Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Avoid Facetime Spying

Tip of the Week: Avoid Facetime Spying

Sometimes threats come to light only after they’ve been around for long enough to cause concern for the public. This was the case with a new bug found in Apple’s FaceTime app that allowed users to spy on others without their consent through group FaceTime calls. Thankfully, a patch has been issued that resolves it, but perhaps the way that it was implemented is the most interesting of all.

The most dangerous part about this threat was definitely how accessible it was to just about anyone who wanted to use it. In fact, it was so accessible that Apple had to disable the feature entirely until it was resolved, inconveniencing users at the cost of security.

Following the release of the update to iOS 12.1.4, Apple turned the feature back on, but until the user applies the patch, group FaceTime will simply be inaccessible. This is one way to handle the potentially disastrous scenario, as instead of giving users the option to continue using the service and putting themselves (and their privacy) on the line, Apple is leaving no room for error or controversy, instead opting to protect themselves and their users until they update their devices.

How to Upgrade Your Device
If you own an iOS device, you can run the update by following this path: Settings > General > Software Update. Keep in mind that you’ll want your device to be charged, and you will need a wireless connection as well. Automatic downloads can also be turned on through this process, meaning that you don’t have to initiate the update yourself.

This just goes to show how we all need to be mindful of what our devices are capable of, and how easy it can be to put our privacy at risk when we aren’t mindful of it.

In general, it’s important to remember that software updates are designed to be implemented as soon as possible, as they often address vulnerabilities or issues with security and performance. If you’re having trouble keeping your devices up to date, reach out to Voyage Technology at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 16 January 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Backup Productivity Small Business Quick Tips Managed Service Passwords Saving Money Cybersecurity Communication Data Backup Smartphone Android Upgrade Disaster Recovery Data Recovery AI VoIP Business Management Smartphones Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Information Holiday Automation Artificial Intelligence Facebook Miscellaneous Cloud Computing Covid-19 Training Gadgets Remote Work Server Managed Service Provider Compliance IT Support Outsourced IT Spam Employee/Employer Relationship Encryption Office Windows 10 Business Continuity Data Management Government Wi-Fi Business Technology Bandwidth Windows 10 Virtualization Blockchain Apps Vendor Two-factor Authentication Mobile Office Data Security Employer-Employee Relationship BYOD Tip of the week Chrome Mobile Device Management Managed Services Voice over Internet Protocol Budget Gmail Apple Networking WiFi App HIPAA Computing Applications Information Technology Hacker Access Control Avoiding Downtime Office 365 Marketing Conferencing How To BDR Operating System Router Virtual Private Network Risk Management Computers Health Help Desk Analytics Website 2FA Office Tips Augmented Reality Retail Storage Password Healthcare Bring Your Own Device Managed IT Services Big Data Vendor Management Solutions Cybercrime Physical Security Customer Service Display Printer Paperless Office Infrastructure Monitoring Windows 11 Document Management Excel Remote Workers Firewall Telephone Scam Data loss The Internet of Things Cooperation Free Resource Project Management Windows 7 Going Green Patch Management Social Save Money Microsoft 365 Remote Monitoring Vulnerability End of Support Content Filtering IT Management Customer Relationship Management VPN Employees YouTube Meetings Integration Cryptocurrency User Tip Modem Hacking Presentation Computer Repair Mobile Security Processor Virtual Desktop Holidays LiFi Wireless Technology Data storage Data Storage Smart Technology Video Conferencing Outlook Supply Chain Machine Learning Managed Services Provider Professional Services Money Saving Time Virtual Machines Word Humor Managed IT Service Maintenance Antivirus Sports Downloads iPhone Mouse Licensing Safety Vulnerabilities Entertainment Administration Images 101 Data Privacy Telephone System Multi-Factor Authentication Robot Mobility Cost Management Settings Printing Wireless Permissions Unified Threat Management Directions Videos Vendors Hosted Solution Assessment Electronic Health Records Typing Be Proactive Wasting Time Workforce Trend Micro Network Congestion Specifications Security Cameras Competition Knowledge Fraud Google Drive User Error Microchip Threats Internet Exlporer Software as a Service Username Workplace Strategies Managing Costs Meta Point of Sale eCommerce 5G Black Friday SSID Experience Virtual Assistant Google Docs Amazon Unified Communications Database Surveillance Bitcoin Network Management Running Cable Tech Support IT Technicians Virtual Machine User Google Wallet Proxy Server Reviews Outsource IT Cookies Monitors Cyber Monday Medical IT Tactics Development Media Hotspot Transportation Environment Windows 8 IP Address Laptop Websites Mirgation Hypervisor PowerPoint Drones Shopping Small Businesses Nanotechnology Optimization Addiction Electronic Medical Records Language Employer/Employee Relationships SharePoint Displays Management PCI DSS Halloween Chatbots Recovery Navigation Writing Distributed Denial of Service Lenovo Gig Economy Outsourcing Screen Reader Hard Drives Service Level Agreement Internet Service Provider Domains Virtual Reality Computing Infrastructure Teamwork Hacks Server Management Regulations Compliance Workplace Scary Stories Private Cloud Identity Evernote Fun Superfish Bookmark Hiring/Firing Identity Theft Smart Tech Memes Refrigeration Deep Learning Download Net Neutrality Public Speaking Paperless Twitter Alerts SQL Server Financial Data Lithium-ion battery Co-managed IT Error History Social Engineering Break Fix Entrepreneur Browsers Smartwatch Technology Care Education Connectivity IT Upload Procurement Business Communications Remote Computing Azure Mobile Computing Social Network Telework Scams Cyber security Multi-Factor Security Tech Search Dark Web CES Hybrid Work Tablet IoT Communitications Undo Best Practice Trends Supply Chain Management Human Resources Alert Managed IT Customer Resource management FinTech Cables Buisness File Sharing Regulations Dark Data Google Calendar Term How To Microsoft Excel Legal Data Analysis IT solutions Star Wars IT Assessment Business Growth Gamification Flexibility Google Apps Notifications Staff Value Organization IT Maintenance Travel Social Networking Application Legislation Cortana Techology Fileless Malware Digital Security Cameras Business Intelligence Google Maps Smart Devices Alt Codes Content Remote Working IBM Shortcuts Wearable Technology Memory Health IT Ransmoware Downtime Unified Threat Management Motherboard Data Breach Comparison Google Play

Blog Archive