{"id":44952,"date":"2022-01-23T13:00:02","date_gmt":"2022-01-23T13:00:02","guid":{"rendered":"http:\/\/3440877a-f0ae-4dd0-9f44-7c668ceb5c38"},"modified":"2022-01-23T13:00:02","modified_gmt":"2022-01-23T13:00:02","slug":"she-didnt-trust-her-movers-a-single-apple-airtag-proved-she-was-right","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/she-didnt-trust-her-movers-a-single-apple-airtag-proved-she-was-right\/","title":{"rendered":"She didn&#8217;t trust her movers. A single Apple AirTag proved she was right"},"content":{"rendered":"<figure class=\"image image-original shortcode-image\"><span class=\"img aspect-set \"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/a\/img\/resize\/49697774b9d0f860c58c369362a8e913bde829de\/2022\/01\/18\/90b0bc44-9fe0-4058-b283-19a2a81cd9b7\/screenshot-2022-01-18-at-15-40-39.png?width=1200&amp;fit=bounds&amp;auto=webp\" class alt=\"screenshot-2022-01-18-at-15-40-39.png\" height=\"auto\" width=\"1200\"><\/span><figcaption><span class=\"caption\"><\/span><span class=\"credit\"> C. Osborne | ZDNet <\/span><\/figcaption><\/figure>\n<p>Apple&#8217;s <a href=\"https:\/\/www.zdnet.com\/article\/i-just-found-my-lost-airtag-youll-never-guess-where-it-went\/\" target=\"_blank\" rel=\"noopener\">AirTags<\/a> are getting some of a bad (brand) name.<\/p>\n<p>It&#8217;s &#8220;a perfect tool for stalking,&#8221; as Eva Galperin, Director of Cyber-Security at the Electronic Frontier Foundation, <a href=\"https:\/\/www.bbc.com\/news\/technology-60004257\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">put it to the BBC<\/a>.<\/p>\n<p>She&#8217;s right, of course.<\/p>\n<p>That&#8217;s the problem with technology, isn&#8217;t it? For every potential good use, there are at least several pain-inducing, criminal-pleasing, world-ending uses. Too often, the bad outweighs the good, especially in the public eyes and ears.<\/p>\n<p>Here, though, is a tale of a woman who&#8217;s glad she used an AirTag for her own surveillance purposes.<\/p>\n<p>Valerie McNulty has moved around a few times. She&#8217;s an army spouse and she knows the drill.<\/p>\n<p><a href=\"https:\/\/www.militarytimes.com\/the-home-front\/2022\/01\/12\/army-wife-uses-airtag-hack-to-track-her-movers-while-pcsing\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">As she told the Military Times<\/a>, McNulty also knows that moving companies aren&#8217;t universally reliable. It&#8217;s not just that they can break things or lose things. It&#8217;s that, well, they may not always deliver the facts in a way that&#8217;s actually factual.<\/p>\n<section class=\"sharethrough-top placeholder\"> <\/section>\n<p>So McNulty slid an AirTag into one of her family&#8217;s moving boxes containing her son&#8217;s toys. They had a long way to go, from Fort Carson, Colorado to Fort Drum, New York.<\/p>\n<p>You&#8217;ll be stunned when I tell you the boxes didn&#8217;t turn up on time. They were a month late. A promise of a Friday delivery became the promise of a Sunday delivery. You know how these things go.&nbsp;<\/p>\n<hr>\n<p><strong>Also:&nbsp;<\/strong><a href=\"https:\/\/www.zdnet.com\/article\/how-todays-technologies-become-weapons-in-modern-domestic-abuse\/\" target=\"_blank\" rel=\"noopener\"><strong>How tech is a weapon in modern domestic abuse &#8212; and how to protect yourself<\/strong><\/a><\/p>\n<hr>\n<p>The driver finally called McNulty and told her that he was just picking up her family&#8217;s boxes in Colorado.<\/p>\n<p>The call didn&#8217;t go well. You see, McNulty had already checked the location of her AirTag. She knew it was in Elizabeth, New Jersey, not far from her new home.<\/p>\n<p>&#8220;I made him aware that I knew he was only four hours away from us,&#8221; she told the Military Times. &#8220;He called back several minutes later trying to bargain with me to see if he could deliver it on Sunday or Monday.&#8221;<\/p>\n<p>&#8220;Where was the driver?,&#8221; you might ask. Allegedly seeing a lady friend, said McNulty.<\/p>\n<p>And, of course, all of her family&#8217;s boxes didn&#8217;t arrive.&nbsp;<\/p>\n<p>You can completely understand why McNulty used the AirTag in the way she did. This whole tale makes me wonder, though, what we&#8217;ve come to and where we&#8217;re going.<\/p>\n<p>Employers don&#8217;t trust remote employees, for example, so they <a href=\"https:\/\/www.zdnet.com\/article\/working-from-home-your-boss-has-a-creepy-new-way-to-spy-on-you\/\" target=\"_blank\" rel=\"noopener\">garland them with surveillance technology<\/a>.