ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Avoid Facetime Spying

Tip of the Week: Avoid Facetime Spying

Sometimes threats come to light only after they’ve been around for long enough to cause concern for the public. This was the case with a new bug found in Apple’s FaceTime app that allowed users to spy on others without their consent through group FaceTime calls. Thankfully, a patch has been issued that resolves it, but perhaps the way that it was implemented is the most interesting of all.

The most dangerous part about this threat was definitely how accessible it was to just about anyone who wanted to use it. In fact, it was so accessible that Apple had to disable the feature entirely until it was resolved, inconveniencing users at the cost of security.

Following the release of the update to iOS 12.1.4, Apple turned the feature back on, but until the user applies the patch, group FaceTime will simply be inaccessible. This is one way to handle the potentially disastrous scenario, as instead of giving users the option to continue using the service and putting themselves (and their privacy) on the line, Apple is leaving no room for error or controversy, instead opting to protect themselves and their users until they update their devices.

How to Upgrade Your Device
If you own an iOS device, you can run the update by following this path: Settings > General > Software Update. Keep in mind that you’ll want your device to be charged, and you will need a wireless connection as well. Automatic downloads can also be turned on through this process, meaning that you don’t have to initiate the update yourself.

This just goes to show how we all need to be mindful of what our devices are capable of, and how easy it can be to put our privacy at risk when we aren’t mindful of it.

In general, it’s important to remember that software updates are designed to be implemented as soon as possible, as they often address vulnerabilities or issues with security and performance. If you’re having trouble keeping your devices up to date, reach out to ClearView IT at 866-326-7214.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 05 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Privacy Network Security Data Cloud Business User Tips IT Support Internet Hardware Innovation Email Hosted Solutions Malware Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Cybersecurity Business Management Phishing IT Services Backup Data Backup Ransomware communications Smartphone Microsoft Office Upgrade Smartphones Small Business Network Mobile Devices Data Recovery Managed IT Services Communication Productivity Quick Tips Users Social Media VoIP Mobile Device Automation Tech Term Business Continuity Facebook Windows 10 Covid-19 Disaster Recovery Passwords Holiday IT Support Managed Service Windows 10 Browser Apps Cloud Computing Outsourced IT Miscellaneous Data Management Remote Work Internet of Things Managed Service Provider Saving Money Operating System Government Networking Windows Artificial Intelligence Managed IT services Workplace Strategy Gadgets Blockchain App Virtualization Server Spam Information Remote WiFi Bandwidth Mobile Device Management Business Technology Encryption Gmail Information Technology History Office Two-factor Authentication Office 365 Employee/Employer Relationship Budget Apple Big Data Conferencing Health Access Control Data Security Analytics Wi-Fi BDR Cybercrime Training Help Desk Employer-Employee Relationship Hacking Document Management Save Money Patch Management Remote Computing Hacker Vendor Remote Monitoring Compliance Voice over Internet Protocol Cost Management IT Management Website Search... Data loss Best Practice Legal Retail Data storage Alert Hiring/Firing Outlook Password Applications Money Customer Service Project Management Unified Threat Management BYOD Vulnerabilities Firewall Computing Vendor Management Augmented Reality Word Hard Drive Mobile Office IBM Managed Services Scam Router Law Enforcement How To End of Support Storage Printer The Internet of Things VPN YouTube Update Laptop User Travel Virtual Reality Data Breach Social Engineering Cryptocurrency Paperless Office Antivirus Black Market Maintenance Cleaning Chrome Robot Sports Windows 11 Social SaaS DDoS Monitoring Healthcare Websites Remote Workers iPhone Mobile Computing Mobility Education Meetings Cortana Windows 7 Content Filtering Marketing Free Resource Google Maps Running Cable Twitter Co-Managed IT How To Current Events Processors Entertainment Microchip Flexibility Excel Solutions Tech Terms Images 101 Integration Hack Identity Theft Display Notifications Managed IT Digital Unified Communications Virtual Assistant Wireless Technology Google Docs HIPAA eWaste Employees Bluetooth Taxes Avoiding Downtime Distributed Denial of Service Office Tips Holidays Downtime Private Cloud Processor Memory Safety Cooperation Video Conferencing Virtual Desktop Physical Security Experience Virtual Machines Politics Machine Learning Settings Computer Repair Multi-factor Authentication Start Menu Professional Services PowerPoint Solid State Drive Downloads Computer Care Administration Disaster Vulnerability Saving Time Presentation Specifications Drones Managed Services Provider IT Consultant Chromebook Software as a Service Data Protection Computers Bitcoin Lithium-ion battery Automobile Virtual Private Network Customer Relationship Management Telephone Relocation Browsers Smartwatch Displays Nanotechnology Communitications Advertising Motion Sickness Microsoft 365 Cables Business Intelligence Computer Accessories Comparison Google Play Work/Life Balance Google Drive Upload Procurement Tech Support Software License Securty Social Network FinTech Knowledge Data Analysis CES Corporate Profile Screen Reader IT Assessment Point of Sale Domains In Internet of Things Television Security Cameras Telephony Trends Supply Chain Management Employer Employee Relationship Mobile Technology Value Network Congestion Cabling Devices Cyber security Shortcuts Hacks Customer Resource management Organization Reliable Computing Fileless Malware Writing Tablet Smart Devices G Suite Tip of the week Mouse VoIP Gamification Remote Working Tracking Company Culture Regulations Trend Micro Be Proactive Public Speaking Telephone System AI Scalability Directions Digital Security Cameras Backup and Disaster Recovery Electronic Health Records Streaming Media Web Server Transportation Troubleshooting Keyboard Administrator SharePoint Text Messaging Content Proactive IT Digital Payment Desktop Wasting Time Worker Accountants eCommerce Modem Workplace Strategies Hard Drives Bring Your Own Device Electronic Medical Records Videos Access Database Surveillance intranet Shortcut Time Management Music Public Cloud Managing Costs Wireless Equifax SSID Heating/Cooling Environment Health IT Audit Media Spyware Tactics Development Windows XP Hard Drive Disposal Employer/Employee Relationships Business Owner Social Networking Botnet Username File Sharing Virtual Machine Micrsooft Startup Optimization Freedom of Information Smart Technology Rental Service Redundancy Reviews Navigation 2FA Flash Cache Addiction email scam Teamwork Telephone Systems Unified Threat Management Data Storage Business Growth Workers Mobile Security Hypervisor Legislation News Medical IT User Tip Shopping Printing Evernote Paperless Network Management CCTV SQL Server Inbound Marketing Staffing Banking Touchscreen PCI DSS Google Wallet Licensing Messenger Emergency Proxy Server Gig Economy Deep Learning Emails Humor Computer Malfunction Fake News Supply Chain IP Address Business Communications Vendor Mangement Service Level Agreement Internet Service Provider Computing Infrastructure Azure Hosted Solution Samsung Device security Managed IT Service Electronic Payment Business Metrics Management Regulations Compliance Books Uninterrupted Power Supply Wireless Headphones Memes Webcam Microsoft Excel Workplace Tech Human Resources Language Business Mangement Going Green Net Neutrality Society Business Cards Tablets Recovery Competition Phone System Error Financial Data Reading Bookmark Risk Management Monitors IT Visible Light Communication Scams Entrepreneur Google Calendar Term Google Apps Download LiFi Windows 8 Supercomputer Piracy HTML Documents Application Virus Telework

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?