pctechguide.com

  • Home
  • Guides
  • Tutorials
  • Articles
  • Reviews
  • Glossary
  • Contact

Deactivating Facetime to Thwart Hackers

There are some silent threats that can become very serious if precautions are not taken. Facetime exploits are one of them.

If you’re a FaceTime user, it’s probably worth deactivating the feature when it is not in use. At least, until we verify that Apple releases the case update (expected this week).

Victor Chebyshev of Kaspersky Lab shared his research findings:

“From what has been reported so far in the media, it would seem difficult for an attacker to exploit this error to stealthily monitor his targets, as the potential victim would receive an incoming call alert.”

The company has also temporarily disabled FaceTime’s group chat feature to further protect users from possible abuse of privacy. We encourage anyone who remains concerned about their security to disable FaceTime until the Apple patch is released.

This threat does not require you to click on a link, inadvertently download a compromised file, or even answer a call. This vulnerability is like the flu and other silent respiratory viruses that spread through FaceTime.

All of the above happens without having to answer the call on the receiver’s device (with iOS 12 or higher). The sender can simulate a kind of group conversation and add its own subscriber number, and then listen. If they are dedicated enough, they can access an iPhone or iPad camera (some users claim hackers have replicated the problem on a Mac). They initially do this to the first device they infect, but they can infect other devices later.

It is important to remember that the first participant will not notice what is happening at all. The first infected device will still ring waiting for the reception of the incoming call.

Deactivating Facetime as Needed

Fortunately, deactivating Facetime is pretty straightforward. You just need to take the steps listed below.

After it became known that the app was spying on users, many have wondered how to delete it from devices and here’s the answer.

Unfortunately, the security flaw in FaceTime’s app is damaging Apple’s credibility with its users, so many are wondering how they can uninstall it from their devices. The good news is that the app doesn’t need to be uninstalled altogether. You can just deactivate it when it isn’t in use. This will almost entirely eliminate the risk of having your Facetime account get hacked. You just need to coordinate with people you talk to through text messages before jumping on a Facetime call.

This is a consequence of people being fed up with the lack of respect for their privacy, and it is valid at least until the company fixes the problem and promises it won’t happen again.

While this happens and the respective security patch is being applied, the procedure for removing the iPhone and Mac application respectively will be released.

But before releasing this type of information, you should check if you are susceptible to this type of bug, and the form is simple, because you only need to know the version of the iPhone, as it attacks from 12.1 to 12.1.3.

Disable FaceTime on iPhone

The procedure for disabling Facetime on the smartphone is quick and easy. You just need to follow the steps listed below:

  • Go to Settings
  • Find the FaceTime app
  • Move the circle to the left to deactivate it.

It is that easy.

Disable FaceTime on Mac

On Apple computers, the method is also quick and easy. You just need to do the following:

  • Open the application
  • Click Menu
  • Select Preferences
  • Remove the popcorn from Activate in this account

You can always reactivate it when you need to use it again.

Filed Under: Communications

Latest Articles

12 Features To Look For In The Best Graph Maker App

Graph making is a key part of the data analysis process. The ability to present information in an easily digestible form, especially if it is complicated, will make your findings more persuasive and compelling. This article goes over ten features that you should look for in the best graph maker … [Read More...]

Nuances of Bandwidth for Both Webmasters and Internet Users

Online bandwidth is the measurement of the amount of digital information that a medium is capable of processing and transferring. Mediums with higher levels of bandwidth are capable of loading the same amount of information more quickly or more information over the same time interval. This concept … [Read More...]

AMD 750 Chipset

The AMD 750 chipset consists of two physical devices: the AMD-751 system controller and the AMD-756 peripheral bus controller. The key features of the AMD-751 system controller are: Support for the AMD Athlon system bus interface, the first 200MHz system bus for x86 … [Read More...]

Streamline Startup Operations with Virtual Data Rooms

Modern startup projects that we see in the business cluster today are more than just a brilliant idea of a potentially successful project at the … [Read More...]

The Importance of Data Security in Retail IoT

The Internet of Things (IoT) is transforming the retail industry by connecting physical stores with digital platforms, enabling smart inventory … [Read More...]

Review of Temu From Purchaser and Affiliate

Temu is a relatively new online shopping platform that has quickly gained popularity, especially among Gen Z shoppers. It is known for its ultra-cheap … [Read More...]

Avoid Data Breaches Caused by Weak Passwords

Weak passwords are a common cause of data breaches and security vulnerabilities. Weak passwords make it easier for cybercriminals to gain unauthorized … [Read More...]

20 Cool Pictures of Silicon Valley You’re Sure to Love

Silicon Valley, a name synonymous with innovation and technological prowess, is a place where dreams and ideas come to life. Nestled in the heart of … [Read More...]

13 Funky Images of Laptops

In our digital age, laptops have become our faithful companions, indispensable tools for work, leisure, and everything in between. They've evolved … [Read More...]

Guides

  • Computer Communications
  • Mobile Computing
  • PC Components
  • PC Data Storage
  • PC Input-Output
  • PC Multimedia
  • Processors (CPUs)

Recent Posts

How To Connect Speaker Systems to Your Sound Card

If you get distorted sound when connecting to an optical drive using the CD_SPDIF connector, remove it and use the CD_IN connector … [Read More...]

SugarSync Review

PROS: SugarSync is very easy to use and install. CONS: Not all phones will be able to download SugarSync at this time. OVERVIEW: SugarSync is by … [Read More...]

SCSI External

The external device in question is a scanner. The connectors are at the rear of the device SCSI Adapters SCSI Internal Intro SCSI … [Read More...]

[footer_backtotop]

Copyright © 2023 About | Privacy | Contact Information | Wrtie For Us | Disclaimer | Copyright License | Authors