Sometimes threats come to light only after they’ve been around for long enough to cause concern for the public. This was the case with a new bug found in Apple’s FaceTime app that allowed users to spy on others without their consent through group FaceTime calls. Thankfully, a patch has been issued that resolves it, but perhaps the way that it was implemented is the most interesting of all.
Mobile? Grab this Article!
Tip of the Week Security Technology Best Practices Business Computing Network Security Tech Term Privacy Data User Tips Hackers IT Support Productivity Software Innovation Efficiency Android Data Backup Computer Data Recovery Google Email Malware Cybersecurity Collaboration Windows 10 Business Management Phishing IT Services Communications Communication Small Business Hosted Solutions Hardware Social Media Internet Backup Smartphone Mobile Device Cloud Ransomware Facebook Artificial Intelligence Managed IT Services Microsoft Office VoIp Mobile Devices Business Cloud Computing Network Business Technology IT Management Alert Outsourced IT BDR Two-factor Authentication Cost Management Automation Managed Service Smartphones Access Control Browser Blockchain Mobile Device Management Information Applications Server Microsoft Office 365 Scam Encryption Passwords Vulnerability Analytics Holiday App Websites Maintenance Antivirus Saving Money Internet of Things Cybercrime Hard Drive Data Management Workplace Tips Apps Update Data Security Vulnerabilities Patch Management VPN Quick Tips Data Protection Start Menu Mobility Operating System Saving Time Printer Networking Tech Terms Remote Monitoring Laptop Data loss Social Engineering Bitcoin Project Management Augmented Reality Data Breach Conferencing Cooperation Digital Virtual Assistant Big Data Gmail Disaster Recovery Managed Service Provider Apple Users Google Maps Vendor Document Management Search Downloads Windows Managed IT services Word Healthcare Business Continuity Upgrade Hacking Spam Bandwidth Company Culture Customer Resource management Router Spyware Hard Drive Disposal Regulations Service Level Agreement Entertainment Customer Service Money Information Technology Bluetooth Username Management Tech Legal Tip of the week Addiction Vendor Management Corporate Profile Windows 7 Television Downtime Google Drive Processor Save Money Microsoft Excel Audit Twitter Professional Services Computing Infrastructure Vendor Mangement Redundancy Mobile Technology Time Management Knowledge Identity Theft Screen Reader Telephone System Modem email scam Accountants Going Green Data Analysis Private Cloud Distributed Denial of Service Wireless Headphones Computing Term CrashOverride Law Enforcement HTML Microsoft 365 Mouse Piracy DDoS Worker Navigation Cryptocurrency Multi-factor Authentication Gadgets User Tip Voice over Internet Protocol Budget Business Mangement Legislation Content Freedom of Information Desktop Electronic Medical Records SSID Managed IT Training Download Running Cable Fileless Malware Telephony Cleaning Error Google Play WiFi Cortana Virus Machine Learning Bookmark Solutions Software License Miscellaneous Evernote YouTube Unified Communications SaaS Computer Care Device security Paperless Office iPhone Business Cards Virtualization BYOD News Unified Threat Management Health IT Solid State Drive Google Calendar eWaste Password Equifax Upload Cabling Directions Tablet VoIP Computers Telephone Security Cameras Devices Network Management Browsers Integration Settings Printing Software as a Service Database Proxy Server History Retail Comparison How to Fake News Touchscreen Chromebook Medical IT Robot Outlook Startup Trends Disaster Virtual Reality Nanotechnology Social Network Social Access Compliance Transportation SharePoint Travel Monitoring Administration Government Excel Website Tactics Help Desk IBM Specifications Emergency Emails Microchip Mobile Security Backup and Disaster Recovery Sports Uninterrupted Power Supply PowerPoint Google Docs Gamification Multi-Factor Security Congratulations Managing Stress Printers Regulation Thank You