Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Adware Lawsuit Between Lenovo And FTC Settled

Adware Lawsuit Between Lenovo And FTC Settled

About two and a half years ago, Lenovo was brought under fire for manufacturing products that had adware preinstalled on them. This malware, a variant called Superfish, was installed on up to 750,000 Lenovo devices, and the company--eager to put this incident behind them--still refuses to admit fault, despite paying reparations and other fees as a result. Superfish allowed access to sensitive information and a root certificate, which could be used to access encrypted data on the same network. All in all, it was a rather embarrassing and dangerous scenario for Lenovo, and it comes with its fair share of consequences.

Continue reading

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Save Money BDR Proactive Customer Service Upgrade Identity Alert Black Friday Licensing Mail Merge Theft Supercomputer Mobile Device Management Smartphone Shortcut Motion Sickness Paperless Office Disaster Halloween Proactive IT CIO Software Tips Mobility Sync Tech Support Unsupported Software Bitcoin Asset Tracking LiFi Mobile Security Social Media Time Management Windows 8 Favorites Cloud Computing Authorization IoT Data loss Mobile Devices Procurement Scam Remote Worker Wireless Technology Personal Information RMM Address Cleaning Travel Network Management Computer Compliance Technology Laws Managed Service Analyitcs Cybersecurity Antivirus Robot Software as a Service Saving Time Patch Management Running Cable Wires Network Congestion Data Security PowerPoint Money Google Drive Business Growth Mobile Office Black Market Computing Efficiency Notifications Hacks Flexibility Microsoft Office Test Uninterrupted Power Supply Dark Web Content Filtering Remote Monitoring Website Privacy Virtualization Entrepreneur Display Gadget Regulations Storage Search Security Cameras Mobile Social Networking Google Docs Vulnerabilities Networking Managed Services Provider Technology Tips Risk Management Project Management Android Net Neutrality Tech Term Data Warehousing Vulnerability Apple Websites IT Consultant Meetings Healthcare Cameras Legislation Enterprise Resource Planning Monitoring Workplace Tips Going Green Password Budget Motherboard Two-factor Authentication Troubleshooting Business Intelligence Hosted Solution Emoji Application Retail IT Budget IT solutions Web Server Tip of the Week Staffing Social Lithium-ion Battery Error Innovation Employer-Employee Relationship Google Maps Cybercrime Cabling Work/Life Balance Disaster Resistance Business Continuity Backups Mouse Microsoft Identity Theft Facebook Hacking Ransomware Users Employees Point of Sale Physical Security Deep Learning Infrastructure Bluetooth Sports Outlook Geography Encryption Computing Infrastructure Superfish Cables Enterprise Content Management Digital Payment Solid State Drive Development E-Commerce Relocation Hard Drive Comparison Virtual Reality Backup CCTV Customer Relationship Management Small Business Hiring/Firing Passwords Education OneNote Windows 10 Cache Safety Unified Threat Management Laptop Remote Workers Windows Mobile Data Spam Wearable Technology Server Upgrades Domains Managing Stress Financial Environment Data Recovery Printer Best Practice Connectivity Windows 10 Company Culture User Error Trending Cooperation Fraud Apps MSP Programming Saving Money Data Breach Co-managed IT Browser Save Time Migration Features Information Technology Spyware Health Specifications Augmented Reality History G Suite Human Error Internet of Things Public Cloud Managed IT services Staff Touchscreen YouTube Downtime Break Fix Telephone Systems Applications Operating System Hard Disk Drive User Tips iPhone Techology Distributed Denial of Service Google IT Technicians Hard Drives Data Backup Settings Virus Google Wallet Mobile Computing 3D Printing Malware Vendor Management Law Enforcement SaaS Maintenance Server Management Employee-Employer Relationship Files IT Consulting Disaster Recovery Recovery Twitter Drones Statistics Word WiFi The Internet of Things Hacker Managed IT Services Corporate Profile Tip of the week PDF IT Services BYOD Language Phone System Government Mobile Device Modem ROI Marketing Avoiding Downtime Nanotechnology Tablet Office IT Support Network Business Management Fleet Tracking Internet How To Automation Data Management SharePoint Downloads Writing Email Firefox Hosted Solutions Productivity Permission Office 365 Zero-Day Threat Intranet Permissions IT Management Screen Reader Office Tips Automobile Cost Management Smart Tech Servers Phishing Politics Botnet Hackers Redundancy Alerts Data storage GPS Backup and Disaster Recovery Authentication Scary Stories Smartphones Typing Security Tracking Business Computing IBM Managed IT Service Administration Access Control Printing Read Only Assessment Computers Cookies eWaste WannaCry Fun Internet Exlporer Cloud Piracy Artificial Intelligence Lenovo Remote Monitoring and Management Star Wars IP Address Firewall Smart Technology Instant Messaging Monitors Bookmarks Processors Managed IT Consultation Wireless Electronic Health Records Training Documents Bandwidth Gadgets Identities Business Network Security Outsourced IT Electronic Medical Records Alt Codes Holiday Undo Google Calendar How To Gmail Analytics Cortana Technology Machine Learning Hardware Cyberattacks Digital Signature Business Owner Miscellaneous HIPAA Public Speaking End of Support Mobile Device Managment Competition Current Events Digital Utility Computing Unified Threat Management IT service Recycling Consumers Router Operations Social Engineering Cyber Monday Refrigeration Webcam User Chromebook Computer Repair Wi-Fi Multi-Factor Security Heating/Cooling Document Management Finance Quick Tips Samsung Data Mirgation Taxes Virtual Desktop Private Cloud Blockchain Communication Best Practices Conferencing USB 5G WPA3 Buisness Business Technology Administrator Dark Data Bring Your Own Device App Productivity File Sharing Software Unified Communications Cryptocurrency Remote Computing Crowdsourcing Consulting Collaboration VoIP Experience High-Speed Internet Update Legal Information IT Support Presentation VPN Computer Care Virtual Private Network Big Data communications Tech Terms Chrome Chatbots Managed Service Provider Help Desk Management Hotspot Microsoft Excel VoIP Telephony Humor Knowledge

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...