<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[The Security Detail]]></title><description><![CDATA[Digital security intel for people who don’t speak geek]]></description><link>https://www.thesecuritydetail.ca</link><image><url>https://substackcdn.com/image/fetch/$s_!wdPk!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1d9b7163-0108-4dcd-9ca9-acc906696639_605x605.png</url><title>The Security Detail</title><link>https://www.thesecuritydetail.ca</link></image><generator>Substack</generator><lastBuildDate>Wed, 06 May 2026 01:32:15 GMT</lastBuildDate><atom:link href="https://www.thesecuritydetail.ca/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Gus Harsfai]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[gusharsfai@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[gusharsfai@substack.com]]></itunes:email><itunes:name><![CDATA[Gus Harsfai]]></itunes:name></itunes:owner><itunes:author><![CDATA[Gus Harsfai]]></itunes:author><googleplay:owner><![CDATA[gusharsfai@substack.com]]></googleplay:owner><googleplay:email><![CDATA[gusharsfai@substack.com]]></googleplay:email><googleplay:author><![CDATA[Gus Harsfai]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Update: Password-manager clickjacking ]]></title><description><![CDATA[As of Aug 22, 2025]]></description><link>https://www.thesecuritydetail.ca/p/update-password-manager-clickjacking</link><guid isPermaLink="false">https://www.thesecuritydetail.ca/p/update-password-manager-clickjacking</guid><dc:creator><![CDATA[Gus Harsfai]]></dc:creator><pubDate>Fri, 22 Aug 2025 12:54:07 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/7b13aa3c-6ec8-4c5d-b395-bf7ee1c08549_512x512.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!EoTP!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F568a7add-0c6c-4753-944a-758e12a141b5_917x500.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!EoTP!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F568a7add-0c6c-4753-944a-758e12a141b5_917x500.jpeg 424w, https://substackcdn.com/image/fetch/$s_!EoTP!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F568a7add-0c6c-4753-944a-758e12a141b5_917x500.jpeg 848w, https://substackcdn.com/image/fetch/$s_!EoTP!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F568a7add-0c6c-4753-944a-758e12a141b5_917x500.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!EoTP!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F568a7add-0c6c-4753-944a-758e12a141b5_917x500.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!EoTP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F568a7add-0c6c-4753-944a-758e12a141b5_917x500.jpeg" width="917" height="500" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/568a7add-0c6c-4753-944a-758e12a141b5_917x500.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:500,&quot;width&quot;:917,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:89683,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.thesecuritydetail.ca/i/171652256?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F568a7add-0c6c-4753-944a-758e12a141b5_917x500.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!EoTP!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F568a7add-0c6c-4753-944a-758e12a141b5_917x500.jpeg 424w, https://substackcdn.com/image/fetch/$s_!EoTP!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F568a7add-0c6c-4753-944a-758e12a141b5_917x500.jpeg 848w, https://substackcdn.com/image/fetch/$s_!EoTP!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F568a7add-0c6c-4753-944a-758e12a141b5_917x500.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!EoTP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F568a7add-0c6c-4753-944a-758e12a141b5_917x500.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Some progress has been made with various Password Managers, sadly not all.  Here is the current status.</p><h2><strong>Who has fixed it</strong></h2><ul><li><p><strong>Dashlane</strong>: Smart Extension <strong>v6.2531.1</strong> (Aug 1). Update in your store.</p></li><li><p><strong>Keeper</strong>: Extension fixes in <strong>v17.1.2</strong> and hardening in <strong>v17.2.0</strong>.</p></li><li><p><strong>NordPass, Proton Pass, RoboForm</strong>: Vendors state patched. Check latest extension.</p></li><li><p><strong>Bitwarden</strong>: <strong>v2025.8.0</strong> contains the fix. Make sure your store shows that version.</p></li><li><p><strong>Enpass</strong>: Release notes say Chrome <strong>v6.11.6</strong> fixed clickjacking (others may lag). Verify per-browser.</p></li></ul><h2><strong>Who hasn&#8217;t (or not fully)</strong></h2><ul><li><p><strong>1Password</strong>: No comprehensive extension patch; added a user-prompt mitigation.