Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Avoid Facetime Spying

Tip of the Week: Avoid Facetime Spying

Sometimes threats come to light only after they’ve been around for long enough to cause concern for the public. This was the case with a new bug found in Apple’s FaceTime app that allowed users to spy on others without their consent through group FaceTime calls. Thankfully, a patch has been issued that resolves it, but perhaps the way that it was implemented is the most interesting of all.

The most dangerous part about this threat was definitely how accessible it was to just about anyone who wanted to use it. In fact, it was so accessible that Apple had to disable the feature entirely until it was resolved, inconveniencing users at the cost of security.

Following the release of the update to iOS 12.1.4, Apple turned the feature back on, but until the user applies the patch, group FaceTime will simply be inaccessible. This is one way to handle the potentially disastrous scenario, as instead of giving users the option to continue using the service and putting themselves (and their privacy) on the line, Apple is leaving no room for error or controversy, instead opting to protect themselves and their users until they update their devices.

How to Upgrade Your Device
If you own an iOS device, you can run the update by following this path: Settings > General > Software Update. Keep in mind that you’ll want your device to be charged, and you will need a wireless connection as well. Automatic downloads can also be turned on through this process, meaning that you don’t have to initiate the update yourself.

This just goes to show how we all need to be mindful of what our devices are capable of, and how easy it can be to put our privacy at risk when we aren’t mindful of it.

In general, it’s important to remember that software updates are designed to be implemented as soon as possible, as they often address vulnerabilities or issues with security and performance. If you’re having trouble keeping your devices up to date, reach out to Voyage Technology at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 25 April 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Hardware Internet Efficiency IT Support Malware Privacy Google Email Workplace Tips Phishing Computer IT Services Collaboration Hosted Solutions Users Mobile Device Ransomware Quick Tips Workplace Strategy Small Business Cybersecurity Microsoft Passwords Communication Data Backup Smartphone Backup Saving Money VoIP Business Management Smartphones Android Mobile Devices communications Managed Service Upgrade Disaster Recovery Data Recovery Browser Social Media Managed IT Services Microsoft Office Windows Network Remote Tech Term Internet of Things Current Events Facebook Productivity Automation Artificial Intelligence Gadgets Cloud Computing Covid-19 Miscellaneous AI Remote Work Server Managed Service Provider Information Holiday Outsourced IT Encryption Spam Employee/Employer Relationship Compliance Office Windows 10 Government Training Business Continuity Data Management Virtualization Blockchain Wi-Fi Business Technology Bandwidth Windows 10 Data Security Apps Two-factor Authentication Mobile Office Apple Networking App Employer-Employee Relationship BYOD Vendor Chrome Mobile Device Management Budget Managed Services Voice over Internet Protocol Gmail How To WiFi BDR Computing Information Technology Applications Hacker Access Control Avoiding Downtime Office 365 Marketing IT Support Tip of the week Conferencing Managed IT Services Big Data Operating System HIPAA Router Virtual Private Network Risk Management Computers Health Analytics Website Office Tips Help Desk Augmented Reality Retail Storage Password Bring Your Own Device Healthcare The Internet of Things Cooperation Free Resource Project Management Social Going Green Patch Management Windows 7 Save Money Remote Monitoring Microsoft 365 End of Support Vulnerability Vendor Management Cybercrime Solutions Physical Security Customer Service Display Printer Paperless Office Infrastructure Windows 11 Monitoring 2FA Document Management Excel Firewall Remote Workers Scam Telephone Data loss Safety iPhone Administration Licensing Entertainment Vulnerabilities Data Privacy Robot Images 101 Telephone System Multi-Factor Authentication Settings Mobility Wireless Printing Cost Management Content Filtering IT Management Customer Relationship Management VPN YouTube Meetings Employees Cryptocurrency Hacking Integration Presentation Computer Repair User Tip Modem Mobile Security Processor Virtual Desktop LiFi Wireless Technology Data storage Holidays Outlook Data Storage Machine Learning Smart Technology Supply Chain Money Video Conferencing Humor Managed Services Provider Word Saving Time Virtual Machines Professional Services Maintenance Antivirus Sports Managed IT Service Mouse Downloads Browsers Smartwatch Mobile Computing Connectivity IT Break Fix Scams Tablet Undo Azure Hybrid Work Search Upload Procurement Social Network Telework Best Practice Cyber security Alert Multi-Factor Security Tech Human Resources Dark Data CES Managed IT IoT Communitications Buisness File Sharing Dark Web Cables IT solutions How To Legal Trends Supply Chain Management Customer Resource management FinTech Business Growth Regulations Notifications Google Calendar Term Google Apps Data Analysis Star Wars IT Assessment Travel Application Microsoft Excel IT Maintenance Gamification Flexibility Google Maps Staff Value Business Intelligence Cortana Techology Organization Alt Codes IBM Social Networking Legislation Shortcuts Ransmoware Fileless Malware Digital Security Cameras Smart Devices Downtime Unified Threat Management Content Remote Working Hosted Solution Wearable Technology Memory Vendors Unified Threat Management Health IT Typing Motherboard Data Breach Comparison Google Play Be Proactive Permissions Workforce Network Congestion Directions Videos Assessment Electronic Health Records Competition Wasting Time Threats Knowledge Google Drive User Error Trend Micro Specifications Security Cameras Workplace Strategies Fraud Meta 5G Microchip Internet Exlporer Software as a Service Point of Sale Username Unified Communications Managing Costs Amazon Experience Google Docs Bitcoin Network Management eCommerce Running Cable Tech Support User Black Friday SSID Virtual Assistant Outsource IT Monitors Google Wallet Database Surveillance IT Technicians Virtual Machine Environment Media Proxy Server Reviews Windows 8 IP Address Cookies Laptop Websites Cyber Monday Medical IT Hotspot Transportation Small Businesses Drones Tactics Development SharePoint Mirgation Hypervisor Displays Electronic Medical Records Shopping Nanotechnology Optimization Halloween Recovery PowerPoint Hard Drives Language Employer/Employee Relationships Outsourcing Writing Lenovo Addiction Management PCI DSS Domains Chatbots Virtual Reality Navigation Gig Economy Hacks Server Management Screen Reader Scary Stories Private Cloud Distributed Denial of Service Workplace Identity Theft Refrigeration Computing Infrastructure Teamwork Hiring/Firing Fun Superfish Service Level Agreement Internet Service Provider Regulations Compliance Deep Learning Public Speaking Identity Twitter Evernote Paperless Bookmark Lithium-ion battery Smart Tech Memes Error Co-managed IT Education Alerts SQL Server Technology Care Social Engineering Entrepreneur Download Net Neutrality Financial Data History Remote Computing Business Communications

Blog Archive