

Episode 741: Apple’s Airplay Worm, Chinese EVs and Google's AI Ad Push
4 snips May 8, 2025
Jeff Campbell, a technology expert known for his insights in 3D printing and automotive tech, joins Rois ni Thuama, a commentator focused on data privacy and security. They dive into a critical vulnerability in Apple’s AirPlay that allows remote code execution, emphasizing the need for user awareness and timely updates. The conversation touches on security risks of Chinese electric vehicles in military use, and the implications of advertising in Google’s AI offerings. They also explore the latest Microsoft Surface innovations and a revolutionary multicolor 3D printer.
AI Snips
Chapters
Transcript
Episode notes
Critical Apple AirPlay Flaw
- A serious zero-click AirPlay vulnerability allowed remote code execution and wormable spreading across Apple devices on the same network.
- Keeping devices patched and disabling AirPlay receiver mode if unused greatly reduces exposure risk.
Third-Party AirPlay Risk
- The vulnerability exists not only in Apple devices but also in the AirPlay SDK embedded in third-party hardware.
- Slow or impossible firmware updates on such devices amplify the security risk as the exploit can worm across networks.
Filter AirPlay Port 7000
- Limit AirPlay device network exposure by filtering port 7000 and using VLANs to separate devices.
- Businesses especially should assess AirPlay-enabled devices on their internal networks and manage access carefully.