</p></li><li><p><strong>LastPass</strong>: No fix yet.</p></li><li><p><strong>LogMeOnce</strong>: No response reported.</p></li><li><p><strong>Apple iCloud Passwords extension</strong> (Chrome/Edge/Firefox): Listed as vulnerable.</p></li></ul><h2><strong>Special note RE: Apple iCloud Passwords</strong></h2><ul><li><p><strong>Safari on macOS/iOS</strong>: Keep using it. Safari&#8217;s built-in passwords are not the</p><p> extension being targeted. Regardless I have turned off autofill.</p></li><li><p><strong>Other browsers</strong>: <strong>Unload/disable &#8220;iCloud Passwords&#8221;</strong> extensions until Apple patches. It is <strong>not safe</strong> yet.</p></li><li><p>Make sure your Apple Devices are FULLY CURRENT and patched.  There were important updates yesteday for other Zero Day vulnerabilities.</p></li></ul><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.thesecuritydetail.ca/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading The Security Detail! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[URGENT - New Browser Exploit Affects Password Managers]]></title><description><![CDATA[What You Need to Know]]></description><link>https://www.thesecuritydetail.ca/p/urgent-new-browser-exploit-affects</link><guid isPermaLink="false">https://www.thesecuritydetail.ca/p/urgent-new-browser-exploit-affects</guid><dc:creator><![CDATA[Gus Harsfai]]></dc:creator><pubDate>Thu, 21 Aug 2025 11:54:13 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!wnhr!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c41bd2e-f7ce-46c0-98f2-545606576b42_917x500.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><strong>Developing Situation | August 20, 2025<br></strong>Referenced from: <a href="https://thehackernews.com/2025/08/dom-based-extension-clickjacking.html">The Hacker News</a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!wnhr!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c41bd2e-f7ce-46c0-98f2-545606576b42_917x500.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!wnhr!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c41bd2e-f7ce-46c0-98f2-545606576b42_917x500.jpeg 424w, https://substackcdn.com/image/fetch/$s_!wnhr!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c41bd2e-f7ce-46c0-98f2-545606576b42_917x500.jpeg 848w, https://substackcdn.com/image/fetch/$s_!wnhr!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c41bd2e-f7ce-46c0-98f2-545606576b42_917x500.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!wnhr!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c41bd2e-f7ce-46c0-98f2-545606576b42_917x500.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!wnhr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c41bd2e-f7ce-46c0-98f2-545606576b42_917x500.jpeg" width="917" height="500" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8c41bd2e-f7ce-46c0-98f2-545606576b42_917x500.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:500,&quot;width&quot;:917,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:97257,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpeg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.thesecuritydetail.ca/i/171553406?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c41bd2e-f7ce-46c0-98f2-545606576b42_917x500.jpeg&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!wnhr!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c41bd2e-f7ce-46c0-98f2-545606576b42_917x500.jpeg 424w, https://substackcdn.com/image/fetch/$s_!wnhr!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c41bd2e-f7ce-46c0-98f2-545606576b42_917x500.jpeg 848w, https://substackcdn.com/image/fetch/$s_!wnhr!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c41bd2e-f7ce-46c0-98f2-545606576b42_917x500.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!wnhr!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8c41bd2e-f7ce-46c0-98f2-545606576b42_917x500.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>A new security flaw has been found in browser extensions, including many popular password managers. It uses a trick called <strong>clickjacking</strong>, where a website secretly hijacks your clicks. You think you&#8217;re clicking one thing, but behind the scenes, you&#8217;re actually opening your password manager&#8212;<strong>giving the site access to your saved passwords, payment cards, and multi-factor authentication codes</strong>.</p><h3><strong>Example</strong></h3><p>It&#8217;s like clicking a &#8220;close ad&#8221; button, but instead it silently opens your vault and exposes everything inside.