Sometimes threats come to light only after they’ve been around for long enough to cause concern for the public. This was the case with a new bug found in Apple’s FaceTime app that allowed users to spy on others without their consent through group FaceTime calls. Thankfully, a patch has been issued that resolves it, but perhaps the way that it was implemented is the most interesting of all.
Mobile? Grab this Article!
Tip of the Week Security Technology Best Practices Business Computing Network Security Software Data Productivity IT Support Computer Privacy Innovation Hackers Data Backup Tech Term User Tips Hardware Efficiency Communications Google Email Data Recovery Cybersecurity Collaboration Android Malware Hosted Solutions Business Management IT Services Managed IT Services Internet Phishing Cloud Outsourced IT Backup Small Business Communication Windows 10 Business Mobile Device VoIp Workplace Tips Smartphone Artificial Intelligence Ransomware Social Media Microsoft Microsoft Office Mobile Devices Smartphones Information Facebook Managed Service Business Technology Cloud Computing Server Upgrade Alert Browser Network IT Management Two-factor Authentication Automation BDR Data loss Conferencing Internet of Things Blockchain Passwords Cybercrime Applications Apps Government Office 365 Access Control Mobile Device Management Cost Management Patch Management Encryption VPN Vendor Scam Users Hard Drive Vulnerability Data Breach Update Websites Maintenance Disaster Recovery Apple Quick Tips Antivirus Project Management Analytics Vulnerabilities Big Data App Managed Service Provider Miscellaneous Data Management Windows Holiday Saving Money Spam Data Security History Remote Monitoring Social Engineering Monitoring Healthcare Bitcoin Word Help Desk Search Augmented Reality Operating System Computers Virtual Assistant Gmail Vendor Management Professional Services Document Management Tech Terms Processor Data Protection Downloads Save Money Managed IT services Computing Saving Time Hacking Start Menu Bandwidth Gadgets Laptop Google Maps Cooperation Mobility Business Continuity Telephone Multi-factor Authentication Printer Retail Networking Digital Freedom of Information Free Resource Desktop Medical IT Managed Services Provider Settings Training Download Cleaning Social Network Social WiFi Cortana Hypervisor How to Machine Learning Google Drive Transportation Software License Teamwork Audit Unified Communications Storage Device security Paperless Office Vendor Mangement Redundancy Business Cards eCommerce Access Virtualization BYOD News Current Events IBM Sports PowerPoint Google Calendar eWaste Managed Services Administration Equifax Upload Time Management Knowledge Microchip Uninterrupted Power Supply Customer Resource management Router Hacker Devices Network Management DDoS Entertainment Customer Service Employer/Employee Relationship Management Tech Printing Display Database Business Mangement Windows 7 Comparison Spyware Fake News Value Corporate Profile Chromebook Managed IT Robot Meetings Startup Trends SQL Server Virtual Reality Nanotechnology Virus Telephone System Modem Licensing Compliance Telephony Data Analysis Private Cloud SharePoint SaaS Computer Care Term Excel Wasting Time Website Tactics Microsoft 365 Specifications Emails Travel Navigation Memory Mobile Security Backup and Disaster Recovery Password User Tip Voice over Internet Protocol Google Docs How To CrashOverride Gamification Unified Threat Management Azure Company Culture Electronic Medical Records SSID Hard Drive Disposal Wi-Fi Worker Regulations Service Level Agreement VoIP Fileless Malware Avoiding Downtime Money Information Technology Bluetooth Username Software as a Service Error Google Play Legal Tip of the week Managing Costs Running Cable Addiction Bookmark Solutions Television Downtime Evernote Microsoft Excel Twitter Outlook iPhone Computing Infrastructure Cyber security Touchscreen Mobile Office Identity Theft Screen Reader Health IT email scam Managed IT Service YouTube Accountants Going Green Disaster Directions Employer/Employee Relationships Distributed Denial of Service Mobile Technology Wireless Headphones Security Cameras Law Enforcement Virtual Machine Cabling Tablet HTML Emergency Browsers Integration Mouse Piracy Solid State Drive Cryptocurrency Proxy Server Budget Trend Micro Legislation Content Thank You Customer Relationship Management Congratulations Multi-Factor Security Personal Information Printers Managing Stress Regulation Financial