Connect with us

Technology

How hackers are breaking into Apple devices through AirPlay

Published

on

How hackers are breaking into Apple devices through AirPlay

Apple’s AirPlay was designed to make life easier, letting users stream music, photos and videos from iPhones and MacBooks to TVs, speakers and other compatible devices with just a tap. But now, cybersecurity researchers have revealed that this same convenience may be opening the door to hackers. A new set of vulnerabilities, collectively called AirBorne, could turn AirPlay-enabled gadgets into stealthy entry points for malware and network infiltration.

Join The FREE “CyberGuy Report”Get my expert tech tips, critical security alerts and exclusive deals, plus instant access to my free “Ultimate Scam Survival Guide” when you sign up.

A person holding an iPhone (Kurt “CyberGuy” Knutsson)

What you need to know

Researchers at Tel Aviv-based cybersecurity firm Oligo recently disclosed AirBorne, a group of security flaws in Apple’s proprietary AirPlay protocol. These bugs exist primarily in the AirPlay software development kit (SDK) used by third-party manufacturers to bring AirPlay support to smart TVs, speakers and other media devices. The security flaws mean if a hacker is on the same Wi-Fi network as a vulnerable device, they can hijack it without ever touching the device.

From there, attackers could move laterally within a home or corporate network, silently hopping from one device to another. They might install malware or ransomware, disrupt operations or even lock users out of their own systems. In some cases, compromised devices could be added to a botnet, a network of hijacked machines working in unison for larger attacks. And because many smart gadgets come equipped with microphones, hackers could even turn them into tools for eavesdropping and surveillance.

Advertisement

A woman scrolling on her smartphone (Kurt “CyberGuy” Knutsson)

200 MILLION SOCIAL MEDIA RECORDS LEAKED IN MAJOR X DATA BREACH

What is Apple doing about the AirBorne bugs?

Apple has already patched the AirBorne bugs on its own devices and issued updates to third-party vendors. However, researchers warn that many third-party AirPlay-enabled products, possibly tens of millions, may never receive a fix, either because they do not auto-update or because vendors are slow or unwilling to release security patches.

A striking demonstration by Oligo showed how easily a Bose speaker was taken over to display the firm’s logo, proving how simple it could be for a hacker to silently gain control. Though Bose was not specifically targeted, the example highlights the broader risk. Any unpatched device using AirPlay SDK could be a gateway for malicious actors.

The researchers also discovered that Apple CarPlay is affected. While exploiting it would be harder and would require Bluetooth or USB pairing, more than 800 car and truck models are potentially vulnerable.

Advertisement

HERTZ DATA BREACH EXPOSES CUSTOMER INFORMATION

How to update your iPhone’s software 

  • Go to Settings
  • Tap General
  • Click Software Update
  • Download and install the latest update.
  • Your iPhone will restart once the update is complete.

Steps to update your iPhone’s software (Kurt “CyberGuy” Knutsson)

HOW TO UPDATE ALL OF YOUR DEVICES AND KEEP THEM SAFE

5 ways to protect yourself from AirPlay hackers

1) Set up a separate Wi-Fi network for smart devices: Most modern routers allow you to create multiple networks. Use this feature to keep your smart home devices such as AirPlay-enabled speakers, TVs or receivers on a dedicated “IoT” (Internet of Things) network. Keep this separate from your main devices, like phones, laptops and work computers. This segmentation ensures that even if a hacker gains access to a vulnerable smart device, they cannot easily reach more critical or sensitive devices on the primary network.

2) Disable AirPlay when not actively using it: AirPlay is designed to always be on and discoverable, which makes it convenient but also leaves it exposed. If you rarely use AirPlay or only use it occasionally, go into your device settings and turn it off completely. On Apple devices, AirPlay settings can be found under “General” or “AirPlay & Handoff.” For third-party devices, check their companion apps or manuals. Turning off AirPlay removes it as an open door for attackers.

3) Avoid using AirPlay on public or unsecured Wi-Fi and use a VPN: One of the key conditions for exploiting AirBorne vulnerabilities is that the attacker must be on the same Wi-Fi network as the target device. This makes public Wi-Fi networks in places like cafés, airports, hotels or shared workspaces particularly risky. If you need to use your device in such environments, avoid casting, streaming or pairing with smart devices.

Advertisement

Consider using a VPN to protect against hackers snooping on your device as well. VPNs will protect you from those who want to track and identify your potential location and the websites that you visit. A reliable VPN is essential for protecting your online privacy and ensuring a secure, high-speed connection. For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices.

4) Strengthen and secure your home Wi-Fi network: Make it more difficult for attackers to gain access to your home network. Use a strong, unique password for your Wi-Fi that is different from your other account credentials. Ensure that your router firmware is updated and that encryption is set to WPA2 or WPA3. Avoid older and less secure options like WEP or open networks. Turn off features like WPS, which are designed for easy setup but can also make your network more vulnerable. If possible, disable universal plug and play (UPnP) and similar features that make all devices on your network easily discoverable. Also, consider using a password manager to generate and store complex passwords. Get more details about my best expert-reviewed password managers of 2025 here.

