Sometimes threats come to light only after they’ve been around for long enough to cause concern for the public. This was the case with a new bug found in Apple’s FaceTime app that allowed users to spy on others without their consent through group FaceTime calls. Thankfully, a patch has been issued that resolves it, but perhaps the way that it was implemented is the most interesting of all.
Mobile? Grab this Article!
Tip of the Week Security Technology Best Practices Business Computing Network Security Data Privacy Tech Term IT Support Productivity Software Computer Hackers Efficiency User Tips Innovation Data Backup Data Recovery Android Hardware Email Malware Collaboration Google Cybersecurity Communications Business Management Hosted Solutions Phishing IT Services Internet Cloud Backup Small Business Managed IT Services Communication Windows 10 Mobile Device Artificial Intelligence Business Social Media Microsoft Office Smartphone Facebook Ransomware VoIp Outsourced IT Information Workplace Tips Network Business Technology IT Management Two-factor Authentication Microsoft Cloud Computing Server Automation Managed Service Mobile Devices Smartphones Alert Browser Applications Upgrade Access Control Office 365 Mobile Device Management Cost Management BDR Blockchain Antivirus Users Apps Government Analytics Vulnerabilities App Managed Service Provider Data Management Quick Tips Windows Holiday Saving Money Spam Patch Management Data Security Encryption VPN Scam Data loss Vulnerability Hard Drive Miscellaneous Update Internet of Things Passwords Disaster Recovery Cybercrime Websites Maintenance Vendor Document Management Tech Terms Downloads Save Money Managed IT services Data Protection Healthcare Project Management Hacking Start Menu Bandwidth Big Data Laptop Vendor Management Google Maps Processor Mobility Saving Time Business Continuity Printer Networking Digital Remote Monitoring Social Engineering Bitcoin Word Search Data Breach Conferencing Operating System Cooperation Augmented Reality Virtual Assistant Gmail Computers Apple Free Resource Corporate Profile Chromebook Managed IT Medical IT Robot Startup Trends Fake News Virus Social Network Social Hypervisor Compliance Telephony Transportation SharePoint Teamwork Virtual Reality Nanotechnology Excel Storage Website Tactics Help Desk Specifications Emails Travel SaaS Computer Care Monitoring Current Events Mobile Security Backup and Disaster Recovery Password Sports PowerPoint Google Docs CrashOverride Gamification Unified Threat Management Microchip Customer Resource management Router Hard Drive Disposal Worker Regulations Service Level Agreement VoIP Entertainment Customer Service Money Information Technology Employer/Employee Relationship Gadgets Company Culture Management Tech Legal Tip of the week Display Running Cable Addiction Windows 7 Television Downtime Bluetooth Username Software as a Service Value Twitter Outlook Professional Services Computing Infrastructure Touchscreen Microsoft Excel Screen Reader Telephone System Modem email scam YouTube Accountants Going Green Disaster Data Analysis Private Cloud Distributed Denial of Service Mobile Technology SQL Server Identity Theft Computing Term Law Enforcement Wasting Time Cabling Tablet HTML Emergency Microsoft 365 Mouse Piracy Solid State Drive Wireless Headphones Memory Multi-factor Authentication User Tip Voice over Internet Protocol Budget Legislation Content Navigation Cryptocurrency Desktop Electronic Medical Records SSID Settings Training Download Fileless Malware Avoiding Downtime Freedom of Information Azure History Error Google Play WiFi Cortana Managing Costs How to Machine Learning Google Drive Bookmark Solutions Software License Cleaning Device security Paperless Office Vendor Mangement Redundancy iPhone Business Cards Access Virtualization BYOD Audit Evernote Unified Communications IBM Health IT Google Calendar eWaste Administration Equifax Upload Time Management Knowledge Directions Employer/Employee Relationships News Mobile Office Telephone Security Cameras Virtual Machine Devices Network Management DDoS Browsers Integration Uninterrupted Power Supply Printing Database Business Mangement Proxy Server Retail Comparison Spyware Congratulations Hacker Multi-Factor Security Managing Stress Personal Information Printers Thank You Financial Regulation