Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Avoid Facetime Spying

Tip of the Week: Avoid Facetime Spying

Sometimes threats come to light only after they’ve been around for long enough to cause concern for the public. This was the case with a new bug found in Apple’s FaceTime app that allowed users to spy on others without their consent through group FaceTime calls. Thankfully, a patch has been issued that resolves it, but perhaps the way that it was implemented is the most interesting of all.

The most dangerous part about this threat was definitely how accessible it was to just about anyone who wanted to use it. In fact, it was so accessible that Apple had to disable the feature entirely until it was resolved, inconveniencing users at the cost of security.

Following the release of the update to iOS 12.1.4, Apple turned the feature back on, but until the user applies the patch, group FaceTime will simply be inaccessible. This is one way to handle the potentially disastrous scenario, as instead of giving users the option to continue using the service and putting themselves (and their privacy) on the line, Apple is leaving no room for error or controversy, instead opting to protect themselves and their users until they update their devices.

How to Upgrade Your Device
If you own an iOS device, you can run the update by following this path: Settings > General > Software Update. Keep in mind that you’ll want your device to be charged, and you will need a wireless connection as well. Automatic downloads can also be turned on through this process, meaning that you don’t have to initiate the update yourself.

This just goes to show how we all need to be mindful of what our devices are capable of, and how easy it can be to put our privacy at risk when we aren’t mindful of it.

In general, it’s important to remember that software updates are designed to be implemented as soon as possible, as they often address vulnerabilities or issues with security and performance. If you’re having trouble keeping your devices up to date, reach out to Voyage Technology at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 11 April 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Workplace Tips Privacy Computer Phishing Google Email Workplace Strategy Hosted Solutions Collaboration Small Business Backup Users Ransomware Managed Service Mobile Device Productivity Microsoft Quick Tips AI Passwords Saving Money Communication Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android VoIP Upgrade Smartphones Business Management Mobile Devices communications Windows Social Media Browser Managed IT Services Microsoft Office Current Events Network Tech Term Remote Internet of Things Information Miscellaneous Holiday Artificial Intelligence Automation Facebook Gadgets Training Covid-19 Compliance Cloud Computing Remote Work Server Outsourced IT Managed Service Provider IT Support Spam Employee/Employer Relationship Encryption Windows 10 Office Business Continuity Data Management Government Business Technology Bandwidth Blockchain Windows 10 Wi-Fi Virtualization Two-factor Authentication Apps Mobile Office Managed Services Vendor Data Security Employer-Employee Relationship Chrome Tip of the week Budget Apple Mobile Device Management Voice over Internet Protocol App Networking Gmail WiFi BYOD Physical Security Conferencing Office 365 Access Control Hacker Password Avoiding Downtime Marketing Managed IT Services HIPAA How To BDR Applications Computing Information Technology 2FA Virtual Private Network Analytics Office Tips Health Augmented Reality Computers Storage Bring Your Own Device Retail Website Router Healthcare Operating System Big Data Help Desk Risk Management Social Windows 11 Microsoft 365 Display Solutions Printer Excel Managed IT Service Paperless Office Infrastructure Telephone Customer Service Document Management Cooperation Scam Data loss Remote Workers Going Green Firewall Patch Management Save Money Cybercrime The Internet of Things Remote Monitoring Free Resource End of Support Vulnerability Project Management Monitoring Windows 7 Vendor Management Mobility VPN Multi-Factor Authentication Meetings Saving Time Virtual Desktop Data storage Supply Chain LiFi Computer Repair Customer Relationship Management Employees Outlook Integration Downloads Money Licensing Humor Hacking Presentation Entertainment Machine Learning Holidays Wireless Technology Sports Data Storage Mouse Data Privacy Video Conferencing Maintenance Telephone System Antivirus Managed Services Provider Cost Management Administration Professional Services Virtual Machines Word iPhone Settings User Tip Printing Modem Wireless Robot Mobile Security Content Filtering Safety Processor Vulnerabilities YouTube Cryptocurrency Images 101 IT Management Smart Technology Network Congestion Language Experience Organization Google Docs Application Addiction Unified Communications Smart Devices Management Bitcoin Chatbots Running Cable Digital Security Cameras User Error Small Businesses Displays Remote Working IBM Google Wallet Memory Screen Reader Distributed Denial of Service Google Play Computing Infrastructure Data Breach Point of Sale Service Level Agreement Outsourcing Electronic Health Records Windows 8 Identity Laptop Videos Network Management Bookmark Drones Wasting Time Tech Support Smart Tech Download Security Cameras Monitors Alerts Workplace Trend Micro Hiring/Firing Software as a Service Competition Halloween Break Fix Browsers Paperless Managing Costs Websites Connectivity Upload SSID Co-managed IT eCommerce SharePoint Technology Care Surveillance Social Network Hacks Virtual Assistant Electronic Medical Records Scary Stories Multi-Factor Security Dark Web Fun Business Communications Virtual Machine User IoT Trends Deep Learning Medical IT Writing Reviews Lenovo Scams Hybrid Work Development Customer Resource management Transportation Virtual Reality Regulations Google Calendar Microsoft Excel IP Address Server Management Data Analysis Human Resources Hypervisor Private Cloud Star Wars Education Identity Theft Gamification PowerPoint Staff Shopping Superfish Cables Optimization Mobile Computing Employer/Employee Relationships Twitter Social Networking Legislation Search PCI DSS Fileless Malware Google Apps Recovery Error Navigation Content Best Practice Social Engineering Wearable Technology Gig Economy IT Maintenance Hard Drives Business Intelligence Internet Service Provider Domains Health IT Teamwork Remote Computing Motherboard Buisness Comparison Permissions Regulations Compliance Directions Legal Shortcuts Assessment IT solutions Evernote Refrigeration Tablet Business Growth Ransmoware Memes Vendors Net Neutrality Public Speaking SQL Server Alert Specifications Dark Data Fraud Cortana Financial Data Lithium-ion battery Managed IT Microchip Be Proactive History File Sharing Internet Exlporer Username Alt Codes Entrepreneur How To Smartwatch Workforce IT Threats Procurement Azure Notifications Downtime Black Friday Telework Workplace Strategies Cyber security Travel Database Hosted Solution Tech Communitications Undo Google Maps Typing IT Technicians CES Techology Meta Amazon Supply Chain Management Proxy Server Cookies Cyber Monday Term Hotspot Knowledge FinTech Google Drive Unified Threat Management Tactics IT Assessment Mirgation Unified Threat Management Outsource IT Environment Flexibility Media Value Nanotechnology 5G

Blog Archive