Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Avoid Facetime Spying

Tip of the Week: Avoid Facetime Spying

Sometimes threats come to light only after they’ve been around for long enough to cause concern for the public. This was the case with a new bug found in Apple’s FaceTime app that allowed users to spy on others without their consent through group FaceTime calls. Thankfully, a patch has been issued that resolves it, but perhaps the way that it was implemented is the most interesting of all.

The most dangerous part about this threat was definitely how accessible it was to just about anyone who wanted to use it. In fact, it was so accessible that Apple had to disable the feature entirely until it was resolved, inconveniencing users at the cost of security.

Following the release of the update to iOS 12.1.4, Apple turned the feature back on, but until the user applies the patch, group FaceTime will simply be inaccessible. This is one way to handle the potentially disastrous scenario, as instead of giving users the option to continue using the service and putting themselves (and their privacy) on the line, Apple is leaving no room for error or controversy, instead opting to protect themselves and their users until they update their devices.

How to Upgrade Your Device
If you own an iOS device, you can run the update by following this path: Settings > General > Software Update. Keep in mind that you’ll want your device to be charged, and you will need a wireless connection as well. Automatic downloads can also be turned on through this process, meaning that you don’t have to initiate the update yourself.

This just goes to show how we all need to be mindful of what our devices are capable of, and how easy it can be to put our privacy at risk when we aren’t mindful of it.

In general, it’s important to remember that software updates are designed to be implemented as soon as possible, as they often address vulnerabilities or issues with security and performance. If you’re having trouble keeping your devices up to date, reach out to Voyage Technology at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 28 January 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Email Workplace Tips Google Computer Phishing Collaboration Hosted Solutions Workplace Strategy Users Ransomware Mobile Device Microsoft Backup Small Business Productivity Quick Tips Managed Service Passwords Saving Money Cybersecurity Communication Data Backup Smartphone Android AI Upgrade Disaster Recovery Data Recovery VoIP Business Management Smartphones Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Holiday Information Automation Facebook Artificial Intelligence Miscellaneous Cloud Computing Training Covid-19 Gadgets Compliance Server Managed Service Provider Remote Work IT Support Outsourced IT Encryption Employee/Employer Relationship Spam Office Windows 10 Government Data Management Business Continuity Wi-Fi Blockchain Windows 10 Business Technology Virtualization Bandwidth Data Security Mobile Office Two-factor Authentication Vendor Apps App BYOD Mobile Device Management Gmail Tip of the week Chrome WiFi Budget Managed Services Employer-Employee Relationship Voice over Internet Protocol Apple Networking How To BDR Hacker Avoiding Downtime Computing Marketing Information Technology HIPAA Access Control Applications Office 365 Conferencing Healthcare Computers Operating System Website Virtual Private Network Risk Management Router Health Analytics Office Tips Augmented Reality 2FA Retail Help Desk Big Data Storage Password Bring Your Own Device Managed IT Services Telephone Customer Service Going Green Patch Management Save Money Cooperation Free Resource Remote Monitoring End of Support Project Management Vulnerability Vendor Management Windows 7 Cybercrime Physical Security Microsoft 365 Display Solutions Printer Firewall Paperless Office Infrastructure Document Management The Internet of Things Windows 11 Monitoring Social Excel Scam Data loss Remote Workers Downloads iPhone Licensing Hacking Robot Presentation Entertainment Vulnerabilities Data Privacy Settings Wireless Wireless Technology Printing Content Filtering Images 101 IT Management Telephone System Multi-Factor Authentication Mobility VPN YouTube Meetings Cost Management Cryptocurrency Word Computer Repair Employees Virtual Desktop LiFi Integration Data storage User Tip Modem Outlook Processor Safety Mobile Security Machine Learning Holidays Money Humor Data Storage Smart Technology Supply Chain Maintenance Video Conferencing Managed Services Provider Antivirus Sports Saving Time Virtual Machines Professional Services Mouse Administration Customer Relationship Management Managed IT Service Alerts SQL Server Technology Care Best Practice Alert Download Net Neutrality Dark Data Financial Data History Competition Business Communications Managed IT Buisness File Sharing IT solutions How To Browsers Smartwatch Connectivity IT Break Fix Scams Legal Azure Hybrid Work Business Growth Notifications Upload Procurement Social Network Telework Cyber security Multi-Factor Security Tech Human Resources Travel Google Maps Cortana CES IoT Communitications Dark Web Cables Techology User Alt Codes Trends Supply Chain Management Customer Resource management FinTech Regulations Google Calendar Term Google Apps Downtime Unified Threat Management Hosted Solution Data Analysis Star Wars IT Assessment IP Address Microsoft Excel IT Maintenance Unified Threat Management Staff Value Business Intelligence Typing Gamification Flexibility Network Congestion Organization Social Networking Legislation Shortcuts Knowledge Fileless Malware Digital Security Cameras Smart Devices Ransmoware Google Drive User Error Recovery Wearable Technology Memory Vendors Hard Drives Content Remote Working 5G Health IT Motherboard Data Breach Domains Comparison Google Play Be Proactive Point of Sale Unified Communications Experience Directions Videos Assessment Electronic Health Records Permissions Workforce Google Docs Wasting Time Threats Refrigeration Bitcoin Network Management Running Cable Tech Support Monitors Trend Micro Public Speaking Specifications Security Cameras Workplace Strategies Google Wallet Microchip Internet Exlporer Software as a Service Lithium-ion battery Fraud Meta Managing Costs Amazon Windows 8 Entrepreneur Laptop Websites Username eCommerce Black Friday SSID Drones SharePoint Electronic Medical Records Database Surveillance Virtual Assistant Outsource IT IT Technicians Virtual Machine Environment Undo Media Halloween Writing Proxy Server Reviews Cookies Cyber Monday Medical IT Lenovo Hotspot Transportation Small Businesses Virtual Reality Tactics Development Mirgation Hypervisor Displays Hacks Server Management Scary Stories Private Cloud Identity Theft Fun Shopping Nanotechnology Optimization PowerPoint Superfish Language Employer/Employee Relationships Outsourcing Application Deep Learning Twitter Addiction Management PCI DSS Chatbots Navigation Error Education Social Engineering Gig Economy Screen Reader IBM Distributed Denial of Service Workplace Computing Infrastructure Teamwork Hiring/Firing Remote Computing Service Level Agreement Internet Service Provider Regulations Compliance Identity Evernote Paperless Mobile Computing Tablet Search Bookmark Smart Tech Memes Co-managed IT

Blog Archive