Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Avoid Facetime Spying

Tip of the Week: Avoid Facetime Spying

Sometimes threats come to light only after they’ve been around for long enough to cause concern for the public. This was the case with a new bug found in Apple’s FaceTime app that allowed users to spy on others without their consent through group FaceTime calls. Thankfully, a patch has been issued that resolves it, but perhaps the way that it was implemented is the most interesting of all.

The most dangerous part about this threat was definitely how accessible it was to just about anyone who wanted to use it. In fact, it was so accessible that Apple had to disable the feature entirely until it was resolved, inconveniencing users at the cost of security.

Following the release of the update to iOS 12.1.4, Apple turned the feature back on, but until the user applies the patch, group FaceTime will simply be inaccessible. This is one way to handle the potentially disastrous scenario, as instead of giving users the option to continue using the service and putting themselves (and their privacy) on the line, Apple is leaving no room for error or controversy, instead opting to protect themselves and their users until they update their devices.

How to Upgrade Your Device
If you own an iOS device, you can run the update by following this path: Settings > General > Software Update. Keep in mind that you’ll want your device to be charged, and you will need a wireless connection as well. Automatic downloads can also be turned on through this process, meaning that you don’t have to initiate the update yourself.

This just goes to show how we all need to be mindful of what our devices are capable of, and how easy it can be to put our privacy at risk when we aren’t mindful of it.

In general, it’s important to remember that software updates are designed to be implemented as soon as possible, as they often address vulnerabilities or issues with security and performance. If you’re having trouble keeping your devices up to date, reach out to Voyage Technology at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 27 January 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support Privacy IT Services Workplace Tips Computer Google Email Phishing Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Backup Small Business Productivity Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone Android Data Recovery Upgrade AI Disaster Recovery Smartphones VoIP Business Management Mobile Devices communications Windows Social Media Browser Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Miscellaneous Automation Artificial Intelligence Information Facebook Holiday Training Gadgets Cloud Computing Covid-19 Server Compliance Managed Service Provider Remote Work Outsourced IT IT Support Encryption Employee/Employer Relationship Spam Windows 10 Office Business Continuity Government Data Management Business Technology Wi-Fi Bandwidth Windows 10 Blockchain Virtualization Apps Two-factor Authentication Mobile Office Data Security Vendor Employer-Employee Relationship Tip of the week Managed Services Voice over Internet Protocol Networking Chrome Mobile Device Management Budget Gmail Apple BYOD WiFi App Access Control Computing Information Technology Conferencing Hacker Avoiding Downtime Office 365 Marketing How To BDR HIPAA Applications Health Operating System 2FA Help Desk Risk Management Computers Retail Healthcare Analytics Website Office Tips Managed IT Services Augmented Reality Storage Password Bring Your Own Device Router Virtual Private Network Big Data Going Green Social Printer Windows 11 Paperless Office Infrastructure Monitoring Cybercrime Excel Document Management Customer Service Remote Workers Telephone Scam Data loss Cooperation Free Resource Project Management Windows 7 Firewall Patch Management Save Money Microsoft 365 Remote Monitoring End of Support Vulnerability Vendor Management Solutions The Internet of Things Physical Security Display Computer Repair Mobile Security Processor Settings Holidays Printing Wireless Data Storage Content Filtering Smart Technology Supply Chain Customer Relationship Management Video Conferencing YouTube Machine Learning Managed Services Provider Virtual Machines Professional Services Saving Time Cryptocurrency Hacking Presentation Managed IT Service Maintenance Virtual Desktop Downloads Data storage Antivirus LiFi Wireless Technology iPhone Licensing Outlook Vulnerabilities Entertainment Money Data Privacy Humor Word Images 101 Robot Mobility Telephone System Multi-Factor Authentication Cost Management Sports Mouse Safety IT Management Administration VPN Employees Meetings Integration User Tip Modem Database Surveillance Application Virtual Assistant Outsource IT Network Management Tech Support IT Technicians Virtual Machine Environment Cortana Media Monitors Cyber Monday Medical IT Proxy Server Reviews Alt Codes IBM Cookies Tactics Development Downtime Hotspot Transportation Small Businesses Hosted Solution Websites Mirgation Hypervisor Displays PowerPoint Shopping Typing Nanotechnology Optimization SharePoint Addiction Electronic Medical Records Language Employer/Employee Relationships Outsourcing Google Drive Management PCI DSS Competition Chatbots Knowledge Navigation Screen Reader Writing Distributed Denial of Service Workplace Lenovo Gig Economy Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Hiring/Firing 5G Evernote Paperless Google Docs Server Management Regulations Compliance Unified Communications Private Cloud Identity Experience Identity Theft Smart Tech Memes Running Cable User Co-managed IT Superfish Bookmark Bitcoin Google Wallet Download Net Neutrality Twitter Alerts SQL Server Technology Care Business Communications Financial Data Error History Connectivity IT Laptop Social Engineering Break Fix Scams Browsers Smartwatch Windows 8 IP Address Drones Upload Procurement Remote Computing Azure Hybrid Work Multi-Factor Security Tech Human Resources Social Network Telework Cyber security Tablet IoT Communitications Halloween Recovery Dark Web Cables CES Trends Supply Chain Management Hard Drives Alert Dark Data Google Calendar Term Google Apps Managed IT Customer Resource management FinTech Domains File Sharing Regulations Star Wars IT Assessment Scary Stories How To Microsoft Excel IT Maintenance Data Analysis Hacks Gamification Flexibility Refrigeration Notifications Staff Value Business Intelligence Fun Legislation Shortcuts Organization Deep Learning Public Speaking Travel Social Networking Lithium-ion battery Google Maps Smart Devices Ransmoware Techology Fileless Malware Digital Security Cameras Content Remote Working Education Wearable Technology Memory Vendors Entrepreneur Comparison Google Play Be Proactive Health IT Unified Threat Management Motherboard Data Breach Assessment Electronic Health Records Permissions Workforce Unified Threat Management Directions Videos Mobile Computing Undo Wasting Time Threats Search Network Congestion Specifications Security Cameras Workplace Strategies Best Practice Trend Micro Internet Exlporer Software as a Service Buisness Fraud Meta User Error Microchip Legal Username IT solutions Managing Costs Amazon Black Friday SSID Business Growth Point of Sale eCommerce

Blog Archive