Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Avoid Facetime Spying

Tip of the Week: Avoid Facetime Spying

Sometimes threats come to light only after they’ve been around for long enough to cause concern for the public. This was the case with a new bug found in Apple’s FaceTime app that allowed users to spy on others without their consent through group FaceTime calls. Thankfully, a patch has been issued that resolves it, but perhaps the way that it was implemented is the most interesting of all.

The most dangerous part about this threat was definitely how accessible it was to just about anyone who wanted to use it. In fact, it was so accessible that Apple had to disable the feature entirely until it was resolved, inconveniencing users at the cost of security.

Following the release of the update to iOS 12.1.4, Apple turned the feature back on, but until the user applies the patch, group FaceTime will simply be inaccessible. This is one way to handle the potentially disastrous scenario, as instead of giving users the option to continue using the service and putting themselves (and their privacy) on the line, Apple is leaving no room for error or controversy, instead opting to protect themselves and their users until they update their devices.

How to Upgrade Your Device
If you own an iOS device, you can run the update by following this path: Settings > General > Software Update. Keep in mind that you’ll want your device to be charged, and you will need a wireless connection as well. Automatic downloads can also be turned on through this process, meaning that you don’t have to initiate the update yourself.

This just goes to show how we all need to be mindful of what our devices are capable of, and how easy it can be to put our privacy at risk when we aren’t mindful of it.

In general, it’s important to remember that software updates are designed to be implemented as soon as possible, as they often address vulnerabilities or issues with security and performance. If you’re having trouble keeping your devices up to date, reach out to Voyage Technology at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 16 December 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Backup Productivity Passwords Quick Tips Cybersecurity Saving Money Communication Managed Service Data Backup Smartphone Android Upgrade Disaster Recovery Business Management VoIP Data Recovery Smartphones AI Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Remote Internet of Things Information Artificial Intelligence Automation Facebook Miscellaneous Cloud Computing Holiday Training Gadgets Covid-19 Remote Work Server Managed Service Provider Outsourced IT Compliance Employee/Employer Relationship IT Support Encryption Spam Office Windows 10 Data Management Business Continuity Government Business Technology Windows 10 Bandwidth Virtualization Blockchain Wi-Fi Vendor Two-factor Authentication Mobile Office Apps Data Security BYOD Mobile Device Management Chrome Gmail Budget Tip of the week Managed Services Voice over Internet Protocol Apple Networking App Employer-Employee Relationship HIPAA Information Technology Avoiding Downtime Applications Marketing Office 365 Access Control Conferencing WiFi How To BDR Computing Hacker Risk Management Router Website Virtual Private Network 2FA Analytics Office Tips Health Augmented Reality Help Desk Storage Password Healthcare Bring Your Own Device Retail Big Data Managed IT Services Operating System Computers Vendor Management Physical Security Display Printer Windows 11 Paperless Office Infrastructure Monitoring Firewall Excel Document Management Remote Workers The Internet of Things Telephone Scam Social Data loss Free Resource Project Management Windows 7 Going Green Cooperation Microsoft 365 Customer Service Patch Management Cybercrime Save Money Solutions Remote Monitoring Vulnerability End of Support Cryptocurrency Employees Integration Wireless Technology IT Management VPN Meetings Virtual Desktop User Tip LiFi Modem Data storage Holidays Processor Computer Repair Mobile Security Word Data Storage Outlook Supply Chain Video Conferencing Money Smart Technology Managed Services Provider Humor Virtual Machines Professional Services Machine Learning Saving Time Safety Sports Mouse Managed IT Service iPhone Maintenance Administration Downloads Antivirus Vulnerabilities Licensing Data Privacy Entertainment Images 101 Customer Relationship Management Multi-Factor Authentication Mobility Settings Wireless Printing Content Filtering Robot Telephone System Hacking Cost Management Presentation YouTube Trend Micro Unified Threat Management Directions Security Cameras Workplace Strategies Assessment Permissions 5G Software as a Service Meta Unified Communications Experience Network Congestion Specifications Managing Costs Amazon IP Address Google Docs eCommerce User Error Microchip SSID Bitcoin Internet Exlporer Running Cable Fraud Surveillance Virtual Assistant Outsource IT Google Wallet Username Media Recovery Point of Sale Black Friday Virtual Machine Environment Medical IT Hard Drives Windows 8 Database Laptop Reviews Tech Support IT Technicians Development Transportation Small Businesses Domains Drones Network Management Proxy Server Cookies Monitors Cyber Monday Hypervisor Displays Optimization PowerPoint Refrigeration Tactics Halloween Hotspot Shopping Websites Mirgation Employer/Employee Relationships Outsourcing Public Speaking Navigation Nanotechnology PCI DSS Lithium-ion battery SharePoint Workplace Hacks Addiction Entrepreneur Scary Stories Electronic Medical Records Language Gig Economy Chatbots Fun Internet Service Provider Teamwork Hiring/Firing Management Lenovo Evernote Paperless Deep Learning Screen Reader Writing Distributed Denial of Service Regulations Compliance Memes Co-managed IT Undo Service Level Agreement Virtual Reality Computing Infrastructure Private Cloud Identity Net Neutrality SQL Server Technology Care Server Management Education Superfish Bookmark Business Communications Identity Theft Smart Tech Financial Data History IT Scams Mobile Computing Download Twitter Alerts Smartwatch Error Search Procurement Azure Hybrid Work Browsers Tech Human Resources Application Best Practice Connectivity Social Engineering Break Fix Telework Cyber security Communitications Cables Upload Buisness Remote Computing CES IT solutions Multi-Factor Security Supply Chain Management IBM Legal Social Network Term Google Apps Business Growth Tablet IoT Dark Web FinTech IT Assessment IT Maintenance Trends Alert File Sharing Regulations Cortana Dark Data Google Calendar Flexibility Value Business Intelligence Managed IT Customer Resource management Data Analysis Shortcuts Alt Codes Star Wars How To Microsoft Excel Organization Digital Security Cameras Smart Devices Ransmoware Competition Gamification Downtime Notifications Staff Hosted Solution Travel Social Networking Legislation Remote Working Memory Vendors Data Breach Techology Fileless Malware Google Play Be Proactive Typing Google Maps Videos Electronic Health Records Workforce Content Wearable Technology Health IT User Unified Threat Management Motherboard Knowledge Comparison Wasting Time Threats Google Drive

Blog Archive