5) Limit device permissions and exposure: Smart devices with AirPlay support often include features like microphones, auto-pairing and remote access. Review each device’s settings and disable any features you do not actively use. For example, if your smart speaker has a microphone, but you never use voice commands, turn off the microphone or cover it. The fewer functions a device has exposed, the fewer opportunities a hacker has to exploit it. If your router supports it, use device-level firewall rules to limit which services or internet connections your smart gadgets can access.

Kurt’s key takeaway

Apple likes to market itself as the go-to for privacy and security, but the AirBorne vulnerabilities show that the company’s devices are far from bulletproof. While they patched their own products, millions of third-party AirPlay devices are still wide open to attack. It’s becoming clear that Apple’s control over its ecosystem isn’t as tight as they’d like you to believe. If they really want to be the privacy leader, they need to step up and fix these issues across the board, not just when it suits them.

Do you trust Apple’s claims about privacy and security after reading this article? Let us know by writing us at Cyberguy.com/Contact.

Advertisement

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you’d like us to cover.

Follow Kurt on his social channels:

Answers to the most-asked CyberGuy questions:

New from Kurt:

Advertisement

Copyright 2025 CyberGuy.com. All rights reserved.

Technology

Soundcore new Space 2 promise improved ANC and sound

Published

on

Soundcore new Space 2 promise improved ANC and sound

We finally have an update to the Soundcore Space One that launched two and a half years ago. At MWC 2026, Soundcore has announced the Space 2, which will be available in the US on April 21st in three colors — linen white, jet black, and seafoam green — for $129.99. That’s $30 more than the Space One’s original price.

According to Soundcore, the Space 2 have had a full-band noise cancellation upgrade with the focus of those improvements on the low-frequency sounds we all generally use ANC headphones to block — things like airplane, train, and bus engine sounds while traveling. The Space 2 use the same number of microphones as the Space One for noise canceling, instead relying on optimized mic placement and structure and materials improvements for the boost in performance.

Redesigned 40mm drivers incorporate dual layers in their design. There’s a silk diaphragm with metal ceramic that supposedly results in faster transient response — the driver’s ability to respond to sudden sound quickly and accurately — with better balanced sound reproduction. The Space One had great sound performance for the price, but I’m all for any improvement to sound performance accuracy. Like the Space One, the Space 2 will support LDAC high-res audio.

The headphones connect wirelessly over Bluetooth 6.1, although they do not support Auracast transmissions — an unfortunate exclusion. There’s also a 3.5mm jack for a wired connection.

Battery life has been increased to up to 50 hours with ANC and 70 hours with ANC off. This is up from 40 hours with ANC and 55 hours without ANC with the Space One headphones. With a five-minute charge the Space 2 get an additional four hours of listening.

Advertisement

The Space 2 will include many of the features found on the Space One. You can use HearID 3.0 to go through a series of sound samples to tune the headphones’ sound to your preferences. It worked well for me on the Space One to get them closer to a sound I liked, with a bit of the edge taken off the higher frequencies. There’s also a sensor that detects when you remove the headphones and stops playback so you don’t miss any of your music or podcast. They once again come with a cloth bag that matches the color of the headphones instead of a case, which is one change I wish Soundcore had made, as the cloth bag doesn’t offer as much protection if you tend to throw your headphones into your backpack or bag.

The Soundcore Space One were among the best budget ANC headphones when they came out, and still hold up to more recent releases. But with the bump in price to over $100 for the Space 2, there’s a bit more expectation on them. ANC performance continues to improve — and products get cheaper — across manufacturers, so the Soundcore Space 2 has some competition from companies like Sony, EarFun, and JLab. If the ANC on the Space 2 stands up to current budget headphones and they still sound as good and are as comfortable as the Space One, you can expect to see the new Soundcore Space 2 on many recommendation lists.

Continue Reading

Technology

Tired of websites blocking your VPN? A dedicated IP fixes that

Published

on

Tired of websites blocking your VPN? A dedicated IP fixes that

NEWYou can now listen to Fox News articles!

If you have ever turned on your VPN and suddenly could not log in to your bank, email, streaming service or work portal, you are not imagining things. In fact, this is one of the most common frustrations VPN users face today.

However, the issue is not that VPNs stopped working. Instead, websites have become far more aggressive about blocking traffic that looks suspicious.

As a result, the way your VPN is built now matters just as much as whether you use one at all.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter    

Advertisement

Shared VPN IPs often trigger red flags, which is why banks, email providers and streaming sites sometimes block access. (Kurt “CyberGuy” Knutsson)

Why websites block many VPN connections

Most VPNs give you a shared IP address. As a result, hundreds or even thousands of people can appear online from the same address at the same time. From a website’s perspective, that traffic pattern raises red flags. When platforms detect too many logins, rapid location changes or unusual activity tied to one IP, they step in quickly. In many cases, they respond by:

  • Blocking access
  • Triggering captchas
  • Requiring extra verification codes
  • Temporarily locking accounts

Meanwhile, you did nothing wrong. Instead, you end up dealing with restrictions caused by other users sharing that same IP address.

