Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Avoid Facetime Spying

Tip of the Week: Avoid Facetime Spying

Sometimes threats come to light only after they’ve been around for long enough to cause concern for the public. This was the case with a new bug found in Apple’s FaceTime app that allowed users to spy on others without their consent through group FaceTime calls. Thankfully, a patch has been issued that resolves it, but perhaps the way that it was implemented is the most interesting of all.

The most dangerous part about this threat was definitely how accessible it was to just about anyone who wanted to use it. In fact, it was so accessible that Apple had to disable the feature entirely until it was resolved, inconveniencing users at the cost of security.

Following the release of the update to iOS 12.1.4, Apple turned the feature back on, but until the user applies the patch, group FaceTime will simply be inaccessible. This is one way to handle the potentially disastrous scenario, as instead of giving users the option to continue using the service and putting themselves (and their privacy) on the line, Apple is leaving no room for error or controversy, instead opting to protect themselves and their users until they update their devices.

How to Upgrade Your Device
If you own an iOS device, you can run the update by following this path: Settings > General > Software Update. Keep in mind that you’ll want your device to be charged, and you will need a wireless connection as well. Automatic downloads can also be turned on through this process, meaning that you don’t have to initiate the update yourself.

This just goes to show how we all need to be mindful of what our devices are capable of, and how easy it can be to put our privacy at risk when we aren’t mindful of it.

In general, it’s important to remember that software updates are designed to be implemented as soon as possible, as they often address vulnerabilities or issues with security and performance. If you’re having trouble keeping your devices up to date, reach out to Voyage Technology at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 13 June 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Hardware Internet Efficiency IT Support Privacy Malware Google Email Computer Phishing Workplace Tips IT Services Collaboration Hosted Solutions Users Mobile Device Workplace Strategy Ransomware Small Business Quick Tips Cybersecurity Microsoft Communication Passwords Data Backup Saving Money Smartphone Backup Managed Service Business Management VoIP Smartphones Android Upgrade Mobile Devices communications Disaster Recovery Browser Data Recovery Windows Managed IT Services Social Media Microsoft Office Remote Current Events Tech Term Network Internet of Things Productivity Automation Artificial Intelligence Facebook Gadgets Cloud Computing AI Covid-19 Managed Service Provider Remote Work Miscellaneous Server Outsourced IT Holiday Information Employee/Employer Relationship Encryption Spam Compliance Training Windows 10 Office Data Management Business Continuity Government Business Technology Windows 10 Bandwidth Virtualization Wi-Fi Blockchain Vendor IT Support Data Security Apps Two-factor Authentication Mobile Office Mobile Device Management Chrome Gmail Budget Apple Networking Managed Services Voice over Internet Protocol App Employer-Employee Relationship BYOD Office 365 Applications Tip of the week WiFi Conferencing How To BDR Computing Hacker Information Technology Avoiding Downtime Access Control HIPAA Marketing Router Analytics Office Tips Augmented Reality Retail Storage Help Desk Password Bring Your Own Device Managed IT Services Big Data Healthcare Operating System Computers Risk Management Virtual Private Network Website Health Firewall Document Management Windows 11 Monitoring 2FA The Internet of Things Scam Data loss Excel Social Remote Workers Telephone Going Green Patch Management Save Money Remote Monitoring End of Support Vulnerability Cooperation Free Resource Vendor Management Customer Service Project Management Cybercrime Windows 7 Physical Security Microsoft 365 Display Printer Paperless Office Solutions Infrastructure Employees Word Integration Outlook User Tip Modem Machine Learning Mobile Security Processor Money Humor Holidays Safety Data Storage Maintenance Smart Technology Supply Chain Antivirus Sports Video Conferencing Mouse Managed Services Provider Professional Services Saving Time Virtual Machines Administration Managed IT Service Downloads iPhone Robot Licensing Customer Relationship Management Settings Vulnerabilities Wireless Entertainment Printing Data Privacy Content Filtering Hacking IT Management Images 101 Presentation VPN YouTube Meetings Telephone System Cryptocurrency Multi-Factor Authentication Mobility Wireless Technology Cost Management Computer Repair Virtual Desktop Data storage LiFi Hard Drives Windows 8 Trend Micro Laptop Websites Specifications Security Cameras Workplace Strategies Fraud Meta Microchip Domains Drones Internet Exlporer Software as a Service SharePoint Username Managing Costs Amazon Electronic Medical Records Refrigeration eCommerce Halloween Black Friday SSID Virtual Assistant Outsource IT Writing Public Speaking Lenovo Database Surveillance Lithium-ion battery IT Technicians Virtual Machine Environment Virtual Reality Media Proxy Server Reviews Hacks Server Management Cookies Entrepreneur Scary Stories Private Cloud Cyber Monday Medical IT Tactics Development Identity Theft Hotspot Transportation Small Businesses Fun Superfish Deep Learning Mirgation Hypervisor Displays Twitter PowerPoint Shopping Undo Nanotechnology Optimization Error Addiction Education Language Employer/Employee Relationships Outsourcing Social Engineering Management PCI DSS Chatbots Remote Computing Navigation Distributed Denial of Service Workplace Gig Economy Mobile Computing Screen Reader Service Level Agreement Internet Service Provider Tablet Computing Infrastructure Teamwork Hiring/Firing Search Regulations Compliance Application Best Practice Identity Alert Evernote Paperless Co-managed IT Dark Data Bookmark Managed IT Smart Tech Memes Buisness File Sharing Download Net Neutrality IT solutions Alerts SQL Server Technology Care How To IBM Legal Financial Data Business Growth History Notifications Business Communications Break Fix Scams Browsers Smartwatch Connectivity IT Travel Upload Procurement Google Maps Azure Hybrid Work Cortana Techology Social Network Telework Alt Codes Cyber security Multi-Factor Security Tech Human Resources Dark Web Cables CES Competition IoT Communitications Downtime Unified Threat Management Trends Supply Chain Management Hosted Solution Unified Threat Management Customer Resource management FinTech Typing Regulations Google Calendar Term Google Apps Microsoft Excel IT Maintenance Network Congestion Data Analysis Star Wars IT Assessment Google Drive User Error Gamification Flexibility User Staff Value Business Intelligence Knowledge Organization Social Networking Legislation Shortcuts Point of Sale Ransmoware 5G Fileless Malware Digital Security Cameras Smart Devices IP Address Google Docs Content Remote Working Unified Communications Wearable Technology Memory Vendors Experience Health IT Bitcoin Network Management Motherboard Data Breach Running Cable Tech Support Comparison Google Play Be Proactive Permissions Workforce Monitors Directions Videos Google Wallet Assessment Electronic Health Records Recovery Wasting Time Threats

Blog Archive