Home

About Us

IT Services

Electronic Security

Knowledge Center

News & Events

Blog

Support

Contact Us

Prosper IT
  • Register

Prosper Solutions Blog

Tip of the Week: Avoid Facetime Spying

Tip of the Week: Avoid Facetime Spying

Sometimes threats come to light only after they’ve been around for long enough to cause concern for the public. This was the case with a new bug found in Apple’s FaceTime app that allowed users to spy on others without their consent through group FaceTime calls. Thankfully, a patch has been issued that resolves it, but perhaps the way that it was implemented is the most interesting of all.

The most dangerous part about this threat was definitely how accessible it was to just about anyone who wanted to use it. In fact, it was so accessible that Apple had to disable the feature entirely until it was resolved, inconveniencing users at the cost of security.

Following the release of the update to iOS 12.1.4, Apple turned the feature back on, but until the user applies the patch, group FaceTime will simply be inaccessible. This is one way to handle the potentially disastrous scenario, as instead of giving users the option to continue using the service and putting themselves (and their privacy) on the line, Apple is leaving no room for error or controversy, instead opting to protect themselves and their users until they update their devices.

How to Upgrade Your Device
If you own an iOS device, you can run the update by following this path: Settings > General > Software Update. Keep in mind that you’ll want your device to be charged, and you will need a wireless connection as well. Automatic downloads can also be turned on through this process, meaning that you don’t have to initiate the update yourself.

This just goes to show how we all need to be mindful of what our devices are capable of, and how easy it can be to put our privacy at risk when we aren’t mindful of it.

In general, it’s important to remember that software updates are designed to be implemented as soon as possible, as they often address vulnerabilities or issues with security and performance. If you’re having trouble keeping your devices up to date, reach out to Prosper Solutions at (617) 369-9977.

Here Are Some Hacks You Should Be Cognizant Of
SIEM Can Remove Some Big Headaches
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, March 26, 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

