Logitech’s New iPad Keyboard Can Go Wireless


Logitech has revealed a new iPad keyboard with a twist. The Flip Folio is a case with a magnetic detachable keyboard, allowing you to type at more angles than most iPad keyboards and easily switch between devices.

The new Flip Folio keyboard has two components: a multi-angle kickstand for the back of your iPad, and the compact wireless keyboard. It works in both landscape and portrait mode, with options available for the 11-inch iPad Pro, 11-inch iPad Air, 13-inch iPad Pro, and 13-inch iPad Air. The kickstand component isn’t much of a protective case, though—it doesn’t wrap around the edges of the iPad.

This looks like a lot like Microsoft’s Flex Keyboard for the Surface Pro, which is primarily designed to stay attached to a Surface tablet, but it can also be detached for standalone wireless use. Logitech’s version is less feature-packed, since it’s not acting as a storage and charging area for a stylus like Microsoft’s keyboard, but it’s the same basic concept.

Logitech keyboard and kickstand case with an iPad

Logitech

The keyboard has the same multi-device Bluetooth pairing as many other wireless keyboards, allowing you to quickly switch between three connections. For example, you could have your iPad on the same desk as a desktop computer and phone, using the same Flip Folio keyboard for all three devices. It also has the usual iPadOS shortcut keys, and when you’re not using the keyboard, it can magnetically attach to the back of the case.

Importantly, this keyboard has no built-in touchpad, so you still need to lift your hand to tap the screen when needed. You could also bring along a wireless mouse. Logitech also didn’t mention how the keyboard’s battery is charged or replaced, but it’s rated for two years of battery life.

Logitech has released many other iPad keyboards over the years, including the Keys-To-Go 2 for iPad, which has a similar slim design as the new Flip Folio. My personal favorite is still the Logitech Folio Touch, which adds more of a protective bumper around the tablet and has a full keyboard and trackpad.

2:15

Related


Logitech Keys-To-Go 2 Review: A Truly Minimal Successor

If you’re a sucker for ultra-portable gadgets, ones great for travel, then the Logitech Keys-To-Go 2 keyboard has your name all over it. I’m one of these people and I couldn’t resist its minimal frame with generous-sized responsive keys.

The keyboard and matching kickstand will be sold in a few different colors: Graphite, Black, Pale Grey, Lilac, and Sand. The first two options will be available when the keyboard goes on sale in June, and the latter three options will be released later in September.

The Logitech Flip Folio keyboard will be priced at $179.99/€199 for 13-inch iPad Pro and iPad Air models, and $159.99/€179 for 11-inch iPad Pro and iPad Air models. That’s definitely expensive, but still cheaper than Apple’s own Magic Keyboard. It should be available from Logitech’s online store and third-party retailers later this month.

Source: Logitech



Source link

Leave a Reply

Subscribe to Our Newsletter

Get our latest articles delivered straight to your inbox. No spam, we promise.

Recent Reviews


Researchers found one-click RCE in ASUS’s pre-installed software DriverHub

Pierluigi Paganini
May 12, 2025

Expert found two flaws in DriverHub, pre-installed on Asus motherboards, which allows remote code execution via crafted HTTP requests.

Security researcher ‘MrBruh’ discovered two vulnerabilities, tracked as CVE-2025-3462 (CVSS score of 8.4) and CVE-2025-3463 (CVSS score of 9.4), in DriverHub, a driver that is pre-installed on Asus motherboards. A remote attacker can exploit the flaws to gain arbitrary code execution.

Both flaws stem from insufficient validation, allowing misuse of DriverHub features. The company pointed out that the flaws don’t impact laptops and desktops.

DriverHub, a driver updater with no GUI, runs a background process that talks to driverhub.asus.com via RPC on localhost port 53000. Researcher MrBruh found that while it only accepts requests with an origin header set to “driverhub.asus.com,” a flawed wildcard match allowed requests from domains like “driverhub.asus.com.mrbruh.com.” An attacker can exploit this vulnerability to install malicious software.

Researcher MrBruh discovered that Asus DriverHub exposes several local RPC endpoints, including dangerous ones like UpdateApp, which downloads and installs executables with admin rights if signed by Asus. By analyzing JavaScript and decompiled code, he found that a zip file used in driver installs includes an INI setting (SilentInstallRun) that can execute arbitrary commands during silent installs. This opens a path to remote code execution (RCE).

“The files of importance here are the AsusSetup.exeAsusSetup.ini and SilentInstall.cmd. When executing AsusSetup.exe it first reads from AsusSetup.ini, which contains metadata about the driver. I took interest in a property in the file: SilentInstallRun.” reads the report published by MrBrush. “When you double-click AsusSetup.exe it launches a simple gui installer thingy. But if you run AsusSetup.exe with the -s flag (DriverHub calls it using this to do a silent install), it will execute whatever’s specified in SilentInstallRun. In this case the ini file specifies a cmd script that performs an automated headless install of the driver, but it could run anything.”

The exploit chain abuses Asus DriverHub’s update mechanism: a malicious site on a spoofed subdomain sends requests to download a benign-sounding executable and a crafted AsusSetup.ini. Then, it downloads a legitimate, signed AsusSetup.exe, which runs silently with admin rights and executes the attacker’s payload (calc.exe) as specified in the .ini file.

MrBruh discovered the flaw on April 7 and reported the vulnerabilities on April 8. Asus released security updates on May 9.

MrBruh asked Asus if they offered bug bounties. The company said they don’t offer bug bounties but would add the researcher’s name to their “hall of fame.”

“I asked ASUS if they offered bug bounties. They responded saying they do not, but they would instead put my name in their “hall of fame”. This is understandable since ASUS is just a small startup and likely does not have the capital to pay a bounty.” concludes MrBruh.

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, ASUS)







Source link