Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection, Inc RSS Feed

The Connection, Inc Blog

The Connection, Inc has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Adware Lawsuit Between Lenovo And FTC Settled

Adware Lawsuit Between Lenovo And FTC Settled

About two and a half years ago, Lenovo was brought under fire for manufacturing products that had adware preinstalled on them. This malware, a variant called Superfish, was installed on up to 750,000 Lenovo devices, and the company--eager to put this incident behind them--still refuses to admit fault, despite paying reparations and other fees as a result. Superfish allowed access to sensitive information and a root certificate, which could be used to access encrypted data on the same network. All in all, it was a rather embarrassing and dangerous scenario for Lenovo, and it comes with its fair share of consequences.

Continue reading
0 Comments

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Workplace Tips Wearable Technology Productivity WiFi Hard Disk Drive Features Data Management IBM VPN Staff History Theft Mobile Device Software Mobile Security IT Management Competition Wireless Technology Word Gmail Cortana The Internet of Things Cryptocurrency Conferencing Telephony Scary Stories Computers Managed IT Business Owner Politics Router Server Cooperation Data Warehousing Display Wi-Fi Virtual Private Network Error Favorites RMM Meetings Big Data Time Management Tech Term Infrastructure Apps Virtual Desktop Data loss Current Events Net Neutrality Office 365 Refrigeration HIPAA Writing Managing Stress Smartphone Cost Management Mobile Computing IP Address Virus Backup and Disaster Recovery Vendor Management IT Technicians Security Solid State Drive Lithium-ion Battery Servers IT Support Flexibility Managed IT Service Access Control Education Unified Threat Management Read Only Alert Outlook Tracking Mobile Data Mobile Device Managment Phone System Going Green Bitcoin Saving Money Software Tips Instant Messaging Managed Service Provider Programming Help Desk communications CCTV Permission Business Computing Blockchain Chatbots Backups Vulnerabilities Microsoft Office Retail Browser Enterprise Content Management Server Management Black Market Proactive Website Experience Enterprise Resource Planning Miscellaneous IT Support Human Error Networking Buisness Shortcut IT service Cabling Unified Communications Hacker Corporate Profile Knowledge Dark Data Cyberattacks End of Support Processors Downloads BYOD Operations Google Wallet Recycling IT Consulting Address SaaS Legislation Electronic Medical Records Cameras VoIP App Hacks Smart Tech Tip of the week Bookmarks iPhone Cache Healthcare Business Growth Touchscreen Wires Consumers Distributed Denial of Service Recovery Procurement Monitoring Network Facebook Cybersecurity Running Cable Point of Sale Information Sync Google Calendar PDF Cyber Monday Break Fix Outsourced IT Project Management Robot Mobile Office Motion Sickness Redundancy Halloween YouTube Asset Tracking Private Cloud Cables Computing Spyware Data Breach WPA3 Regulations Data Financial Tech Support Hosted Solutions Analyitcs Data storage Settings Motherboard Law Enforcement Websites Telephone Systems Taxes Safety Humor Printing Specifications Artificial Intelligence Passwords Augmented Reality Proactive IT Chrome Identity Theft Consulting Co-managed IT Computer Care Mobile Device Management Emoji Management Computing Infrastructure Authorization VoIP IT Services Mobility IT Consultant Network Security High-Speed Internet Work/Life Balance Office Tips Business Continuity Microsoft Excel Firewall CIO Employees Cookies Windows Training Disaster Recovery Social Media Drones USB Cloud Tablet Star Wars Travel Two-factor Authentication Administration Government WannaCry Laptop Social Engineering Assessment Digital Statistics Network Congestion Geography Test Public Cloud Sports Holiday Administrator Legal Content Filtering Uninterrupted Power Supply GPS User Google Docs Remote Worker Twitter Small Business Data Recovery Monitors Unified Threat Management Bluetooth Consultation Applications Remote Monitoring eWaste Company Culture Migration Vulnerability Documents Gadget BDR Analytics Disaster Mobile Saving Time Mobile Devices IoT Mail Merge Permissions Budget Application Business Intelligence G Suite Presentation PowerPoint Antivirus Automation Efficiency Identities User Error Hard Drives 3D Printing Windows 10 Machine Learning IT Budget Storage User Tips Ransomware Privacy Windows 10 Wireless Cloud Computing Internet Remote Workers Money Downtime Unsupported Software Hosted Solution Encryption Document Management Automobile Best Practices Alt Codes Security Cameras Modem Google Maps Personal Information Maintenance Scam Employee-Employer Relationship Marketing Email Managed IT services Internet Exlporer Social Disaster Resistance Licensing Relocation Notifications Development Fleet Tracking Digital Payment Deep Learning Utility Computing Chromebook Supercomputer IT solutions Smart Technology Physical Security Managed IT Services OneNote Technology Laws MSP Zero-Day Threat Patch Management Mouse Customer Service Update Hotspot Compliance SharePoint Managed Services Provider Samsung Remote Computing 5G How To Software as a Service Business Technology Search Technology Data Backup Nanotechnology Printer Heating/Cooling Android Employer-Employee Relationship Apple Fraud Paperless Office Virtual Reality Domains Business Management Network Management Save Money Tech Terms Google Troubleshooting Typing Superfish Fun Gadgets ROI E-Commerce Firefox Upgrade Avoiding Downtime Backup Communication Remote Monitoring and Management Public Speaking Business Health Hiring/Firing Web Server File Sharing Piracy Cleaning Finance Multi-Factor Security Malware Authentication Technology Tips Operating System Managed Service Files Black Friday Password Tip of the Week Hackers Hacking Entrepreneur Dark Web Data Security Environment Windows 8 Computer Language Bandwidth Productivity Bring Your Own Device Internet of Things Risk Management Innovation Techology Undo Quick Tips Phishing Electronic Health Records Lenovo LiFi Connectivity Botnet Identity Virtualization Spam Best Practice Microsoft Intranet How To Office Hard Drive Hardware Comparison Information Technology Social Networking Screen Reader Staffing Users Collaboration Crowdsourcing Smartphones Cybercrime Upgrades Mirgation Google Drive Alerts Trending Webcam Customer Relationship Management Save Time Digital Signature Computer Repair

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code