Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Avoid Facetime Spying

Tip of the Week: Avoid Facetime Spying

Sometimes threats come to light only after they’ve been around for long enough to cause concern for the public. This was the case with a new bug found in Apple’s FaceTime app that allowed users to spy on others without their consent through group FaceTime calls. Thankfully, a patch has been issued that resolves it, but perhaps the way that it was implemented is the most interesting of all.

The most dangerous part about this threat was definitely how accessible it was to just about anyone who wanted to use it. In fact, it was so accessible that Apple had to disable the feature entirely until it was resolved, inconveniencing users at the cost of security.

Following the release of the update to iOS 12.1.4, Apple turned the feature back on, but until the user applies the patch, group FaceTime will simply be inaccessible. This is one way to handle the potentially disastrous scenario, as instead of giving users the option to continue using the service and putting themselves (and their privacy) on the line, Apple is leaving no room for error or controversy, instead opting to protect themselves and their users until they update their devices.

How to Upgrade Your Device
If you own an iOS device, you can run the update by following this path: Settings > General > Software Update. Keep in mind that you’ll want your device to be charged, and you will need a wireless connection as well. Automatic downloads can also be turned on through this process, meaning that you don’t have to initiate the update yourself.

This just goes to show how we all need to be mindful of what our devices are capable of, and how easy it can be to put our privacy at risk when we aren’t mindful of it.

In general, it’s important to remember that software updates are designed to be implemented as soon as possible, as they often address vulnerabilities or issues with security and performance. If you’re having trouble keeping your devices up to date, reach out to Voyage Technology at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 17 April 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Phishing Privacy Email Workplace Tips Google Computer Workplace Strategy Collaboration Small Business Hosted Solutions Backup Users Ransomware Managed Service Mobile Device Productivity Microsoft Quick Tips Passwords Saving Money AI Communication Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Information Holiday Automation Artificial Intelligence Facebook Miscellaneous Cloud Computing Training Compliance Covid-19 Gadgets Remote Work Server Managed Service Provider Outsourced IT IT Support Encryption Spam Employee/Employer Relationship Office Windows 10 Government Data Management Business Continuity Wi-Fi Business Technology Windows 10 Bandwidth Blockchain Virtualization Apps Two-factor Authentication Managed Services Mobile Office Data Security Vendor Employer-Employee Relationship BYOD Voice over Internet Protocol Mobile Device Management Tip of the week Chrome Gmail Budget WiFi Apple Networking App Applications Computing Hacker Physical Security Information Technology Avoiding Downtime Conferencing Access Control Marketing Office 365 Password Managed IT Services How To HIPAA BDR Operating System 2FA Computers Help Desk Risk Management Virtual Private Network Website Health Healthcare Analytics Office Tips Augmented Reality Retail Storage Bring Your Own Device Big Data Router Going Green Patch Management Save Money Remote Monitoring End of Support Vulnerability Customer Service Windows 11 Vendor Management Cybercrime Monitoring Excel Display Printer Paperless Office Managed IT Service Infrastructure Remote Workers Telephone Firewall Document Management Cooperation Free Resource Project Management Windows 7 The Internet of Things Scam Microsoft 365 Data loss Solutions Social Robot Modem Customer Relationship Management User Tip Processor Mobile Security Settings Wireless Printing Holidays Content Filtering Hacking IT Management YouTube Meetings Data Storage Presentation VPN Smart Technology Supply Chain Video Conferencing Cryptocurrency Managed Services Provider Wireless Technology Virtual Machines Professional Services Computer Repair Saving Time Virtual Desktop Data storage LiFi Downloads Word Outlook iPhone Machine Learning Licensing Money Humor Vulnerabilities Entertainment Data Privacy Safety Maintenance Images 101 Sports Antivirus Mouse Mobility Telephone System Multi-Factor Authentication Cost Management Administration Employees Integration Travel Username Managing Costs Amazon eCommerce Techology Black Friday SSID Google Maps Cortana Database Surveillance Virtual Assistant Outsource IT Alt Codes Media Downtime Unified Threat Management IT Technicians Virtual Machine Environment Competition Cookies Unified Threat Management Cyber Monday Medical IT Hosted Solution Proxy Server Reviews Tactics Development Hotspot Transportation Small Businesses Typing Network Congestion Mirgation Hypervisor Displays Nanotechnology Optimization Google Drive User Error PowerPoint User Knowledge Shopping Addiction Language Employer/Employee Relationships Outsourcing Navigation Point of Sale 5G Management PCI DSS Chatbots Screen Reader IP Address Google Docs Distributed Denial of Service Workplace Unified Communications Experience Gig Economy Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Bitcoin Network Management Running Cable Tech Support Evernote Paperless Monitors Regulations Compliance Identity Google Wallet Smart Tech Memes Co-managed IT Recovery Bookmark Download Net Neutrality Alerts SQL Server Technology Care Hard Drives Windows 8 Laptop Websites Drones Business Communications Financial Data History Domains Connectivity IT SharePoint Break Fix Scams Electronic Medical Records Browsers Smartwatch Halloween Upload Procurement Azure Hybrid Work Refrigeration Public Speaking Lenovo Multi-Factor Security Tech Human Resources Writing Social Network Telework Cyber security IoT Communitications Lithium-ion battery Dark Web Cables Virtual Reality CES Entrepreneur Scary Stories Private Cloud Trends Supply Chain Management Hacks Server Management Superfish Google Calendar Term Google Apps Identity Theft Fun Customer Resource management FinTech Regulations Star Wars IT Assessment Microsoft Excel IT Maintenance Deep Learning Twitter Data Analysis Error Gamification Flexibility Staff Value Business Intelligence Undo Legislation Shortcuts Education Social Engineering Organization Social Networking Smart Devices Ransmoware Remote Computing Fileless Malware Digital Security Cameras Content Remote Working Wearable Technology Memory Vendors Mobile Computing Comparison Google Play Be Proactive Tablet Search Health IT Motherboard Data Breach Assessment Electronic Health Records Permissions Workforce Application Best Practice Alert Directions Videos Buisness File Sharing Dark Data Wasting Time Threats Managed IT IBM Legal Specifications Security Cameras Workplace Strategies IT solutions How To Trend Micro Microchip Internet Exlporer Software as a Service Fraud Meta Business Growth Notifications

Blog Archive