WannaCry Current Events Emails Inbound Marketing Google Maps Browser Download Music Screen Reader Law Enforcement Windows Automobile Skype Start Menu communications Access Data Loss Trends Freedom of Information Efficiency IT Pain Points Disaster Windows10 Smartphones Teamwork Integration clout services Windows Server 2008 Saving Time Data Warehousing Flash Downtime IT Support Finance Security Cameras Streaming Media Gadgets Google Wallet Messenger Thank You Business Computer Malfunction Users IT Services IBM CrashOverride Communication Mobile Device Running Cable Phone System Electronic Payment Google Play Desktop Websites Information Router Permissions Artificial Intelligence Startup IT Management Books Computer Augmented Reality Advertising Displays YouTube Business Metrics Google Drive Virtual Reality Competition Managed IT Services Botnet Malware Notifications BDR Work/Life Balance Managing Stress Deep Learning Computer Accessories Microsoft 365 Mobile Device Management Google Tech Support Unified Threat Management Lithium-ion battery Innovation Sports Public Speaking Document Management Going Green Mobile Payment Social Engineering Managed Service Provider Worker Consultation Marketing Digital Payment Spyware In Internet of Things Gmail Upgrades Customer Resource management SaaS Text Messaging Environment WiFi Business Growth Software as a Service Processing Holiday Tablet Business Owner IT consulting Travel Migration Solutions Maintenance Tech Meetings Printers Politics Backup 3D Printing User hardware Flexibility Data eWaste Physical Security Recovery Digital USB Rapid City Micrsooft Cost Dark Web Two-factor Authentication Smartphone Network Management G Suite Emergency Fiber-Optic Information Technology Proxy Server Logistics Data Backup Productuvuty Mobility Electricity News Tactics Webcam Computing Infrastructure Scalability Small Business Administrator Regulation Tracking Wi-Fi Windows 10 cloud computing Miscellaneous iPhone Hacks Securty Piracy email scam Devices Microsoft Excel User Error Statistics Computer Repair Scam Chamber Application Network GDPR Hosted Solution Vendor Management Best Practices Fileless Malware Save Money Television Search Tip of the Week Patch Management Workplace Tips Hacker Downloads Human Resources Memory Cryptocurrency Best Available Risk Management outsource cloud computing Username Tech Terms Cost Management Audit IT Consultant Rental Service Congratulations Firewall Business Mangement Experience Microsoft IT Support Outsourced IT Managed IT Digital Signature Shortcut Legislation Phishing Net Neutrality A.I. Microsoft Office Data Breach Comparison Vendor Value Money Software Big data Cortana Sync Monitoring Fleet Tracking Virtualization Private Cloud Bitcoin Error Heating/Cooling switches Customer Service Relocation Machine Learning Settings Business Technology Retail Business Management Windows XP Employer-Employee Relationship Disaster Recovery Writing Co-Managed IT Technology Outlook PowerPoint Technology Tips Network Congestion Electronic Medical Records Training Analytic Update User Tip Legal Data Security Management MSP Managed IT services Unified Communications Drones Company Culture Computing Accountants Software License Connected Devices End of Support Google Docs IP Address Blockchain Robot Cybercrime Hard Drive Disposal Public Cloud Google Calendar Business Intelligence IT Plan Cabling Hack Apple Data Recovery Remote Computing App the Internet of Things Wireless Hacking Motion Sickness Bandwidth Programming Telephone Systems Printer Term Telephony Troubleshooting Applications Windows 8 cyber security Alert Wireless Technology Taxes Email Hard Drive Budget Modem Collaboration Server Managed IT Service Social Media Enterprise Resource Planning Time Management HIPAA Gaming Console Nanotechnology Vendor Mangement outsource cloud storage Networking cloud storage Office 365 Data Protection Bata Backup Mouse Black Market CCTV Health Business Cards Presentation Excel Assessment Social Language Specifications Content Evernote CIO Monitors Microchip Mobile Technology Android Uninterrupted Power Supply Licensing Passwords Unified Threat Management UTM LiFi Distributed Denial of Service Web Server Analytics Automation Fake News Equifax Workers Hackers Virus Cleaning Telephone System Addiction Service Level Agreement Printing Save Time Saving Money Processors Internet of Things Office Tips User Tips Visible Light Communication File Sharing DDoS Vulnerabilities Health IT cloud Reading Hosted Solutions Storage Employer Employee Relationship Tech Term Corporate Profile Chrome Managed Service Windows 7 Laptop Internet Chromebook Computer Care Navigation Website Samsung Safety Bookmark Bluetooth Virtual Assistant Mobile Devices BYOD Directions Business Continuity Social Network Documents Word Wireless Headphones Customer Relationship Management IT service Voice over Internet Protocol Fraud Business Computing Browsers Entrepreneur Best Practice Tip of the week Cache Privacy Supercomputer Password Paperless Office Government Antivirus Operating System Productivity Database Processor Vulnerability HTML Knowledge VoIP Staffing Redundancy Education Domains Data Management Remote Monitoring Regulations PDF Intranet Cybersecurity Conferencing Tablets Quick Tips Social Networking Gamification Trending Security Upload VPN Banking Smart Tech Administration History Computers Data Analysis Hard Drives Healthcare Help Desk Backup and Disaster Recovery Project Management Upgrade Twitter Bring Your Own Device Identity Theft Read uptime Virtual Desktop Cooperation Citrix Xenapp Multi-Factor Security Network Security Capital Distribution Telephone Content Filtering Patching SSID Apps Hiring/Firing Productivity Facebook Entertainment Ransomware Solid State Drive Reliable Computing Spam Asset Tracking Medical IT Avoiding Downtime SharePoint Society Access Control Compliance Touchscreen How To Multi-factor Authentication Proactive IT Office VoIP Professional Services Device security Mobile Computing Encryption Mobile Security Product Reviews Keyboard Data storage Windows 10

Latest News & Events

Prosper Solutions is proud to announce the launch of our new website at http://www.prospersolutions.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our ser...

Contact Us

Learn more about what Prosper Solutions can do for your business.

Call Us Today
Call us today
(617) 369-9977

150 Eastern Ave, Second Floor
Chelsea, Massachusetts 02150