Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Avoid Facetime Spying

Tip of the Week: Avoid Facetime Spying

Sometimes threats come to light only after they’ve been around for long enough to cause concern for the public. This was the case with a new bug found in Apple’s FaceTime app that allowed users to spy on others without their consent through group FaceTime calls. Thankfully, a patch has been issued that resolves it, but perhaps the way that it was implemented is the most interesting of all.

The most dangerous part about this threat was definitely how accessible it was to just about anyone who wanted to use it. In fact, it was so accessible that Apple had to disable the feature entirely until it was resolved, inconveniencing users at the cost of security.

Following the release of the update to iOS 12.1.4, Apple turned the feature back on, but until the user applies the patch, group FaceTime will simply be inaccessible. This is one way to handle the potentially disastrous scenario, as instead of giving users the option to continue using the service and putting themselves (and their privacy) on the line, Apple is leaving no room for error or controversy, instead opting to protect themselves and their users until they update their devices.

How to Upgrade Your Device
If you own an iOS device, you can run the update by following this path: Settings > General > Software Update. Keep in mind that you’ll want your device to be charged, and you will need a wireless connection as well. Automatic downloads can also be turned on through this process, meaning that you don’t have to initiate the update yourself.

This just goes to show how we all need to be mindful of what our devices are capable of, and how easy it can be to put our privacy at risk when we aren’t mindful of it.

In general, it’s important to remember that software updates are designed to be implemented as soon as possible, as they often address vulnerabilities or issues with security and performance. If you’re having trouble keeping your devices up to date, reach out to Voyage Technology at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 19 March 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Privacy Workplace Tips Phishing Google Email Computer Workplace Strategy Collaboration Hosted Solutions Backup Small Business Users Ransomware Managed Service Mobile Device Productivity Microsoft Passwords Quick Tips Saving Money Communication AI Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones communications Mobile Devices Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Information Holiday Artificial Intelligence Automation Facebook Miscellaneous Cloud Computing Covid-19 Training Gadgets Compliance Server Remote Work Managed Service Provider Outsourced IT IT Support Employee/Employer Relationship Encryption Spam Office Windows 10 Government Business Continuity Data Management Blockchain Bandwidth Business Technology Windows 10 Virtualization Wi-Fi Two-factor Authentication Vendor Mobile Office Apps Data Security BYOD Chrome Budget Mobile Device Management Tip of the week Gmail Apple Managed Services WiFi Voice over Internet Protocol App Networking Employer-Employee Relationship Hacker Physical Security Office 365 HIPAA Avoiding Downtime Applications Marketing Access Control Conferencing How To BDR Computing Information Technology Computers Router Analytics Office Tips Virtual Private Network Website Augmented Reality Health Storage Password 2FA Help Desk Bring Your Own Device Retail Healthcare Big Data Managed IT Services Operating System Risk Management Remote Monitoring Customer Service Vulnerability Microsoft 365 End of Support Vendor Management Solutions Display Printer Paperless Office Infrastructure Windows 11 Firewall Monitoring Document Management Excel The Internet of Things Remote Workers Managed IT Service Scam Going Green Data loss Telephone Social Cybercrime Cooperation Free Resource Project Management Patch Management Windows 7 Save Money Multi-Factor Authentication Mobility Telephone System Hacking Cost Management Virtual Desktop Presentation IT Management Data storage LiFi VPN Meetings Wireless Technology Employees Outlook Integration Money Computer Repair User Tip Modem Humor Processor Mobile Security Word Holidays Sports Mouse Data Storage Machine Learning Smart Technology Supply Chain Video Conferencing Managed Services Provider Administration Saving Time Virtual Machines Professional Services Safety Maintenance Antivirus Downloads iPhone Settings Wireless Licensing Printing Content Filtering Entertainment Vulnerabilities YouTube Data Privacy Customer Relationship Management Images 101 Cryptocurrency Robot Social Networking Google Docs Legislation Shortcuts Unified Communications Experience Organization Fileless Malware Digital Security Cameras Smart Devices Unified Threat Management Ransmoware Bitcoin Running Cable Google Wallet Unified Threat Management Content Remote Working Wearable Technology Memory Vendors Motherboard Data Breach Comparison Google Play Be Proactive User Health IT Laptop Directions Videos Assessment Electronic Health Records Permissions Workforce Windows 8 Network Congestion Drones User Error Wasting Time Threats Trend Micro Specifications Security Cameras Workplace Strategies IP Address Halloween Microchip Internet Exlporer Software as a Service Point of Sale Fraud Meta Managing Costs Amazon Username Network Management eCommerce Tech Support Black Friday SSID Recovery Scary Stories Hard Drives Database Surveillance Virtual Assistant Outsource IT Hacks Monitors IT Technicians Virtual Machine Environment Media Domains Fun Proxy Server Reviews Cookies Websites Cyber Monday Medical IT Deep Learning Refrigeration Tactics Development Hotspot Transportation Small Businesses Mirgation Hypervisor Displays Electronic Medical Records Education Public Speaking SharePoint Shopping Nanotechnology Optimization PowerPoint Lithium-ion battery Entrepreneur Lenovo Addiction Language Employer/Employee Relationships Outsourcing Mobile Computing Writing Chatbots Virtual Reality Navigation Search Management PCI DSS Gig Economy Server Management Screen Reader Private Cloud Distributed Denial of Service Workplace Best Practice Buisness Undo Superfish Service Level Agreement Internet Service Provider Identity Theft Computing Infrastructure Teamwork Hiring/Firing Identity Legal Twitter Evernote Paperless IT solutions Regulations Compliance Bookmark Smart Tech Memes Error Co-managed IT Business Growth Social Engineering Download Net Neutrality Alerts SQL Server Technology Care History Remote Computing Business Communications Cortana Financial Data Application Browsers Smartwatch Connectivity IT Break Fix Scams Alt Codes Downtime Upload Procurement Tablet Azure Hybrid Work Cyber security Alert Multi-Factor Security Tech Human Resources Hosted Solution IBM Social Network Telework CES Managed IT IoT Communitications File Sharing Dark Web Cables Typing Dark Data How To Trends Supply Chain Management Regulations Google Drive Notifications Google Calendar Term Google Apps Knowledge Customer Resource management FinTech Data Analysis Star Wars IT Assessment Travel Microsoft Excel IT Maintenance Competition 5G Techology Gamification Flexibility Google Maps Staff Value Business Intelligence

Blog Archive