</p><div><hr></div><h2><strong>What to do right now</strong></h2><p>Until more details are confirmed, here&#8217;s the safe approach:</p><h3><strong>On your computer</strong></h3><ul><li><p><strong>Disable autofill</strong> for passwords and credit cards in your browser and computer settings.</p></li><li><p><strong>Turn off or remove password manager browser extensions</strong>, just for now.</p></li><li><p>Don&#8217;t click links. <strong>Verify them first</strong>, and manually type them into the address bar if you need to go there.</p></li></ul><h3><strong>On your phone</strong></h3><ul><li><p>Also <strong>turn off autofill</strong> in your mobile browser and phone settings.</p></li><li><p>Don&#8217;t trust <strong>in-app browsers or popups</strong>.</p></li></ul><div><hr></div><h2><strong>Private or incognito mode doesn&#8217;t protect you</strong></h2><p>Private or incognito mode <strong>doesn&#8217;t turn off autofill by default</strong>. Your saved credentials and cards can still fill in unless you&#8217;ve disabled them.</p><div><hr></div><h2><strong>Test your settings</strong></h2><p>Here&#8217;s a simple test to check if autofill is truly off&#8212;on desktop or mobile:</p><ol><li><p>Open your browser (regular and private/incognito).</p></li><li><p>Visit any login page (like Google or Facebook).</p></li><li><p>If anything fills in automatically&#8212;like your email, password, or card&#8212;<strong>autofill is still on</strong>.</p></li></ol><p>If you see anything filled in, go back into your browser and password manager settings to turn autofill off. That&#8217;s the best way to lock things down.</p><div><hr></div><h2><strong>Why it matters</strong></h2><p>This isn&#8217;t about someone guessing your password. It&#8217;s about a website <strong>tricking your browser into entering it for you</strong>.</p><p>Most password managers haven&#8217;t issued fixes yet. Some may not be able to.</p><p>As of August 20, 2025, <strong>only Dashlane, Keeper, NordPass, ProtonPass and RoboForm</strong> have confirmed a fix. Others&#8212;including, but not limited to: 1Password, LastPass, Enpass, iCloud Passwords, and LogMeOnce&#8212;<strong>still appear vulnerable</strong>. You&#8217;ll need to stay on top of the tools you use. </p><div><hr></div><h2><strong>Final word</strong></h2><p>It&#8217;s early. But cautious users should assume the worst until more is confirmed.<br>Disable autofill everywhere. Use copy-paste from your vault if needed. It might feel like going back to the old days, but it&#8217;s safer for now.</p><p>We&#8217;ll update this as new info comes in.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.thesecuritydetail.ca/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading The Security Detail! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[Sonos - fixes Airborne vulnerability]]></title><description><![CDATA[Finally! It took them over a month but at least it is fixed.]]></description><link>https://www.thesecuritydetail.ca/p/sonos-fixes-airborne-vulnerability</link><guid isPermaLink="false">https://www.thesecuritydetail.ca/p/sonos-fixes-airborne-vulnerability</guid><dc:creator><![CDATA[Gus Harsfai]]></dc:creator><pubDate>Thu, 12 Jun 2025 18:16:43 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!p60C!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9e6ee1d-6a24-4f4a-89cc-b9513b64d32f_1538x660.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><strong>Good news:</strong> Sonos has released a fix for the Airborne vulnerability. While I&#8217;m not thrilled that they rarely provide detailed patch notes, support has confirmed the issue is resolved.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!p60C!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9e6ee1d-6a24-4f4a-89cc-b9513b64d32f_1538x660.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!p60C!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9e6ee1d-6a24-4f4a-89cc-b9513b64d32f_1538x660.png 424w, https://substackcdn.com/image/fetch/$s_!p60C!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9e6ee1d-6a24-4f4a-89cc-b9513b64d32f_1538x660.png 848w, https://substackcdn.com/image/fetch/$s_!p60C!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9e6ee1d-6a24-4f4a-89cc-b9513b64d32f_1538x660.png 1272w, https://substackcdn.com/image/fetch/$s_!p60C!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9e6ee1d-6a24-4f4a-89cc-b9513b64d32f_1538x660.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!p60C!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9e6ee1d-6a24-4f4a-89cc-b9513b64d32f_1538x660.png" width="1456" height="625" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b9e6ee1d-6a24-4f4a-89cc-b9513b64d32f_1538x660.