“I’m not sure how well this’d work in an airplane,” he joked.Īpple fixed the bug by adding a rate-limit that prevents a barrage of requests over a short period of time. Once a user is out of wireless range of the attacker, they can turn off Bluetooth. The only other way to stop an attack? “Simply run away,” he said. Turning off Bluetooth would effectively prevent the attack, but Bagaria said that the file accept box is so persistent it’s near-impossible to turn off Bluetooth when an attack is under way. A demonstration of an “AirDoS” attack (Image: Kishan Bagaria/supplied)īagaria calls the bug “AirDoS,” the latter part is short for “denial-of-service,” which effectively denies a user access to their device.ĭevices that had their AirDrop setting set to receive files from “Everyone” were mostly at risk.
0 Comments
Leave a Reply. |