Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Avoid Facetime Spying

Tip of the Week: Avoid Facetime Spying

Sometimes threats come to light only after they’ve been around for long enough to cause concern for the public. This was the case with a new bug found in Apple’s FaceTime app that allowed users to spy on others without their consent through group FaceTime calls. Thankfully, a patch has been issued that resolves it, but perhaps the way that it was implemented is the most interesting of all.

The most dangerous part about this threat was definitely how accessible it was to just about anyone who wanted to use it. In fact, it was so accessible that Apple had to disable the feature entirely until it was resolved, inconveniencing users at the cost of security.

Following the release of the update to iOS 12.1.4, Apple turned the feature back on, but until the user applies the patch, group FaceTime will simply be inaccessible. This is one way to handle the potentially disastrous scenario, as instead of giving users the option to continue using the service and putting themselves (and their privacy) on the line, Apple is leaving no room for error or controversy, instead opting to protect themselves and their users until they update their devices.

How to Upgrade Your Device
If you own an iOS device, you can run the update by following this path: Settings > General > Software Update. Keep in mind that you’ll want your device to be charged, and you will need a wireless connection as well. Automatic downloads can also be turned on through this process, meaning that you don’t have to initiate the update yourself.

This just goes to show how we all need to be mindful of what our devices are capable of, and how easy it can be to put our privacy at risk when we aren’t mindful of it.

In general, it’s important to remember that software updates are designed to be implemented as soon as possible, as they often address vulnerabilities or issues with security and performance. If you’re having trouble keeping your devices up to date, reach out to Voyage Technology at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 24 March 2019

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Hackers Cloud Email Business Computing Privacy Malware Tech Term Internet Computer Hosted Solutions Network Security Innovation Business Data IT Services Mobile Devices User Tips Efficiency Software Data Backup Google Hardware Communication Productivity Android Microsoft Smartphone Browser Business Management Small Business Windows 10 Workplace Tips Smartphones Productivity Collaboration Artificial Intelligence Ransomware Data Management IT Support Internet of Things Facebook Data Recovery Social Media Server Microsoft Office Managed Service Provider Cybersecurity Backup Gmail App communications Two-factor Authentication Office 365 Cloud Computing Automation Windows 10 Saving Money VoIP Encryption Managed Service Passwords Windows Office Tips Upgrade Business Technology Bandwidth Disaster Recovery Miscellaneous Managed IT Services Spam Outsourced IT Mobile Device Information Phishing Applications Printer Website Access Control IT Support Augmented Reality Mobile Device Management Firewall Business Continuity Infrastructure Tip of the week Paperless Office Government The Internet of Things WiFi Scam Apple Cooperation BYOD Big Data Social Going Green Holiday Blockchain Apps Employer-Employee Relationship Users Vulnerability Computing BDR IT Management Mobile Security Wireless Technology LiFi Data storage Quick Tips Analytics Money Chrome Saving Time Healthcare Storage Sports Mouse Safety Bring Your Own Device Retail Administration Antivirus Document Management Maintenance Data Security Network Settings Cost Management Printing Robot Content Filtering Cybercrime HIPAA Customer Service Wi-Fi End of Support Hacking Vendor Router Presentation Computers Hacker Risk Management Office Modem Bitcoin Electronic Medical Records Running Cable Processor Cyber Monday Database Virtual Private Network IT Technicians Google Wallet Error IP Address Virtual Desktop PowerPoint Avoiding Downtime Windows 7 Display Proxy Server Cookies Google Maps Hotspot Windows 8 Virtual Reality Laptop Navigation Smart Technology Tactics Monitoring Marketing Mirgation Drones Mobile Office Recovery Microsoft 365 Monitors Hard Drives Help Desk Nanotechnology Outlook Network Management Language Twitter Domains Halloween Evernote Word Distributed Denial of Service Addiction Management Chatbots Travel Solutions Refrigeration SharePoint Screen Reader Humor Computing Infrastructure Hacks Remote Computing Public Speaking Scary Stories Managed IT Service Service Level Agreement Fun Conferencing Lenovo Identity Budget Unified Threat Management Lithium-ion battery Deep Learning Integration Writing Bookmark Entrepreneur Downloads Smart Tech Download Alerts Password Alert Tech Telephone Superfish Education Break Fix Undo Browsers Multi-Factor Security Connectivity Upload Server Management Licensing Mobile Computing Term Search Social Network Compliance Managed IT Services Dark Web Best Practice Social Engineering Virtualization Entertainment Google Calendar IoT Trends Current Events Buisness Mobility Application Customer Resource management Networking Regulations Legal IT solutions Microsoft Excel Business Growth Data Analysis Legislation Star Wars Gamification Gadgets Staff IBM Google Play Dark Data Cortana Telephone System Social Networking Identity Theft Professional Services Data loss Alt Codes How To Fileless Malware Comparison Content Patch Management Wearable Technology Tech Support Customer Relationship Management Downtime Security Cameras Wireless Health IT Techology Motherboard Operating System Hosted Solution Voice over Internet Protocol Permissions Typing Save Money Competition Directions Specifications Assessment Websites YouTube SSID Knowledge Unified Threat Management Google Drive Tablet iPhone Remote Monitoring Fraud Cryptocurrency Vendor Management Microchip Black Friday Internet Exlporer Username VPN Information Technology Machine Learning Medical IT User 5G Network Congestion Experience User Tip User Error Google Docs Unified Communications Vulnerabilities

Sign Up For Our Newsletter!