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:625,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:126364,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.thesecuritydetail.ca/i/165807320?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9e6ee1d-6a24-4f4a-89cc-b9513b64d32f_1538x660.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!p60C!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9e6ee1d-6a24-4f4a-89cc-b9513b64d32f_1538x660.png 424w, https://substackcdn.com/image/fetch/$s_!p60C!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9e6ee1d-6a24-4f4a-89cc-b9513b64d32f_1538x660.png 848w, https://substackcdn.com/image/fetch/$s_!p60C!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9e6ee1d-6a24-4f4a-89cc-b9513b64d32f_1538x660.png 1272w, https://substackcdn.com/image/fetch/$s_!p60C!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb9e6ee1d-6a24-4f4a-89cc-b9513b64d32f_1538x660.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>Here&#8217;s what I&#8217;ve done on my network as a precaution:</strong></p><ul><li><p>Moved all Sonos, Roku, and TV devices to a dedicated IoT VLAN. Only authorized devices can see them now.</p></li><li><p>As a bonus, guests can no longer hijack the music or volume when visiting &#8212; which I appreciate.</p></li><li><p>Apple TV remains on the main network so guests can still use AirPlay to cast to the Apple devices, and nothing else. I trust Apple&#8217;s security more than third-party vendors using their APIs, especially given the long delays in patching.</p></li><li><p>Disabled AirPlay on all non-Apple devices (Roku and TVs) since we use Apple TV anyway &#8212; it&#8217;s safer this way.</p></li><li><p>Kept all Apple devices fully patched and applied security settings I mentioned in earlier posts.</p></li></ul><p>This setup might be overkill for some, and yes, configuring networks for Sonos and AirPlay can be pain. But it&#8217;s working well here, so far&#8230;. and it feels a lot more secure.</p><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.thesecuritydetail.ca/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading The Security Detail! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[“Airborne” Vulnerability - Part 2]]></title><description><![CDATA[It&#8217;s Not Over Yet]]></description><link>https://www.thesecuritydetail.ca/p/airborne-vulnerability-part-2</link><guid isPermaLink="false">https://www.thesecuritydetail.ca/p/airborne-vulnerability-part-2</guid><dc:creator><![CDATA[Gus Harsfai]]></dc:creator><pubDate>Sat, 24 May 2025 18:57:39 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1d9b7163-0108-4dcd-9ca9-acc906696639_605x605.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>Two weeks ago, I shared a breakdown of the &#8220;Airborne&#8221; vulnerabilities affecting Apple&#8217;s AirPlay ecosystem, and how a single compromised device on <strong>any network you&#8217;re connected to</strong> could silently expose your devices to <strong>data theft</strong> and <strong>remote code execution</strong>.</em></p><p><em>Some readers have suggested the risk is overblown, that an attacker would already need to be compromised, on the same Wi-Fi, and it doesn&#8217;t matter because their Apple devices are patched.</em></p><p><em>Maybe some of that is true, but it&#8217;s not the full picture.</em></p><div><hr></div><h3><em><strong>Why I&#8217;m Following Up</strong></em></h3><p><em>If you&#8217;ve read the intro to this newsletter, you&#8217;ll know I don&#8217;t plan to post often. This isn&#8217;t a feed for weekly CVE (Critical Vulnerabilies and Exposures) dumps.</em></p><p><em>I started it because I used to send texts, emails, and WhatsApps to friends and family whenever a major Apple-related security issue came up, especially when the story wasn&#8217;t being fully told or the fix didn&#8217;t go far enough.</em></p><p><em><strong>This is one of those moments.</strong></em></p><p><em>We&#8217;ve heard <strong>crickets</strong> from third-party AirPlay device manufacturers. That silence is the problem, and it&#8217;s why I&#8217;m sending this follow-up.</em></p><div><hr></div><h3><em><strong>It&#8217;s Not Just Your Apple Gear</strong></em></h3><p><em>Apple did a solid job here. They patched their OS, rolled out updates across iOS, macOS, and tvOS, and even pushed a patched SDK to third-party manufacturers.</em></p><p><em>But that&#8217;s where the trail ends.</em></p><p><em>We reviewed public documentation from dozens of major smart TV and speaker vendors over the weekend. The results?