Home

About Us

IT Services

Electronic Security

Knowledge Center

News & Events

Blog

Support

Contact Us

Blog
  • Register

Prosper Solutions Blog

Tip of the Week: Avoid Facetime Spying

Tip of the Week: Avoid Facetime Spying

Sometimes threats come to light only after they’ve been around for long enough to cause concern for the public. This was the case with a new bug found in Apple’s FaceTime app that allowed users to spy on others without their consent through group FaceTime calls. Thankfully, a patch has been issued that resolves it, but perhaps the way that it was implemented is the most interesting of all.

The most dangerous part about this threat was definitely how accessible it was to just about anyone who wanted to use it. In fact, it was so accessible that Apple had to disable the feature entirely until it was resolved, inconveniencing users at the cost of security.

Following the release of the update to iOS 12.1.4, Apple turned the feature back on, but until the user applies the patch, group FaceTime will simply be inaccessible. This is one way to handle the potentially disastrous scenario, as instead of giving users the option to continue using the service and putting themselves (and their privacy) on the line, Apple is leaving no room for error or controversy, instead opting to protect themselves and their users until they update their devices.

How to Upgrade Your Device
If you own an iOS device, you can run the update by following this path: Settings > General > Software Update. Keep in mind that you’ll want your device to be charged, and you will need a wireless connection as well. Automatic downloads can also be turned on through this process, meaning that you don’t have to initiate the update yourself.

This just goes to show how we all need to be mindful of what our devices are capable of, and how easy it can be to put our privacy at risk when we aren’t mindful of it.

In general, it’s important to remember that software updates are designed to be implemented as soon as possible, as they often address vulnerabilities or issues with security and performance. If you’re having trouble keeping your devices up to date, reach out to Prosper Solutions at (617) 369-9977.

