Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Adware Lawsuit Between Lenovo And FTC Settled

Adware Lawsuit Between Lenovo And FTC Settled

About two and a half years ago, Lenovo was brought under fire for manufacturing products that had adware preinstalled on them. This malware, a variant called Superfish, was installed on up to 750,000 Lenovo devices, and the company--eager to put this incident behind them--still refuses to admit fault, despite paying reparations and other fees as a result. Superfish allowed access to sensitive information and a root certificate, which could be used to access encrypted data on the same network. All in all, it was a rather embarrassing and dangerous scenario for Lenovo, and it comes with its fair share of consequences.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Motherboard Tech Terms Favorites Cortana Bitcoin Backups Multi-Factor Security Health CIO USB Ransomware Procurement Hosted Solutions Machine Learning Malware Black Friday Telephony Mobile Device Management Work/Life Balance Website Remote Workers Server Cameras Authorization Technology Tips Virtual Desktop Features Microsoft Office Development Gmail Gadget Time Management History Experience Net Neutrality YouTube Internet of Things File Sharing Google Drive Cost Management Assessment Settings Wi-Fi Communication Budget SharePoint Managed IT Service Point of Sale Wireless Technology User Error Test Computer Repair Mirgation Professional Services Data Backup Saving Money Cybercrime User Tips Productivity Windows 10 Relocation Staffing Software as a Service Microsoft VPN Utility Computing Password IT Services Social Engineering Scary Stories Printing Hacking Analytics Remote Monitoring and Management Unified Communications IT Support Information Technology Productivity Monitors Content Filtering Business Intelligence How To Applications Business Continuity OneNote Legal Mobile Devices Corporate Profile Tech Support Redundancy Windows 10 Remote Worker Mobile Office Upgrade Data Business Growth Smart Technology Best Practice Hackers Managed IT services Users Artificial Intelligence Big Data Hacker Internet Exlporer Healthcare Apple Education Domains Employees Network Management Windows Writing Cables Wasting Time Mobile Device Software Tips IoT Staff Fraud Vulnerability eWaste Crowdsourcing Outlook Fleet Tracking Zero-Day Threat IT solutions PDF IT Management Printer Marketing Telephone Systems Lithium-ion Battery Presentation Vulnerabilities Deep Learning Chatbots Taxes Virus Help Desk Router Disaster Server Management Cabling RMM Security Cameras VoIP Read Only Permission High-Speed Internet Data Management Business Management Webcam Virtual Assistant Office 365 Computer Care Black Market Chrome Consumers Operating System Hotspot IT Consulting Avoiding Downtime Browser Vendor Management Meetings Scam Enterprise Content Management Analyitcs Cooperation Mouse Cryptocurrency Google Calendar Bookmarks Update Comparison Social Media Alt Codes Permissions Search Consulting Workplace Tips Proactive Managed Services Provider Augmented Reality Data loss Drones Uninterrupted Power Supply Dark Web Business How To Downtime Electronic Medical Records Digital Payment Spam Microsoft Excel VoIP Blockchain Recovery Social Networking Upgrades LiFi Programming Collaboration Company Culture Apps Bluetooth BDR Disaster Recovery Business Technology Licensing Firewall Data Warehousing Nanotechnology Downloads Piracy Mobile Data Authentication Screen Reader Robot IP Address IT service Bandwidth Networking Humor Cache Cyberattacks Two-factor Authentication Servers Hiring/Firing Gadgets Superfish Administrator Knowledge Virtual Reality Cloud Computing Smartphones Flexibility Maintenance Private Cloud Tablet Automobile Bring Your Own Device Storage Asset Tracking Google Docs Government Physical Security Smart Tech Tracking Tip of the Week Monitoring Refrigeration Laptop Unified Threat Management Safety Trending Best Practices Entrepreneur Mobility Employee-Employer Relationship Word Finance Social 5G Phone System ROI Wearable Technology Alerts Cleaning Saving Time Computer Web Server Save Money Theft Personal Information Data Security Email Twitter Customer Service Backup and Disaster Recovery Network Security Websites Virtualization Hardware Mail Merge Voice over Internet Protocol Cyber Monday Spyware Operations Mobile Going Green Application Techology Hacks Enterprise Resource Planning iPhone Data storage Intranet IT Technicians Samsung App Human Error Mobile Security Identity Motion Sickness Identity Theft Encryption G Suite Windows 7 Politics Technology Connectivity Training Google Innovation Project Management Consultation Technology Laws Information Address SaaS Infrastructure Tech Term Remote Computing Statistics Financial Disaster Resistance Patch Management Processors Privacy Backup PowerPoint HIPAA Typing GPS Office Tips Access Control Cookies Specifications Documents Unified Threat Management Star Wars Touchscreen Hard Disk Drive Employer-Employee Relationship IBM Internet WiFi Digital Google Maps Quick Tips Holiday Geography Competition Hosted Solution Recycling Solid State Drive MSP Public Cloud Data Breach Cybersecurity Outsourced IT Small Business Files Managed IT Services Dark Data Save Time Notifications Regulations 3D Printing Business Computing Document Management Travel Data Recovery Undo CCTV Language Managed Service Provider Identities Troubleshooting Office E-Commerce Shortcut IT Support Miscellaneous Computers Cloud Risk Management Fun Emoji Phishing Wires Computing Infrastructure Compliance Break Fix Wireless Computing Modem Mobile Device Managment Paperless Office Facebook Legislation Antivirus Google Wallet Alert Proactive IT Automation Network Database IT Budget Lenovo Remote Monitoring Chromebook User WannaCry Firefox Co-managed IT Money Smartphone Law Enforcement Instant Messaging Supercomputer Managing Stress Heating/Cooling Windows 8 BYOD Running Cable communications End of Support Current Events Unsupported Software Virtual Private Network Environment Hard Drive Business Owner Halloween Public Speaking Managed Service Passwords Sync Tip of the week Hard Drives Android Migration WPA3 Conferencing Display Notes Network Congestion The Internet of Things Efficiency Customer Relationship Management Electronic Health Records Digital Signature Managed IT Buisness Distributed Denial of Service Management Sports Software IT Consultant Retail Error Administration Botnet Mobile Computing Security

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To The Connection, Inc, a disaster is anything that involves a major loss of data or major downt...
QR-Code