Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Avoid Facetime Spying

Tip of the Week: Avoid Facetime Spying

Sometimes threats come to light only after they’ve been around for long enough to cause concern for the public. This was the case with a new bug found in Apple’s FaceTime app that allowed users to spy on others without their consent through group FaceTime calls. Thankfully, a patch has been issued that resolves it, but perhaps the way that it was implemented is the most interesting of all.

The most dangerous part about this threat was definitely how accessible it was to just about anyone who wanted to use it. In fact, it was so accessible that Apple had to disable the feature entirely until it was resolved, inconveniencing users at the cost of security.

Following the release of the update to iOS 12.1.4, Apple turned the feature back on, but until the user applies the patch, group FaceTime will simply be inaccessible. This is one way to handle the potentially disastrous scenario, as instead of giving users the option to continue using the service and putting themselves (and their privacy) on the line, Apple is leaving no room for error or controversy, instead opting to protect themselves and their users until they update their devices.

How to Upgrade Your Device
If you own an iOS device, you can run the update by following this path: Settings > General > Software Update. Keep in mind that you’ll want your device to be charged, and you will need a wireless connection as well. Automatic downloads can also be turned on through this process, meaning that you don’t have to initiate the update yourself.

This just goes to show how we all need to be mindful of what our devices are capable of, and how easy it can be to put our privacy at risk when we aren’t mindful of it.

In general, it’s important to remember that software updates are designed to be implemented as soon as possible, as they often address vulnerabilities or issues with security and performance. If you’re having trouble keeping your devices up to date, reach out to Voyage Technology at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 21 April 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet IT Services Malware IT Support Phishing Privacy Email Workplace Tips Google Computer Workplace Strategy Collaboration Small Business Hosted Solutions Backup Users Ransomware Mobile Device Managed Service Productivity Microsoft Passwords Saving Money Quick Tips AI Communication Cybersecurity Smartphone Data Backup Disaster Recovery Data Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Current Events Network Tech Term Internet of Things Remote Information Miscellaneous Holiday Facebook Automation Artificial Intelligence Compliance Cloud Computing Training Covid-19 Gadgets Outsourced IT Server Managed Service Provider Remote Work IT Support Encryption Employee/Employer Relationship Spam Office Windows 10 Business Continuity Government Data Management Wi-Fi Windows 10 Blockchain Virtualization Business Technology Bandwidth Managed Services Data Security Mobile Office Two-factor Authentication Vendor Apps Apple Networking Voice over Internet Protocol App Mobile Device Management BYOD Gmail WiFi Tip of the week Chrome Employer-Employee Relationship Budget Password Hacker Managed IT Services How To Conferencing BDR Avoiding Downtime Marketing Computing Physical Security Information Technology Access Control HIPAA Office 365 Applications 2FA Storage Help Desk Bring Your Own Device Computers Healthcare Website Operating System Virtual Private Network Risk Management Health Router Big Data Analytics Office Tips Augmented Reality Retail Monitoring Scam Customer Service Excel Data loss Remote Workers Managed IT Service Telephone Going Green Patch Management Save Money Remote Monitoring Vulnerability End of Support Vendor Management Cooperation Free Resource Cybercrime Project Management Firewall Windows 7 Display Microsoft 365 Printer Paperless Office The Internet of Things Solutions Infrastructure Social Document Management Windows 11 Maintenance Data Storage Sports Smart Technology Supply Chain Antivirus Mouse Video Conferencing Managed Services Provider Hacking Saving Time Presentation Virtual Machines Professional Services Administration Wireless Technology Downloads Robot iPhone Licensing Settings Printing Entertainment Wireless Word Vulnerabilities Content Filtering Data Privacy IT Management VPN Images 101 YouTube Meetings Multi-Factor Authentication Mobility Cryptocurrency Telephone System Cost Management Safety Computer Repair Virtual Desktop Data storage LiFi Employees Integration Outlook Machine Learning Modem User Tip Money Processor Mobile Security Humor Holidays Customer Relationship Management Deep Learning Twitter Mirgation Hypervisor Displays Shopping Error Competition Nanotechnology Optimization PowerPoint Education Addiction Social Engineering Language Employer/Employee Relationships Outsourcing Chatbots Navigation Management PCI DSS Remote Computing Gig Economy Screen Reader Distributed Denial of Service Workplace Mobile Computing Tablet Service Level Agreement Internet Service Provider Search User Computing Infrastructure Teamwork Hiring/Firing Identity Evernote Paperless Best Practice Regulations Compliance Alert Managed IT Bookmark Buisness File Sharing Smart Tech Memes Dark Data Co-managed IT Legal IT solutions IP Address Download Net Neutrality How To Alerts SQL Server Technology Care Notifications History Business Communications Business Growth Financial Data Browsers Smartwatch Travel Connectivity IT Break Fix Scams Techology Google Maps Upload Procurement Cortana Recovery Azure Hybrid Work Hard Drives Cyber security Multi-Factor Security Tech Human Resources Alt Codes Social Network Telework CES Downtime Unified Threat Management Domains IoT Communitications Dark Web Cables Unified Threat Management Hosted Solution Trends Supply Chain Management Refrigeration Regulations Google Calendar Term Google Apps Typing Customer Resource management FinTech Data Analysis Public Speaking Star Wars IT Assessment Network Congestion Microsoft Excel IT Maintenance Google Drive User Error Lithium-ion battery Gamification Flexibility Knowledge Staff Value Business Intelligence Social Networking Entrepreneur Legislation Shortcuts Organization Fileless Malware Digital Security Cameras Point of Sale Smart Devices 5G Ransmoware Google Docs Unified Communications Content Remote Working Experience Wearable Technology Memory Vendors Running Cable Tech Support Undo Motherboard Data Breach Comparison Google Play Be Proactive Bitcoin Network Management Health IT Google Wallet Directions Videos Assessment Electronic Health Records Monitors Permissions Workforce Wasting Time Threats Laptop Websites Trend Micro Specifications Security Cameras Workplace Strategies Windows 8 Drones Microchip Internet Exlporer Software as a Service Fraud Meta SharePoint Username Electronic Medical Records Application Managing Costs Amazon Halloween eCommerce Black Friday SSID Lenovo IBM Database Surveillance Writing Virtual Assistant Outsource IT Media Virtual Reality IT Technicians Virtual Machine Environment Scary Stories Private Cloud Cookies Cyber Monday Medical IT Hacks Server Management Proxy Server Reviews Superfish Identity Theft Tactics Development Fun Hotspot Transportation Small Businesses

Blog Archive