</em></p><ul><li><p><em>Most haven&#8217;t confirmed whether they&#8217;ve patched</em></p></li><li><p><em>Some say they&#8217;re &#8220;investigating&#8221;</em></p></li><li><p><em>Many have said <strong>nothing at all</strong></em></p></li></ul><blockquote><p><em>In short, millions of third-party AirPlay devices remain in limbo, with no clear signal from their manufacturers about whether they&#8217;re patched, or even vulnerable.</em></p></blockquote><p><em>This concern isn&#8217;t hypothetical. It&#8217;s <strong>real-world lateral movement</strong> waiting to happen.</em></p><blockquote><p><em>Picture malicious code landing on your TV, turning it into a beachhead on your network,&nbsp; scanning for vulnerabilities, quietly working its way in.&#8230; Or maybe they just wait, lying dormant until the next zero-day appears.</em></p></blockquote><p><em><strong>Either way, this one&#8217;s not safe to ignore.</strong></em></p><div><hr></div><h3><em><strong>What You Should Do Now</strong></em></h3><ul><li><p><em><strong>Patch your Apple devices</strong> &#8212; all of them</em></p></li><li><p><em><strong>Turn off AirPlay on third-party (non-Apple) devices</strong> until the vendor explicitly confirms they&#8217;ve patched</em></p></li><li><p><em><strong>Avoid public Wi-Fi</strong> whenever possible. Assume it&#8217;s hostile</em></p></li><li><p><em><strong>Stick with Apple AirPlay hardware</strong> for now if you need AirPlay, and keep it up to date</em></p></li></ul><div><hr></div><p><em>All of your AirPlay devices need to be fully patched, and that includes all those silent third-party vendors.</em></p><p><em><strong>Until then, assume silence means not fixed.</strong></em></p><p>You can find the original post here:</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;78b2ff1e-3312-45bd-b73a-da3969c9fba9&quot;,&quot;caption&quot;:&quot;Your Apple device can be compromised &#8212; silently &#8212; just by being on the same Wi-Fi with someone who&#8217;s already been hacked.&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Airborne: Airplay Vulnerability&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:43739023,&quot;name&quot;:&quot;Gus Harsfai&quot;,&quot;bio&quot;:&quot;Serial tech founder, investor, and CEO of Targeted Coaching International, where experienced executives coach peers who value support from those who&#8217;ve walked in their shoes. 35+ yrs in deep tech, business, &amp; leadership.&quot;,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/dba915e4-1dca-4464-90e5-778c05b89c12_1105x1105.jpeg&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2025-05-10T19:52:29.540Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc7b165be-e8a6-4931-a3a2-9ac32e2277ab_1040x576.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://www.thesecuritydetail.ca/p/airborne-airplay-vulnerability&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:163292522,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:0,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;The Security Detail&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1d9b7163-0108-4dcd-9ca9-acc906696639_605x605.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.thesecuritydetail.ca/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">I only send these out when it matters. If you found this useful, consider subscribing. </p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://www.thesecuritydetail.ca/p/airborne-vulnerability-part-2?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading The Security Detail! This post is public so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thesecuritydetail.ca/p/airborne-vulnerability-part-2?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thesecuritydetail.ca/p/airborne-vulnerability-part-2?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><h2><strong>Disclaimer</strong></h2><p>The content shared through this newsletter is provided for general informational purposes only and does not constitute professional cybersecurity advice. While I make every effort to ensure the information is accurate, timely, and relevant, I cannot guarantee its completeness or currency. Readers should not rely solely on this content when making security-related decisions. No warranties are offered or implied. Just best efforts, based on experience and good judgment.</p>]]></content:encoded></item><item><title><![CDATA[Airborne: Airplay Vulnerability]]></title><description><![CDATA[This one could do some damage.]]