Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Avoid Facetime Spying

Tip of the Week: Avoid Facetime Spying

Sometimes threats come to light only after they’ve been around for long enough to cause concern for the public. This was the case with a new bug found in Apple’s FaceTime app that allowed users to spy on others without their consent through group FaceTime calls. Thankfully, a patch has been issued that resolves it, but perhaps the way that it was implemented is the most interesting of all.

The most dangerous part about this threat was definitely how accessible it was to just about anyone who wanted to use it. In fact, it was so accessible that Apple had to disable the feature entirely until it was resolved, inconveniencing users at the cost of security.

Following the release of the update to iOS 12.1.4, Apple turned the feature back on, but until the user applies the patch, group FaceTime will simply be inaccessible. This is one way to handle the potentially disastrous scenario, as instead of giving users the option to continue using the service and putting themselves (and their privacy) on the line, Apple is leaving no room for error or controversy, instead opting to protect themselves and their users until they update their devices.

How to Upgrade Your Device
If you own an iOS device, you can run the update by following this path: Settings > General > Software Update. Keep in mind that you’ll want your device to be charged, and you will need a wireless connection as well. Automatic downloads can also be turned on through this process, meaning that you don’t have to initiate the update yourself.

This just goes to show how we all need to be mindful of what our devices are capable of, and how easy it can be to put our privacy at risk when we aren’t mindful of it.

In general, it’s important to remember that software updates are designed to be implemented as soon as possible, as they often address vulnerabilities or issues with security and performance. If you’re having trouble keeping your devices up to date, reach out to Voyage Technology at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 29 January 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Email Workplace Tips Computer Google Phishing Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Small Business Microsoft Backup Productivity Managed Service Quick Tips Passwords Saving Money Cybersecurity Communication Data Backup Smartphone AI Android Data Recovery Upgrade Disaster Recovery Business Management Smartphones VoIP communications Mobile Devices Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Remote Internet of Things Facebook Automation Miscellaneous Information Artificial Intelligence Holiday Covid-19 Gadgets Cloud Computing Training Remote Work Server Managed Service Provider Compliance Outsourced IT IT Support Encryption Spam Employee/Employer Relationship Windows 10 Office Government Business Continuity Data Management Business Technology Virtualization Blockchain Wi-Fi Bandwidth Windows 10 Apps Vendor Two-factor Authentication Data Security Mobile Office App WiFi Tip of the week Employer-Employee Relationship Networking Chrome Managed Services Voice over Internet Protocol BYOD Budget Mobile Device Management Gmail Apple Computing HIPAA Information Technology Applications How To Hacker BDR Office 365 Avoiding Downtime Marketing Conferencing Access Control Big Data Operating System Retail Router Risk Management Managed IT Services Computers Office Tips Analytics Help Desk Website Augmented Reality Healthcare Storage Password Virtual Private Network Bring Your Own Device 2FA Health Cooperation The Internet of Things Microsoft 365 Going Green Social Solutions Document Management Cybercrime Scam Data loss Customer Service Monitoring Patch Management Save Money Remote Monitoring Vulnerability End of Support Remote Workers Vendor Management Physical Security Firewall Windows 11 Telephone Display Printer Free Resource Project Management Windows 7 Paperless Office Excel Infrastructure Mobility Multi-Factor Authentication Machine Learning Settings Telephone System Printing Wireless Cost Management Employees Content Filtering Integration YouTube Maintenance Antivirus Customer Relationship Management Cryptocurrency Data Privacy Holidays User Tip Modem Hacking Mobile Security Presentation Data Storage Virtual Desktop Processor Data storage LiFi Video Conferencing Wireless Technology Managed Services Provider Virtual Machines Professional Services Outlook Robot Smart Technology Money Humor Saving Time Word IT Management VPN iPhone Meetings Sports Managed IT Service Mouse Vulnerabilities Downloads Computer Repair Licensing Administration Supply Chain Safety Images 101 Entertainment Websites Legal Organization IT solutions Workplace Trends Smart Devices Customer Resource management Regulations Google Calendar Digital Security Cameras Business Growth Hiring/Firing Electronic Medical Records Remote Working Paperless Data Analysis SharePoint Memory Star Wars Microsoft Excel Google Play Staff Co-managed IT Data Breach Cortana Gamification Technology Care Electronic Health Records Lenovo Social Networking Legislation Writing Application Videos Alt Codes Virtual Reality Downtime Business Communications Fileless Malware Wasting Time Content Server Management Security Cameras Wearable Technology Private Cloud IBM Hosted Solution Scams Trend Micro Hybrid Work Software as a Service Health IT Superfish Motherboard Identity Theft Comparison Typing Permissions Twitter Human Resources Directions Managing Costs Assessment SSID Error Google Drive Cables eCommerce Knowledge Surveillance Virtual Assistant Specifications Social Engineering Fraud Remote Computing Competition Google Apps Microchip Virtual Machine 5G Internet Exlporer Experience Username Medical IT Google Docs Reviews Unified Communications IT Maintenance Bitcoin Business Intelligence Development Running Cable Transportation Tablet Black Friday Alert Google Wallet Shortcuts Hypervisor Database Optimization Managed IT PowerPoint IT Technicians File Sharing Dark Data User Shopping Ransmoware Windows 8 Vendors Laptop Proxy Server Employer/Employee Relationships Cookies Cyber Monday How To Navigation Hotspot Notifications Drones PCI DSS Be Proactive Tactics Mirgation Travel IP Address Gig Economy Workforce Threats Internet Service Provider Halloween Techology Teamwork Nanotechnology Google Maps Evernote Language Regulations Compliance Workplace Strategies Addiction Memes Management Chatbots Unified Threat Management Recovery Meta Hard Drives Hacks Amazon Net Neutrality Scary Stories Unified Threat Management SQL Server Screen Reader Distributed Denial of Service Computing Infrastructure Domains Financial Data History Fun Service Level Agreement IT Identity Network Congestion Smartwatch Deep Learning Outsource IT Refrigeration Environment Procurement Media Bookmark User Error Azure Smart Tech Tech Alerts Public Speaking Telework Education Cyber security Download Communitications Point of Sale Lithium-ion battery CES Small Businesses Mobile Computing Displays Entrepreneur Supply Chain Management Browsers Connectivity Break Fix Network Management Term Tech Support FinTech Search Upload IT Assessment Social Network Multi-Factor Security Monitors Best Practice Outsourcing Undo Flexibility Buisness Value IoT Dark Web

Blog Archive