of the social networking market, something the government argues it did through its acquisitions of Instagram and WhatsApp.
The filing was submitted this evening, shortly after the FTC rested its case in a protracted trial before DC District Court Judge James Boasberg. “After five weeks of trial, it is clear that the FTC has failed to meet the legal standard required under antitrust law,” said Meta spokesperson Christopher Sgro. “Regardless, we will present our case to show what every 17-year-old in the world knows: Instagram competes with TikTok (and YouTube and X and many other apps). The FTC spent tens of millions of taxpayer dollars bringing a weak case with a market definition that ignores reality.”
A judgment on partial findings asks a judge to consider a case’s merits before it has been fully argued in court, attempting to speed its resolution. The trial is still currently scheduled to proceed, with Meta launching into its defense against the FTC’s allegations, but the filing offers a preview of its case.
As Meta’s lawyers have done in cross-examination, it takes aim at the agency’s description of Meta monopolizing a “personal social networking services” market that people use to share information with family and friends. It argues that the FTC has failed to demonstrate Meta reduced the quality of its services (a key sign that a company lacks competition) or that it bought Instagram to neutralize a potential rival.
The FTC has made its case with testimony from several high-profile players in Meta’s businesses, including Instagram’s co-founder Kevin Systrom — who aired complaints about Meta’s handling of his company — and its current head, Adam Mosseri, who offered a more optimistic take. Meta has countered by emphasizing the company’s persistent struggles against social networks that the FTC doesn’t consider full competitors, particularly TikTok, which, in the war for those aforementioned 17-year-olds’ attention, Meta portrays as a constant scourge.
-
Austin, TX7 days ago
Best Austin Salads – 15 Food Places For Good Greens!
-
Technology1 week ago
Netflix is removing Black Mirror: Bandersnatch
-
World1 week ago
The Take: Can India and Pakistan avoid a fourth war over Kashmir?
-
News1 week ago
Jefferson Griffin Concedes Defeat in N.C. Supreme Court Race
-
News1 week ago
Reincarnated by A.I., Arizona Man Forgives His Killer at Sentencing
-
News1 week ago
Who is the new Pope Leo XIV and what are his views?
-
Lifestyle1 week ago
André 3000 Drops Surprise Album After Met Gala Piano Statement
-
News1 week ago
Efforts Grow to Thwart mRNA Therapies as RFK Jr. Pushes Vaccine Wariness