facebook linkedin twitter

Computerware Blog

Tip of the Week: Avoid Facetime Spying

Tip of the Week: Avoid Facetime Spying

Sometimes threats come to light only after they’ve been around for long enough to cause concern for the public. This was the case with a new bug found in Apple’s FaceTime app that allowed users to spy on others without their consent through group FaceTime calls. Thankfully, a patch has been issued that resolves it, but perhaps the way that it was implemented is the most interesting of all.

The most dangerous part about this threat was definitely how accessible it was to just about anyone who wanted to use it. In fact, it was so accessible that Apple had to disable the feature entirely until it was resolved, inconveniencing users at the cost of security.

Following the release of the update to iOS 12.1.4, Apple turned the feature back on, but until the user applies the patch, group FaceTime will simply be inaccessible. This is one way to handle the potentially disastrous scenario, as instead of giving users the option to continue using the service and putting themselves (and their privacy) on the line, Apple is leaving no room for error or controversy, instead opting to protect themselves and their users until they update their devices.

How to Upgrade Your Device
If you own an iOS device, you can run the update by following this path: Settings > General > Software Update. Keep in mind that you’ll want your device to be charged, and you will need a wireless connection as well. Automatic downloads can also be turned on through this process, meaning that you don’t have to initiate the update yourself.

This just goes to show how we all need to be mindful of what our devices are capable of, and how easy it can be to put our privacy at risk when we aren’t mindful of it.

In general, it’s important to remember that software updates are designed to be implemented as soon as possible, as they often address vulnerabilities or issues with security and performance. If you’re having trouble keeping your devices up to date, reach out to Computerware at (703) 821-8200.

