Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Avoid Facetime Spying

Tip of the Week: Avoid Facetime Spying

Sometimes threats come to light only after they’ve been around for long enough to cause concern for the public. This was the case with a new bug found in Apple’s FaceTime app that allowed users to spy on others without their consent through group FaceTime calls. Thankfully, a patch has been issued that resolves it, but perhaps the way that it was implemented is the most interesting of all.

The most dangerous part about this threat was definitely how accessible it was to just about anyone who wanted to use it. In fact, it was so accessible that Apple had to disable the feature entirely until it was resolved, inconveniencing users at the cost of security.

Following the release of the update to iOS 12.1.4, Apple turned the feature back on, but until the user applies the patch, group FaceTime will simply be inaccessible. This is one way to handle the potentially disastrous scenario, as instead of giving users the option to continue using the service and putting themselves (and their privacy) on the line, Apple is leaving no room for error or controversy, instead opting to protect themselves and their users until they update their devices.

How to Upgrade Your Device
If you own an iOS device, you can run the update by following this path: Settings > General > Software Update. Keep in mind that you’ll want your device to be charged, and you will need a wireless connection as well. Automatic downloads can also be turned on through this process, meaning that you don’t have to initiate the update yourself.

This just goes to show how we all need to be mindful of what our devices are capable of, and how easy it can be to put our privacy at risk when we aren’t mindful of it.

In general, it’s important to remember that software updates are designed to be implemented as soon as possible, as they often address vulnerabilities or issues with security and performance. If you’re having trouble keeping your devices up to date, reach out to Voyage Technology at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 23 May 2019

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Best Practices Hackers Business Computing Cloud Email Privacy Hosted Solutions Computer Malware Innovation Internet User Tips Tech Term Data Network Security Efficiency Software Business Hardware Android Mobile Devices IT Services Communication Data Backup Productivity Smartphone Business Management Small Business Social Media Microsoft Google Browser Facebook Workplace Tips Smartphones IT Support Productivity Artificial Intelligence Data Recovery Windows 10 Data Management Collaboration Ransomware Server Microsoft Office Internet of Things Backup App Cloud Computing Automation communications Cybersecurity Two-factor Authentication Phishing Managed Service Provider Upgrade Gmail Encryption Windows 10 Office 365 Mobile Device VoIP Saving Money Network Information Applications Miscellaneous Business Technology Managed Service Apps Spam Windows Office Tips Managed IT Services Passwords Bandwidth Outsourced IT Disaster Recovery BDR Going Green The Internet of Things Printer WiFi Big Data Access Control Social Computing Employer-Employee Relationship Infrastructure Users Tip of the week Government Paperless Office Customer Service BYOD Analytics Scam IT Support Augmented Reality Holiday Website Business Continuity Cooperation Mobile Device Management Apple Vulnerability Firewall Blockchain IT Management Safety HIPAA Vendor Router Settings Quick Tips Printing Content Filtering Modem Cybercrime Wi-Fi Mobile Security Risk Management Retail Downloads Data storage LiFi Saving Time Healthcare Hacking Presentation Computers Hacker Money Chrome Antivirus Office Document Management Wireless Technology Networking Maintenance Robot Storage Data Security Sports Mouse End of Support Bring Your Own Device Administration Cost Management Health IT Motherboard Display Business Growth User Error Cyber Monday Directions Assessment Virtual Reality Permissions Windows 7 SSID Virtual Private Network Cortana Error Undo Google Maps Monitors Alt Codes Smart Technology Downtime Microchip Wireless Internet Exlporer Twitter Fraud Microsoft 365 Operating System Hosted Solution Medical IT Username Virtualization User Tip Typing Distributed Denial of Service YouTube Processor Network Management Database Remote Computing Application Solutions IT Technicians Google Drive Knowledge Travel Proxy Server IBM Cookies Writing Gadgets Cryptocurrency SharePoint Information Technology Navigation 5G Tactics Alert Hotspot Integration Mirgation Google Docs Unified Communications Lenovo Experience Monitoring Unified Threat Management Running Cable Help Desk Customer Relationship Management Nanotechnology Bitcoin Google Wallet Virtual Desktop Evernote Addiction Language Virtual Assistant Chatbots Superfish Management Competition Multi-Factor Security Laptop Screen Reader Social Engineering Windows 8 Transportation Drones Server Management Service Level Agreement Computing Infrastructure Identity Outlook Conferencing Google Calendar Halloween Bookmark Managed IT Services Smart Tech User Managed IT Service PowerPoint Tech Download Alerts Dark Data Humor Telephone Legislation Scary Stories Browsers IP Address Connectivity How To Avoiding Downtime Break Fix Professional Services Hacks Budget Term Fun Upload Tech Support Licensing Identity Theft Compliance Deep Learning Social Network Comparison Entertainment Data loss Mobile Office IoT Save Money Recovery Dark Web Marketing Voice over Internet Protocol Password Education Mobility Patch Management Trends Websites Hard Drives Customer Resource management Domains Regulations Word Techology Specifications Data Analysis Star Wars Vendor Management Microsoft Excel iPhone Mobile Computing Staff Google Play Search Gamification Machine Learning Refrigeration Telephone System Tablet Public Speaking Social Networking Network Congestion Best Practice Unified Threat Management Black Friday Buisness Fileless Malware Remote Monitoring Lithium-ion battery Electronic Medical Records Vulnerabilities Current Events Wearable Technology Entrepreneur Legal IT solutions Security Cameras VPN Content Private Cloud

Sign Up For Our Newsletter!