Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Avoid Facetime Spying

Tip of the Week: Avoid Facetime Spying

Sometimes threats come to light only after they’ve been around for long enough to cause concern for the public. This was the case with a new bug found in Apple’s FaceTime app that allowed users to spy on others without their consent through group FaceTime calls. Thankfully, a patch has been issued that resolves it, but perhaps the way that it was implemented is the most interesting of all.

The most dangerous part about this threat was definitely how accessible it was to just about anyone who wanted to use it. In fact, it was so accessible that Apple had to disable the feature entirely until it was resolved, inconveniencing users at the cost of security.

Following the release of the update to iOS 12.1.4, Apple turned the feature back on, but until the user applies the patch, group FaceTime will simply be inaccessible. This is one way to handle the potentially disastrous scenario, as instead of giving users the option to continue using the service and putting themselves (and their privacy) on the line, Apple is leaving no room for error or controversy, instead opting to protect themselves and their users until they update their devices.

How to Upgrade Your Device
If you own an iOS device, you can run the update by following this path: Settings > General > Software Update. Keep in mind that you’ll want your device to be charged, and you will need a wireless connection as well. Automatic downloads can also be turned on through this process, meaning that you don’t have to initiate the update yourself.

This just goes to show how we all need to be mindful of what our devices are capable of, and how easy it can be to put our privacy at risk when we aren’t mindful of it.

In general, it’s important to remember that software updates are designed to be implemented as soon as possible, as they often address vulnerabilities or issues with security and performance. If you’re having trouble keeping your devices up to date, reach out to Voyage Technology at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 22 May 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips IT Services Internet Malware Workplace Tips Phishing IT Support Privacy Email Google Computer Workplace Strategy Small Business Hosted Solutions Collaboration Backup Ransomware Managed Service Users AI Mobile Device Productivity Microsoft Saving Money Quick Tips Passwords Communication Cybersecurity Smartphone Data Backup Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones communications Mobile Devices Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Miscellaneous Information Facebook Holiday Training Automation Artificial Intelligence Cloud Computing Gadgets Compliance Covid-19 Outsourced IT IT Support Server Managed Service Provider Remote Work Encryption Spam Employee/Employer Relationship Windows 10 Office Government Business Continuity Data Management Virtualization Wi-Fi Business Technology Blockchain Bandwidth Vendor Windows 10 Data Security Managed Services Apps Two-factor Authentication Tip of the week Mobile Office App WiFi BYOD Voice over Internet Protocol Employer-Employee Relationship Chrome Budget Mobile Device Management Apple Networking Gmail BDR Computing Conferencing Physical Security Information Technology Access Control Hacker Office 365 Avoiding Downtime Marketing Password HIPAA Applications Managed IT Services How To 2FA Help Desk Big Data Operating System Virtual Private Network Risk Management Healthcare Health Computers Analytics Office Tips Augmented Reality Website Retail Storage Router Bring Your Own Device Windows 11 Going Green Patch Management The Internet of Things Monitoring Save Money Remote Monitoring Vulnerability End of Support Excel Social Vendor Management Cybercrime Managed IT Service Remote Workers Telephone Display Printer Customer Service Paperless Office Infrastructure Cooperation Free Resource Project Management Windows 7 Document Management Microsoft 365 Solutions Scam Data loss Firewall Safety Holidays Data Storage Robot Smart Technology Supply Chain Video Conferencing Settings Printing Managed Services Provider Wireless Professional Services Saving Time Virtual Machines Content Filtering IT Management VPN YouTube Meetings Cryptocurrency Customer Relationship Management Downloads iPhone Computer Repair Licensing Virtual Desktop Vulnerabilities Data storage Entertainment LiFi Hacking Presentation Data Privacy Outlook Images 101 Wireless Technology Machine Learning Money Telephone System Multi-Factor Authentication Mobility Humor Cost Management Maintenance Antivirus Sports Word Mouse Employees Integration User Tip Administration Modem Mobile Security Processor Cyber Monday Medical IT Legal Proxy Server Reviews IT solutions Cookies How To Undo Tactics Development Notifications Hotspot Transportation Small Businesses Business Growth Travel Mirgation Hypervisor Displays PowerPoint Techology Shopping Google Maps Nanotechnology Optimization Cortana Addiction Language Employer/Employee Relationships Outsourcing Alt Codes Management PCI DSS Downtime Unified Threat Management Chatbots Navigation Distributed Denial of Service Workplace Unified Threat Management Gig Economy Hosted Solution Application Screen Reader Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Typing IBM Regulations Compliance Identity Network Congestion Evernote Paperless Co-managed IT Google Drive User Error Bookmark Smart Tech Memes Knowledge Download Net Neutrality Alerts SQL Server Technology Care Financial Data Point of Sale History 5G Business Communications Break Fix Scams Google Docs Browsers Smartwatch Unified Communications Connectivity IT Experience Competition Upload Procurement Running Cable Tech Support Azure Hybrid Work Bitcoin Network Management Google Wallet Social Network Telework Cyber security Monitors Multi-Factor Security Tech Human Resources Dark Web Cables CES IoT Communitications Trends Supply Chain Management Laptop Websites Windows 8 Drones Customer Resource management FinTech User Regulations Google Calendar Term Google Apps Microsoft Excel IT Maintenance SharePoint Data Analysis Star Wars IT Assessment Electronic Medical Records Gamification Flexibility Halloween Staff Value Business Intelligence Lenovo IP Address Organization Social Networking Writing Legislation Shortcuts Virtual Reality Ransmoware Fileless Malware Digital Security Cameras Smart Devices Hacks Server Management Content Remote Working Scary Stories Private Cloud Wearable Technology Memory Vendors Superfish Health IT Identity Theft Recovery Motherboard Data Breach Fun Comparison Google Play Be Proactive Assessment Electronic Health Records Twitter Permissions Workforce Directions Videos Deep Learning Hard Drives Domains Error Wasting Time Threats Specifications Security Cameras Workplace Strategies Education Trend Micro Social Engineering Refrigeration Internet Exlporer Software as a Service Remote Computing Fraud Meta Microchip Mobile Computing Public Speaking Username Managing Costs Amazon Black Friday SSID Lithium-ion battery Tablet eCommerce Search Database Surveillance Alert Entrepreneur Virtual Assistant Outsource IT Best Practice Managed IT Buisness File Sharing IT Technicians Virtual Machine Environment Dark Data Media

Blog Archive