<\/p>\n<p>Too many humans don&#8217;t like or trust each other. So they use technology to abuse each other, stalk each other, hack each other, and even break into their lovers&#8217; gadgets.<\/p>\n<p>At the same time, they use technology to stay in touch with each other and work together in ways that were never previously possible.<\/p>\n<p>Perhaps we were always as two-sided as this.<\/p>\n<p>Ultimately, though, because of the immediacy and ubiquity of technology, the result is an exponentially heightened collective paranoia. If our default is that we can trust no one and fear everyone, how can we ever really get along?<\/p>\n<p>How can we ever be at peace?<\/p>\n<div class=\"relatedContent alignNone\">\n<h3 class=\"heading\"> <span class=\"int\">more Technically Incorrect<\/span> <\/h3>\n<\/p><\/div>\n<p> READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/she-didnt-trust-her-movers-a-single-apple-airtag-showed-she-was-right\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>AirTags are being used for all sorts of evil purposes. They&#8217;re also proving to be very useful for many people.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-44952","post","type-post","status-publish","format-standard","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>She didn&#039;t trust her movers. A single Apple AirTag proved she was right 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/she-didnt-trust-her-movers-a-single-apple-airtag-proved-she-was-right\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"She didn&#039;t trust her movers. A single Apple AirTag proved she was right 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/she-didnt-trust-her-movers-a-single-apple-airtag-proved-she-was-right\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-01-23T13:00:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.zdnet.com\/a\/img\/resize\/49697774b9d0f860c58c369362a8e913bde829de\/2022\/01\/18\/90b0bc44-9fe0-4058-b283-19a2a81cd9b7\/screenshot-2022-01-18-at-15-40-39.png?width=1200&amp;fit=bounds&amp;auto=webp\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/she-didnt-trust-her-movers-a-single-apple-airtag-proved-she-was-right\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/she-didnt-trust-her-movers-a-single-apple-airtag-proved-she-was-right\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"She didn&#8217;t trust her movers. A single Apple AirTag proved she was right\",\"datePublished\":\"2022-01-23T13:00:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/she-didnt-trust-her-movers-a-single-apple-airtag-proved-she-was-right\\\/\"},\"wordCount\":549,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/she-didnt-trust-her-movers-a-single-apple-airtag-proved-she-was-right\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/49697774b9d0f860c58c369362a8e913bde829de\\\/2022\\\/01\\\/18\\\/90b0bc44-9fe0-4058-b283-19a2a81cd9b7\\\/screenshot-2022-01-18-at-15-40-39.png?width=1200&amp;fit=bounds&amp;auto=webp\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/she-didnt-trust-her-movers-a-single-apple-airtag-proved-she-was-right\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/she-didnt-trust-her-movers-a-single-apple-airtag-proved-she-was-right\\\/\",\"name\":\"She didn't trust her movers. A single Apple AirTag proved she was right 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/she-didnt-trust-her-movers-a-single-apple-airtag-proved-she-was-right\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/she-didnt-trust-her-movers-a-single-apple-airtag-proved-she-was-right\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/49697774b9d0f860c58c369362a8e913bde829de\\\/2022\\\/01\\\/18\\\/90b0bc44-9fe0-4058-b283-19a2a81cd9b7\\\/screenshot-2022-01-18-at-15-40-39.png?width=1200&amp;fit=bounds&amp;auto=webp\",\"datePublished\":\"2022-01-23T13:00:02+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/she-didnt-trust-her-movers-a-single-apple-airtag-proved-she-was-right\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/she-didnt-trust-her-movers-a-single-apple-airtag-proved-she-was-right\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/she-didnt-trust-her-movers-a-single-apple-airtag-proved-she-was-right\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/49697774b9d0f860c58c369362a8e913bde829de\\\/2022\\\/01\\\/18\\\/90b0bc44-9fe0-4058-b283-19a2a81cd9b7\\\/screenshot-2022-01-18-at-15-40-39.png?width=1200&amp;fit=bounds&amp;auto=webp\",\"contentUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/49697774b9d0f860c58c369362a8e913bde829de\\\/2022\\\/01\\\/18\\\/90b0bc44-9fe0-4058-b283-19a2a81cd9b7\\\/screenshot-2022-01-18-at-15-40-39.png?width=1200&amp;fit=bounds&amp;auto=webp\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/she-didnt-trust-her-movers-a-single-apple-airtag-proved-she-was-right\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"She