Apple’s AirPlay is designed to make life easier, allowing users to tap-stream music, photos and videos from their iPhone or MacBook to TVs, speakers and other compatible devices. But now, cybersecurity researchers have revealed that this same convenience may open the door to hackers. A new set of vulnerabilities called Airborne allows AirPlay-enabled gadgets to be transformed into stealth entry points for malware and network penetration.
Join the free CyberGuy Report: Get instant access to me in addition to expert technical tips, important security alerts, exclusive deals free “The ultimate fraud survival guide” When you sign up.
People who have an iPhone (Kurt “Cyberguy” Knutsson)
What you need to know
Researcher at Oligo, a cybersecurity company based in Tel Aviv recently Disclosure Airborne, a group of security flaws in Apple’s proprietary Airplay protocols. These bugs reside mostly in the AirPlay Software Development Kits (SDKs) used by third-party manufacturers to provide support to smart TVs, speakers and other media devices. A security flaw is that if the hacker is on the same Wi-Fi network as the vulnerable device, it can be hijacked without touching the device.
From there, the attacker was able to move sideways within the home or corporate network, quietly flying from one device to another. You may install malware or ransomware, destroy operations, or lock users out of their own systems. In some cases, you can add compromised devices to a botnet, a network of hijacked machines that operate simultaneously for larger attacks. Also, many smart gadgets are equipped with microphones, which allows hackers to even turn them into tools for eavesdropping and surveillance.

Woman scrolling on smartphone (Kurt “Cyberguy” Knutsson)
200 million social media records have been leaked in major X data breaches
What does Apple do about air bugs?
Apple has already patched air bugs on its devices and issuing updates to third-party vendors. However, researchers warn that many third-party plane-enabled products (probably tens of millions) will not be subject to fixes as there are no automatic updates, or vendors don’t want to release security patches, or vendors aren’t slowing down.
An impressive demonstration by Oligo showed how easily Bose speakers took over to display the company’s logo. Bose was not specifically a target, but this example highlights a broader risk. An accrued device using the AirPlay SDK can become a gateway for malicious actors.
Researchers also found that Apple Carplay was affected. While exploiting, it’s more difficult and requires Bluetooth or USB pairing, but over 800 car and truck models are potentially vulnerable.
Hertz Data Breach publishes customer information
How to update your iPhone software
- I’m going setting
- Tap General
- click Software Updates
- Download and install Latest updates.
- Your iPhone will do that Restart once the update is complete.

Steps to update your iPhone software (Kurt “Cyberguy” Knutsson)
How to update and keep all your devices safe
5 Ways to Protect Yourself from AirPlay Hackers
1) Set up another Wi-Fi network for your smart device. With most modern routers, you can create multiple networks. Use this feature to maintain smart home devices such as AirPlay-enabled speakers, TVs, and receivers on a dedicated “IoT” (Internet of Things) network. Store this separately from your main device, such as a phone, laptop, or work computer. This segmentation ensures that even if hackers gain access to vulnerable smart devices, they will not be able to easily reach more critical or sensitive devices on the primary network.
2) Disable Airplay if you are not actively using it. AirPlay is designed to be on and discoverable at all times, making it convenient, but it’s exposed. If you rarely use AirPlay or occasionally use it, go to Device Settings and turn it off completely. On Apple devices, you can find AirPlay settings under General or AirPlay & Handoff. Check the companion app or manual for third-party devices. Turning off Airplay will remove it as an open door for the attacker.
3) Avoid using AirPlay over public or unsecured Wi-Fi and do not use a VPN. One important condition for exploiting airborne vulnerabilities is that the attacker must be on the same Wi-Fi network as the target device. This puts public Wi-Fi networks at particularly risk, such as cafes, airports, hotels, shared workspaces and more. If you need to use your device in this environment, avoid casting, streaming, or pairing with your smart device.
Consider using a VPN to protect hackers from snooping on your device. A VPN protects you from those who want to track and identify potential locations and websites you visit. A trusted VPN is essential to protect your online privacy and ensuring a secure, fast connection. For the best VPN Check out our expert reviews of the best VPNs for personal browsing the web on software, Windows, Mac, Android and iOS devices.
4) Ensure your home Wi-Fi network: It makes it more difficult for attackers to access their home network. Use a strong and unique password for Wi-Fi, which differs from other account qualifications. Make sure your router firmware is updated and encryption is set to WPA2 or WPA3. Avoid old and unsafe options such as WEP and open networks. Turn off features like WPS, which are designed to be easy to set up, but it can also make your network more vulnerable. If possible, disable Universal Plug and Play (UPNP) and similar features that make it easy to discover all devices on your network. Also, consider using a password manager to generate and store complex passwords. Get my details Find the best expert reviewed password managers of 2025 here.
5) Limit device permissions and exposure: Smart devices with airplay support often include features such as microphones, automatic pairing, and remote access. Check the settings for each device and disable features that are not actively used. For example, if your smart speaker has a microphone but does not use voice commands, turn off the microphone, or cover it. The less exposed the device, the less chances a hacker has to exploit it. If your router supports it, use device-level firewall rules to restrict the services or internet connections that smart gadgets can access.
Important points of cart
While Apple prefers to sell itself as a go-to for privacy and security, airborne vulnerabilities indicate that company devices are far from bulletproof. While they patch their own products, millions of third-party airplay devices are still widely open to attack. It’s become clear that control over Apple’s ecosystem is not as tight as you would believe. If they really want to be privacy leaders, they need to step up and fix these issues completely, not just when it suits them.
After reading this article, do you trust Apple’s claims about privacy and security? Write us and let us know cyberguy.com/contact.
For more information about my tech tips and security alerts, sign up for our free Cyberguy Report Newsletter cyberguy.com/newsletter.
Ask us a question in our cart or let us know what you want us to cover.
Follow your cart on his social channels:
Answers to the most accused Cyber Guy questions:
New from Cart:
Copyright 2025 cyberguy.com. Unauthorized reproduction is prohibited.