What a dedicated IP does differently

With a dedicated IP, you get an address that belongs only to you. Unlike shared VPN connections, no one else uses it.

Each time you connect, you use the same IP address. As a result, you avoid sharing traffic, rotating locations or competing with random users whose activity could trigger blocks.

Because of that consistency, your connection looks much more like a typical home or office internet setup. And that simple difference can dramatically reduce website suspicion and login headaches.

Advertisement

NEW YORK HALTS ROBOTAXI EXPANSION PLAN

A dedicated IP gives you a consistent address that looks more like a normal home connection, reducing captchas and login alerts. (Kurt “CyberGuy” Knutsson)

What a dedicated IP can do that shared VPN IPs usually can’t

That consistency does more than reduce suspicion; it improves how smoothly you access the sites and services you use every day.

Access more websites without blocks

Banks, government portals, healthcare sites, and streaming services are far less likely to block a dedicated IP because it does not show heavy or erratic traffic patterns.

Reduce captchas and security challenges

Those endless “prove you’re human” messages are usually triggered by shared IP abuse. A dedicated IP dramatically reduces them.

Advertisement

Make banking and email logins smoother

Financial institutions and email providers often flag constantly changing IP addresses as suspicious. A dedicated IP stays consistent, so login alerts and lockouts happen far less often.

Support remote work and secure systems

Some employers only allow access from approved IP addresses. Shared VPN IPs cannot be approved. Dedicated IPs can.

Improve streaming reliability

Shared VPN IPs are often the first to get blocked when streaming services crack down. Dedicated IPs are less likely to be flagged because traffic looks normal and predictable.

What a dedicated IP does not do

A dedicated IP:

  • Does not remove encryption
  • Does not expose your identity
  • Does not weaken your privacy

Your traffic remains encrypted, and your real location stays hidden. You simply get a connection that websites trust more.

Who benefits most from a dedicated IP

A dedicated IP is especially helpful if you:

Advertisement
  • Use online banking regularly
  • Travel and access sites from different locations
  • Work remotely
  • Stream often
  • Get tired of captchas and blocked pages
  • Want a VPN that feels normal to use

GOOGLE DISMANTLES 9M-DEVICE ANDROID HIJACK NETWORK

With fewer blocks and smoother logins, a dedicated IP helps your VPN work quietly in the background instead of getting in your way. (Kurt “CyberGuy” Knutsson)

How to choose a VPN that offers a dedicated IP

If you want these benefits, look for a VPN provider that offers a dedicated IP option built directly into its service. Some providers include it in premium plans, while others offer it as an add-on. Either way, the process should be simple. You should be able to select your dedicated IP inside the app without advanced setup or manual configuration. Before signing up, check that the provider also offers strong speeds, reliable uptime and clear privacy policies. A dedicated IP improves access, but overall performance still matters.

 What to look for beyond a dedicated IP

A dedicated IP reduces blocks. However, a quality VPN should also deliver strong security and smooth performance.

Fast, stable connections: Speed matters for streaming, video calls and everyday browsing. Look for providers known for consistent performance.

Wide server coverage: More server locations give you flexibility when traveling and help reduce location errors.

Advertisement

Clear privacy practices: Choose a VPN with a strict no-logs policy and independent audits when possible.

Secure server technology: Modern VPNs often use RAM-based servers that automatically wipe data on reboot.

Easy-to-use apps: Protection should feel simple, not technical. Clean apps across major devices make daily use effortless.

For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android & iOS devices at Cyberguy.com

Kurt’s key takeaway

If your VPN keeps getting blocked, the problem may not be the VPN itself. It may be the shared IP address behind it. Websites are increasingly aggressive about suspicious traffic. When hundreds of users share the same IP, banks, email providers and streaming platforms take notice. That is when the captchas, verification codes and account lockouts start. A dedicated IP changes that experience. You still get encryption. You still protect your real location. But your connection looks stable and predictable, which helps you avoid constant interruptions.

Advertisement

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Should protecting your privacy really mean fighting with your bank, email, and streaming apps? Let us know by writing to us at Cyberguy.com

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter  

Copyright 2026 CyberGuy.com.  All rights reserved.  

Advertisement

Related Article

What Trump's 'ratepayer protection pledge' means for you
Continue Reading

Technology

Polymarket defends its decision to allow betting on war as ‘invaluable’

Published

on

Polymarket defends its decision to allow betting on war as ‘invaluable’
It might be World War III, but at least I won $20. | Image: Polymarket / The Verge

Polymarket has been allowing people to bet on when the US would strike Iran next. Obviously, now that it’s actually happened and people have died, the prediction betting market is feeling some pressure. The site has been at the center of controversy before, including suspicions of insider trading on the Super Bowl halftime show and the capture of Venezuelan President Nicolás Maduro.

In a statement posted on its site, Polymarket defended its decision to allow betting on the potential start of a war, saying that it was an “invaluable” source of news and answers, before taking shots at traditional media and Elon Musk’s X. The statement reads:

Read the full story at The Verge.

Continue Reading

Trending