Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Avoid Facetime Spying

Tip of the Week: Avoid Facetime Spying

Sometimes threats come to light only after they’ve been around for long enough to cause concern for the public. This was the case with a new bug found in Apple’s FaceTime app that allowed users to spy on others without their consent through group FaceTime calls. Thankfully, a patch has been issued that resolves it, but perhaps the way that it was implemented is the most interesting of all.

The most dangerous part about this threat was definitely how accessible it was to just about anyone who wanted to use it. In fact, it was so accessible that Apple had to disable the feature entirely until it was resolved, inconveniencing users at the cost of security.

Following the release of the update to iOS 12.1.4, Apple turned the feature back on, but until the user applies the patch, group FaceTime will simply be inaccessible. This is one way to handle the potentially disastrous scenario, as instead of giving users the option to continue using the service and putting themselves (and their privacy) on the line, Apple is leaving no room for error or controversy, instead opting to protect themselves and their users until they update their devices.

How to Upgrade Your Device
If you own an iOS device, you can run the update by following this path: Settings > General > Software Update. Keep in mind that you’ll want your device to be charged, and you will need a wireless connection as well. Automatic downloads can also be turned on through this process, meaning that you don’t have to initiate the update yourself.

This just goes to show how we all need to be mindful of what our devices are capable of, and how easy it can be to put our privacy at risk when we aren’t mindful of it.

In general, it’s important to remember that software updates are designed to be implemented as soon as possible, as they often address vulnerabilities or issues with security and performance. If you’re having trouble keeping your devices up to date, reach out to Voyage Technology at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 17 May 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Hackers Cloud Efficiency Hardware Network Security User Tips Internet IT Services Malware Phishing IT Support Privacy Google Email Workplace Tips Computer Workplace Strategy Backup Collaboration Small Business Hosted Solutions Managed Service Ransomware AI Users Mobile Device Productivity Microsoft Saving Money Quick Tips Passwords Communication Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Current Events Network Tech Term Internet of Things Remote Miscellaneous Information Holiday Automation Artificial Intelligence Facebook Training Outsourced IT Compliance Covid-19 Gadgets Cloud Computing Server IT Support Managed Service Provider Remote Work Encryption Employee/Employer Relationship Spam Office Windows 10 Business Continuity Data Management Government Wi-Fi Vendor Business Technology Bandwidth Windows 10 Virtualization Blockchain Managed Services Two-factor Authentication Mobile Office Data Security Apps Voice over Internet Protocol Tip of the week Chrome Mobile Device Management Budget Gmail Apple Networking WiFi App Employer-Employee Relationship BYOD Computing Physical Security Applications Information Technology Hacker Access Control Avoiding Downtime Office 365 Marketing Conferencing Password Managed IT Services How To BDR HIPAA Router Risk Management Virtual Private Network Computers Healthcare Health Help Desk Analytics Website Office Tips Augmented Reality Retail Storage Bring Your Own Device Big Data Operating System 2FA Excel Customer Service Display Printer Remote Workers Paperless Office Infrastructure Monitoring Free Resource Document Management Project Management Windows 7 Managed IT Service Firewall Telephone Microsoft 365 Scam Data loss Solutions The Internet of Things Cooperation Social Going Green Patch Management Save Money Remote Monitoring Windows 11 End of Support Vulnerability Vendor Management Cybercrime YouTube Meetings Video Conferencing VPN Managed Services Provider Virtual Machines Cryptocurrency Professional Services Modem Hacking User Tip Processor Presentation Computer Repair Mobile Security Virtual Desktop Data storage LiFi Wireless Technology iPhone Smart Technology Outlook Vulnerabilities Machine Learning Data Privacy Money Saving Time Humor Word Images 101 Multi-Factor Authentication Maintenance Mobility Sports Downloads Antivirus Mouse Licensing Safety Entertainment Administration Employees Integration Robot Telephone System Cost Management Holidays Settings Wireless Printing Data Storage Content Filtering IT Management Customer Relationship Management Supply Chain Employer/Employee Relationships Outsourcing Network Congestion Specifications PCI DSS Google Drive User Error Microchip Internet Exlporer Competition Navigation Knowledge Fraud Gig Economy Username Workplace Teamwork Hiring/Firing Point of Sale 5G Black Friday Internet Service Provider Regulations Compliance Google Docs Unified Communications Database Evernote Paperless Experience Memes Bitcoin Network Management Co-managed IT Running Cable Tech Support IT Technicians User SQL Server Technology Care Cookies Monitors Cyber Monday Net Neutrality Google Wallet Proxy Server Financial Data History Tactics Business Communications Hotspot Smartwatch IT Windows 8 IP Address Scams Laptop Websites Mirgation Azure Hybrid Work Nanotechnology Procurement Drones Telework SharePoint Cyber security Addiction Tech Human Resources Electronic Medical Records Language Recovery CES Communitications Management Cables Halloween Chatbots Screen Reader Hard Drives Writing Distributed Denial of Service Supply Chain Management Lenovo FinTech Service Level Agreement Domains Term Google Apps Virtual Reality Computing Infrastructure IT Assessment Hacks Server Management IT Maintenance Scary Stories Private Cloud Identity Superfish Bookmark Value Business Intelligence Identity Theft Smart Tech Refrigeration Fun Flexibility Organization Deep Learning Download Public Speaking Shortcuts Twitter Alerts Error Digital Security Cameras Smart Devices Lithium-ion battery Ransmoware Browsers Memory Vendors Education Connectivity Social Engineering Break Fix Entrepreneur Remote Working Data Breach Upload Google Play Be Proactive Remote Computing Multi-Factor Security Videos Electronic Health Records Mobile Computing Social Network Workforce Wasting Time Threats Tablet IoT Undo Search Dark Web Trend Micro Best Practice Trends Security Cameras Workplace Strategies Alert Buisness File Sharing Regulations Dark Data Google Calendar Software as a Service Managed IT Customer Resource management Meta Legal Data Analysis Managing Costs Amazon IT solutions Star Wars How To Microsoft Excel eCommerce Business Growth Gamification SSID Notifications Staff Travel Social Networking Application Legislation Surveillance Virtual Assistant Outsource IT Techology Fileless Malware Virtual Machine Environment Google Maps Media Cortana Reviews Alt Codes Content IBM Medical IT Wearable Technology Downtime Unified Threat Management Motherboard Comparison Development Health IT Transportation Small Businesses Unified Threat Management Directions Hypervisor Displays Hosted Solution Assessment Permissions Shopping Optimization Typing PowerPoint

Blog Archive