></description><link>https://www.thesecuritydetail.ca/p/airborne-airplay-vulnerability</link><guid isPermaLink="false">https://www.thesecuritydetail.ca/p/airborne-airplay-vulnerability</guid><dc:creator><![CDATA[Gus Harsfai]]></dc:creator><pubDate>Sat, 10 May 2025 19:52:29 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!xu8S!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc7b165be-e8a6-4931-a3a2-9ac32e2277ab_1040x576.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><strong>Your Apple device can be compromised &#8212; silently &#8212; just by being on the same Wi-Fi with someone who&#8217;s already been hacked.</strong></p><p>No clicks. No prompts. No warnings.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!xu8S!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc7b165be-e8a6-4931-a3a2-9ac32e2277ab_1040x576.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!xu8S!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc7b165be-e8a6-4931-a3a2-9ac32e2277ab_1040x576.png 424w, https://substackcdn.com/image/fetch/$s_!xu8S!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc7b165be-e8a6-4931-a3a2-9ac32e2277ab_1040x576.png 848w, https://substackcdn.com/image/fetch/$s_!xu8S!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc7b165be-e8a6-4931-a3a2-9ac32e2277ab_1040x576.png 1272w, https://substackcdn.com/image/fetch/$s_!xu8S!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc7b165be-e8a6-4931-a3a2-9ac32e2277ab_1040x576.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!xu8S!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc7b165be-e8a6-4931-a3a2-9ac32e2277ab_1040x576.png" width="380" height="210.46153846153845" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c7b165be-e8a6-4931-a3a2-9ac32e2277ab_1040x576.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:576,&quot;width&quot;:1040,&quot;resizeWidth&quot;:380,&quot;bytes&quot;:210211,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://gusharsfai.substack.com/i/163292522?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc7b165be-e8a6-4931-a3a2-9ac32e2277ab_1040x576.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!xu8S!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc7b165be-e8a6-4931-a3a2-9ac32e2277ab_1040x576.png 424w, https://substackcdn.com/image/fetch/$s_!xu8S!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc7b165be-e8a6-4931-a3a2-9ac32e2277ab_1040x576.png 848w, https://substackcdn.com/image/fetch/$s_!xu8S!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc7b165be-e8a6-4931-a3a2-9ac32e2277ab_1040x576.png 1272w, https://substackcdn.com/image/fetch/$s_!xu8S!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc7b165be-e8a6-4931-a3a2-9ac32e2277ab_1040x576.png 1456w" sizes="100vw" fetchpriority="high"></picture><div></div></div></a></figure></div><p>This vulnerability, dubbed <strong>&#8220;Airborne,&#8221;</strong> affects AirPlay and other local discovery services &#8212; and it&#8217;s serious.</p><p>Even if your devices are fully patched, a compromised phone or smart TV on the same network could be enough to expose you to:</p><p>&#128315; <strong>Data theft</strong></p><p>&#128315; <strong>Remote code execution</strong></p><p>&#128315; <strong>Lateral movement across your network</strong></p><h3><strong>What You Can Do Right Now:</strong></h3><p><strong>On iPhone / iPad:</strong></p><ul><li><p><strong>Upgrade to the latest iOS version</strong></p></li><li><p>Go to <em>Settings &gt; General &gt; AirPlay &amp; Continuity</em></p></li><li><p>Set <em>Automatically AirPlay to TVs &#8594; Never</em></p></li><li><p>Toggle <em>Airplay Receiver &#8594; Off</em></p></li></ul><p><strong>On Mac:</strong></p><ul><li><p><strong>Upgrade to the latest macOS version</strong></p></li><li><p>Go to <em>System Settings &gt; General &gt; AirDrop &amp; Handoff</em></p></li><li><p>Toggle <em>AirPlay Receiver &#8594; Off</em></p></li><li><p>Make sure your Firewall is <em>On</em></p></li></ul><p><strong>On Apple TV:</strong></p><ul><li><p><strong>Upgrade to the latest tvOS version</strong></p></li><li><p>Go to <em>Settings &gt; AirPlay and HomeKit</em></p></li><li><p>Set <em>AirPlay &#8594; Off</em> or <em>Same Network Only</em></p></li><li><p>Set <em>Allow Access &#8594; Only People Sharing This Home<br></em></p></li></ul><h3><strong>&#128272; Lock Down Your Network:</strong></h3><ul><li><p>Set up a <strong>fully isolated guest network - </strong>a guest should only be able to see the internet, not your internal devices. - <em>FYI - While I have this, I do not enforce this. For now, I am accepting the risk.