Here Are Some Hacks You Should Be Cognizant Of
SIEM Can Remove Some Big Headaches
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, May 19, 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Computing Software Business Management Hackers Data Microsoft Backup Workplace Tips Hardware Managed Service Provider Productivity Network Security Business Email Hosted Solutions Malware Saving Money IT Services Efficiency Google IT Support User Tips Small Business Computer Innovation Mobile Devices Smartphones Quick Tips Social Media Business Continuity Gadgets Microsoft Office Network VoIP Android Productivity Disaster Recovery Data Backup Collaboration Communication Mobile Office Server Virtualization Data Recovery Smartphone Upgrade Mobile Device Management IT Support communications Miscellaneous Cybersecurity Ransomware Windows 10 Phishing Tech Term Unified Threat Management Windows Facebook Holiday Remote Monitoring Vendor Management Passwords Apps Operating System Automation Mobile Computing Analytics BYOD Managed IT services Remote Computing Users WiFi Mobile Device BDR Apple Outsourced IT Internet of Things The Internet of Things Data Management Marketing Artificial Intelligence Firewall History App Alert Browser Managed IT Services Save Money Encryption Cloud Computing Big data IT Consultant Maintenance Two-factor Authentication Gmail Content Filtering Printer Office Going Green Health Help Desk Windows 10 Bring Your Own Device Spam Bandwidth Antivirus Office 365 Saving Time Lithium-ion Battery Tech Support Business Technology Best Practice Information Technology Virus Cybercrime Cost Management Wireless Technology Hiring/Firing Search Windows 8 Hard Drives Outlook Managed IT Training Budget Computers Customer Service VPN It Management Travel Networking Education Blockchain Recovery IBM Update Employer-Employee Relationship Phone System Hacking Money Healthcare Document Management Access Control Managed Service File Sharing Humor iPhone Intranet Hard Drive Twitter Legal Mobility Website Government Regulations Risk Management Augmented Reality SaaS PowerPoint Information Save Time Password Administration Law Enforcement Compliance Running Cable Proactive IT Data storage Applications Cryptocurrency Social Laptop Wireless Data Security Business Growth Google Maps DDoS Patch Management Excel Social Engineering Data Loss Customer Relationship Management Scam Paperless Office Sports Retail Word Computing Management Data Breach Disaster Business Intelligence Current Events End of Support Cortana Hosted Solution Digital Payment Value Robot Router Downtime Project Management Vulnerabilities Digital Telephony Hacker Websites Securty Machine Learning Comparison Tablet Company Culture Solid State Drive Telephone Systems Computer Repair Fax Server User Avoiding Downtime Flexibility Black Market Social Networking Distribution Programming Specifications Safety Vulnerability Statistics Virtual Desktop Google Docs Network Congestion Bitcoin Cooperation Identity Theft Vendor Windows 7 Pain Points Conferencing Documents Data Protection Experience Monitors Entertainment Cleaning Heating/Cooling Office Tips Streaming Media Politics Storage Virtual Reality Emails Monitoring Automobile YouTube Chromebook Redundancy Unified Communications Settings Net Neutrality Computing Infrastructure Hack Gaming Console Chrome How To eWaste Evernote Private Cloud Download Co-managed IT Virtual Assistant Text Messaging User Error Voice over Internet Protocol Webcam IT service Computer Accessories Processors Start Menu Tech Terms Microchip Taxes Trending Distributed Denial of Service USB Mobile Technology Presentation Software as a Service Lifestyle Bluetooth Mouse Public Cloud Uninterrupted Power Supply Inbound Marketing Leadership Deep Learning Smart Tech Managed IT Service Relocation Tablets Adminstration Pirating Information Best Practives Piracy Work/Life Balance Upload Logistics Banking Botnet Spyware Mobile Payment HTML Point of Contact Bookmark Visible Light Communication Fiber-Optic Memory Database Sync Electricity Printing Notifications CCTV Digital Signature IT consulting Microserver Telephone System Google Play Mobile Security Multi-Factor Security Cost Processor Reliable Computing Software License Trends Microsoft 365 Business Metrics Computer Malfunction Teamwork cache Television CIO Devices Analytic Browsers Get More Done Advertising Fraud Flash Tactics Recycling Medical IT In Internet of Things WannaCry Downloads User Tip Time Management Freedom of Information Upselling Windows XP Turn Key Security Cameras PDF Corporate Profile Staffing Printer Server Google Wallet UTM Content Product Reviews SharePoint Displays Legislation Error Read Navigation Scalability Video Surveillance Trojan Society IT Plan Enterprise Resource Planning Solutions Motion Sickness Best Available Keyboard Assessment Organize Micrsooft Accountants A.I. Data Analysis Messenger Tracking Domains Tip of the week email scam Addiction Professional Services Google Calendar Saving ZTime Rental Service Meetings Public Speaking Touchscreen News Device Management GDPR VoIP Drones Multi-factor Authentication Consultation Harddrive Wireless Headphones Telephone Content Management Tech Cabling Knowledge Debate Migration Connected Devices Business Managemenet Integration Web Server Shortcut Equifax Fleet Tracking Fileless Malware Books Workers Troubleshooting GPS Permissions Language Network Management Wi-Fi Administrator Entrepreneur Technology Tips Proxy Server Supercomputer HIPAA Fake News online Currency Modem Environment Audit External Harddrive Webinar Device security MSP Competition Data Warehousing switches Writing Nanotechnology Social Network Term Worker Electronic Payment Music Desktop Finance Electronic Medical Records Transportation Thin CLient Upgrades Startup Asset Tracking Directions Reading Samsung Business Owner Emergency Hard Drive Disposal 3D Ebay Business Cards Service Level Agreement LinkedIn Recording Access Username Dark Web Employer Employee Relationship IP Address Microsoft Excel LiFi Unified Threat Management Backup and Disaster Recovery SSID G Suite Computer Care Smart Phones Physical Security Application Google Drive Windows Server 2008 Screen Reader Customer Resource management Archive Processing Licensing Human Resources Gamification Skype Health IT Employee/Employer Relationship Hacks 3D Printing Managing Stress Regulation CrashOverride Printers Capital Productuvuty

toner1