Here Are Some Hacks You Should Be Cognizant Of
SIEM Can Remove Some Big Headaches
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, March 26, 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Business Technology Micrsooft Term Multi-factor Authentication cloud storage Server PowerPoint Collaboration Software License User Tips Conferencing Inbound Marketing Apps Piracy Samsung In Internet of Things Cortana UTM communications the Internet of Things Applications Running Cable Computers Hackers WiFi Shortcut Update Passwords Customer Relationship Management Device security Digital eWaste Data Backup Business Owner Google Drive Hosted Solution User SharePoint Cooperation Facebook Travel Connected Devices Flexibility Tech Terms Identity Theft Saving Time Asset Tracking LiFi Gadgets Networking Computer Malfunction Printers Email Smart Tech Tech Pain Points Spyware Marketing Legislation Dark Web Efficiency Compliance Environment Drones Mobile Device Management Website Patching Virtual Assistant Hacker Bitcoin Medical IT IT Services IP Address PDF Wi-Fi Corporate Profile Read IT Support Spam Disaster Recovery Excel IT consulting CIO Intranet Data Management Download Upgrade Bluetooth Evernote Managing Stress Health Health IT Laptop Trends Logistics Startup Cybercrime Physical Security Saving Money Administration Google Calendar Customer Service Avoiding Downtime HIPAA Productuvuty Customer Resource management Social History MSP Presentation Audit Society Internet of Things Database 3D Printing Windows 10 Data storage Privacy Banking Electronic Medical Records End of Support Fileless Malware Data Warehousing VoIP Books Mobile Computing Motion Sickness Cybersecurity Voice over Internet Protocol Augmented Reality HTML Bring Your Own Device Data Breach Network VoIP Analytics Rapid City Entertainment Data Loss Human Resources Digital Payment Artificial Intelligence Microsoft Antivirus Television Public Speaking Internet Net Neutrality Paperless Office Entrepreneur Data Security Mobile Payment Data Office 365 Business Continuity Managed IT Services Analytic Application Managed Service Encryption Redundancy Best Available Knowledge Software as a Service Monitors Settings Microsoft 365 Google Play Devices Hack Product Reviews Electronic Payment Ransomware Project Management Private Cloud Windows 8 Gamification Worker Deep Learning Tablets Enterprise Resource Planning Language Troubleshooting Tip of the Week Content Supercomputer DDoS Fleet Tracking Assessment Upload Visible Light Communication Hacking Distributed Denial of Service Domains Best Practice IT Plan cloud Reliable Computing Fake News Memory Money VPN Robot Tablet Workplace Tips Regulations Addiction Professional Services Mouse Error Employer-Employee Relationship Licensing Network Management Processing Backup and Disaster Recovery Start Menu Migration Skype Management Windows Miscellaneous User Error Cryptocurrency Text Messaging Office email scam Reading User Tip Employer Employee Relationship Telephone Systems G Suite Documents File Sharing Telephone System uptime Web Server Username Communication Tech Term Upgrades Content Filtering Rental Service Patch Management Disaster Sync Virus Innovation Computer Care Recovery Google Maps Wireless Headphones Microsoft Office Black Market Computer Repair Screen Reader Proxy Server Mobile Device Experience A.I. Advertising Router Meetings Risk Management App Legal Big data Vendor Management Holiday Capital Safety BYOD USB Fiber-Optic Alert Scam Thank You Congratulations Maintenance Machine Learning Heating/Cooling Small Business Gaming Console Printer iPhone Business Mangement IT Consultant WannaCry Storage Unified Threat Management Notifications Security Cameras Lithium-ion battery Uninterrupted Power Supply Phone System Integration Public Cloud Processor Computing Quick Tips Social Network Vendor Access Control Gmail clout services Administrator Education Technology Tips Productivity Emails Business Computing Network Congestion Mobility Business Touchscreen Data Recovery Search Mobile Devices News Microchip Managed IT Service Cabling Firewall Unified Threat Management Electricity Teamwork Retail Downloads Microsoft Excel Save Time Smartphone Browsers Proactive IT IBM Flash Tip of the week Current Events Hard Drive Bookmark Permissions Trending Windows XP Streaming Media Monitoring Time Management Cleaning Co-Managed IT Equifax IT Regulation Securty Document Management Network Security Law Enforcement Accountants GDPR Data Protection Virtual Reality Vendor Mangement Mobile Technology Competition Access Budget Business Cards Programming Citrix Xenapp Outsourced IT Taxes Writing Solutions Google Wallet cloud computing Cost Management Windows 10 hardware Cache Nanotechnology Navigation Healthcare Politics Chamber Google Downtime Social Engineering outsource cloud storage Government Save Money Messenger outsource cloud computing Comparison Remote Computing Android Google Docs Windows Server 2008 Managed IT Remote Monitoring IT Management Unified Communications IT service Browser Desktop Hard Drives CrashOverride Smartphones Solid State Drive Word Mobile Security switches cyber security Service Level Agreement Music Blockchain How To Apple Workers Finance Security Relocation SSID Staffing Telephone Directions Botnet Computer Accessories SaaS Computing Infrastructure YouTube Social Media Computer Bandwidth Outlook Chromebook Hard Drive Disposal Best Practices Cost Operating System Automobile Tactics Virtualization Displays Business Management Phishing CCTV Software Information Technology Social Networking Processors Freedom of Information Modem Telephony Distribution Wireless Company Culture Password Business Growth Keyboard Webcam Fraud Work/Life Balance Consultation Backup Help Desk Printing Managed Service Provider Websites Automation Technology Vulnerability Business Intelligence Malware Chrome Windows10 Windows 7 Sports Specifications Tech Support Two-factor Authentication Twitter Digital Signature Users Office Tips BDR Data Analysis Hosted Solutions Statistics Tracking Value Productivity Virtual Desktop Business Metrics Going Green Wireless Technology Hiring/Firing Information Managed IT services Bata Backup Emergency Vulnerabilities Hacks Training Multi-Factor Security IT Support Scalability

Latest News & Events

Prosper Solutions is proud to announce the launch of our new website at http://www.prospersolutions.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our ser...

Contact Us

Learn more about what Prosper Solutions can do for your business.

Call Us Today
Call us today
(617) 369-9977

150 Eastern Ave, Second Floor
Chelsea, Massachusetts 02150