</em></p></li><li><p>Remove or retire any <strong>unpatchable AirPlay devices - </strong>this includes Smart TV&#8217;s and Speakers<strong><br></strong></p></li><li><p>If it&#8217;s on your Wi-Fi and you don&#8217;t recognize it, <strong>disconnect it - and block it.</strong></p></li></ul><div><hr></div><p>If you want more info, you can find it here: <a href="https://www.oligo.security/blog/airborne">Oligo Security</a></p><p><strong>If Apple already patched the issue, why is this still a concern?</strong></p><p>Apple did patch their own devices &#8212; anything they manufacture with AirPlay has been secured. They&#8217;ve also updated their third-party software development kit (SDK), so the fix is technically available. But that&#8217;s only part of the story.</p><p>There are <strong>millions of third-party TVs, speakers, and streaming devices</strong> that support AirPlay &#8212; and Apple can&#8217;t patch those directly. It&#8217;s now up to each individual manufacturer to implement the fix. Until that happens &#8212; or until Apple gives us a way to block connections to unpatched devices &#8212; the vulnerability remains partially open.</p><p>So we&#8217;re left with a choice:</p><p><strong>Convenience vs. security.</strong></p><p>We shouldn&#8217;t have to choose &#8212; but for now, we do.</p><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.thesecuritydetail.ca/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading The Security Detail! Subscribe for free to receive new posts as I post them.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Why I am starting The Security Detail]]></title><description><![CDATA[I&#8217;ve been sending texts, emails, and late-night WhatsApps to friends and family for years &#8212; every time a major digital security issue popped up, mostly when Apple devices were involved and I felt like the threat wasn&#8217;t fully fixed, required extra steps, or just was worth paying close attention to.]]></description><link>https://www.thesecuritydetail.ca/p/why-i-am-starting-the-security-detail</link><guid isPermaLink="false">https://www.thesecuritydetail.ca/p/why-i-am-starting-the-security-detail</guid><dc:creator><![CDATA[Gus Harsfai]]></dc:creator><pubDate>Sat, 10 May 2025 18:06:04 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/61ca712f-f915-40d5-9bc3-e8889ef9ed15_8500x3500.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thesecuritydetail.ca/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thesecuritydetail.ca/subscribe?"><span>Subscribe now</span></a></p><p>I&#8217;ve been sending texts, emails, and late-night WhatsApps to friends and family for years &#8212; every time a major digital security issue popped up, mostly when Apple devices were involved and I felt like the threat wasn&#8217;t fully fixed, required extra steps, or just was worth paying close attention to.</p><p>It was time-consuming. And people would always ask, &#8220;Can I forward this?&#8221;</p><p>This newsletter is my way of making that easier. I&#8217;m working off a basic assumption: that you already keep your devices &#8212; Apple devices &#8212; up to date with the latest software and security updates.<br>If I think something&#8217;s serious enough to interrupt your day &#8212; like the recent <strong>Airborne vulnerability</strong> &#8212; you&#8217;ll hear from me. If not, I&#8217;ll stay quiet. This won&#8217;t be a noisy newsletter. It might go silent for weeks. But when it lands, it&#8217;s worth your time.</p><div><hr></div><h2>What to Expect</h2><ul><li><p>&#9989; Clear, plain-English updates</p></li><li><p>&#9989; A primary focus on Apple products</p></li><li><p>&#9989; Posts <strong>only when it matters</strong></p></li><li><p>&#10060; No geek speak</p></li><li><p>&#10060; No content filler or endless CVE analysis</p></li></ul><div><hr></div><p>&#128236; Expect updates <strong>only when needed</strong> &#8212; not daily, not weekly.<br>I&#8217;m not here to create noise. I&#8217;m here to flag what I&#8217;d want my friends to know.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thesecuritydetail.ca/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thesecuritydetail.ca/subscribe?"><span>Subscribe now</span></a></p><div><hr></div><p><strong>Disclaimer:</strong> This newsletter is for informational purposes only and does not constitute professional cybersecurity advice. While I make every effort to share timely and relevant information, I make no guarantees as to its completeness, accuracy, or currency. The content may not reflect the latest developments and should not be relied on as a sole resource for security decisions.</p><p></p>]]></content:encoded></item></channel></rss>