didn&#8217;t trust her movers. A single Apple AirTag proved she was right\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"She didn't trust her movers. A single Apple AirTag proved she was right 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/she-didnt-trust-her-movers-a-single-apple-airtag-proved-she-was-right\/","og_locale":"en_US","og_type":"article","og_title":"She didn't trust her movers. A single Apple AirTag proved she was right 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/she-didnt-trust-her-movers-a-single-apple-airtag-proved-she-was-right\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-01-23T13:00:02+00:00","og_image":[{"url":"https:\/\/www.zdnet.com\/a\/img\/resize\/49697774b9d0f860c58c369362a8e913bde829de\/2022\/01\/18\/90b0bc44-9fe0-4058-b283-19a2a81cd9b7\/screenshot-2022-01-18-at-15-40-39.png?width=1200&amp;fit=bounds&amp;auto=webp","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/she-didnt-trust-her-movers-a-single-apple-airtag-proved-she-was-right\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/she-didnt-trust-her-movers-a-single-apple-airtag-proved-she-was-right\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"She didn&#8217;t trust her movers. A single Apple AirTag proved she was right","datePublished":"2022-01-23T13:00:02+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/she-didnt-trust-her-movers-a-single-apple-airtag-proved-she-was-right\/"},"wordCount":549,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/she-didnt-trust-her-movers-a-single-apple-airtag-proved-she-was-right\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/49697774b9d0f860c58c369362a8e913bde829de\/2022\/01\/18\/90b0bc44-9fe0-4058-b283-19a2a81cd9b7\/screenshot-2022-01-18-at-15-40-39.png?width=1200&amp;fit=bounds&amp;auto=webp","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/she-didnt-trust-her-movers-a-single-apple-airtag-proved-she-was-right\/","url":"https:\/\/www.threatshub.org\/blog\/she-didnt-trust-her-movers-a-single-apple-airtag-proved-she-was-right\/","name":"She didn't trust her movers. A single Apple AirTag proved she was right 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/she-didnt-trust-her-movers-a-single-apple-airtag-proved-she-was-right\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/she-didnt-trust-her-movers-a-single-apple-airtag-proved-she-was-right\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/49697774b9d0f860c58c369362a8e913bde829de\/2022\/01\/18\/90b0bc44-9fe0-4058-b283-19a2a81cd9b7\/screenshot-2022-01-18-at-15-40-39.png?width=1200&amp;fit=bounds&amp;auto=webp","datePublished":"2022-01-23T13:00:02+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/she-didnt-trust-her-movers-a-single-apple-airtag-proved-she-was-right\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/she-didnt-trust-her-movers-a-single-apple-airtag-proved-she-was-right\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/she-didnt-trust-her-movers-a-single-apple-airtag-proved-she-was-right\/#primaryimage","url":"https:\/\/www.zdnet.com\/a\/img\/resize\/49697774b9d0f860c58c369362a8e913bde829de\/2022\/01\/18\/90b0bc44-9fe0-4058-b283-19a2a81cd9b7\/screenshot-2022-01-18-at-15-40-39.png?width=1200&amp;fit=bounds&amp;auto=webp","contentUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/49697774b9d0f860c58c369362a8e913bde829de\/2022\/01\/18\/90b0bc44-9fe0-4058-b283-19a2a81cd9b7\/screenshot-2022-01-18-at-15-40-39.png?width=1200&amp;fit=bounds&amp;auto=webp"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/she-didnt-trust-her-movers-a-single-apple-airtag-proved-she-was-right\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"She didn&#8217;t trust her movers. A single Apple AirTag proved she was right"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/44952","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=44952"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/44952\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=44952"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=44952"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=44952"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}