312-253-4321    Get SUPPORT

Alchetec Blog

Alchetec has been serving the Chicago area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Adware Lawsuit Between Lenovo And FTC Settled

Adware Lawsuit Between Lenovo And FTC Settled

About two and a half years ago, Lenovo was brought under fire for manufacturing products that had adware preinstalled on them. This malware, a variant called Superfish, was installed on up to 750,000 Lenovo devices, and the company--eager to put this incident behind them--still refuses to admit fault, despite paying reparations and other fees as a result. Superfish allowed access to sensitive information and a root certificate, which could be used to access encrypted data on the same network. All in all, it was a rather embarrassing and dangerous scenario for Lenovo, and it comes with its fair share of consequences.

Continue reading

Subscribe to Our Blog!

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Productivity Best Practices Business Computing Cloud Network Security Data Data Backup IT Services Privacy Hosted Solutions IT Support Malware Software Internet Email Hackers Efficiency Outsourced IT Business Microsoft Innovation Data Recovery Computer Hardware Business Continuity Cloud Computing Small Business Cybersecurity Managed IT Services Mobile Devices Productivity Managed IT Services User Tips Backup Upgrade Tech Term Google Ransomware Collaboration Phishing Communication Business Management Windows 10 Mobile Device VoIP Workplace Tips Smartphone IT Support Smartphones Android Paperless Office Disaster Recovery Managed Service Provider Office 365 Remote Monitoring Managed Service Quick Tips Data Management Managed IT Server Communications Internet of Things Browser Facebook Encryption Social Media Network Save Money Passwords Miscellaneous Saving Money BDR Virtualization Compliance Help Desk Holiday Wi-Fi Artificial Intelligence Business Technology BYOD Windows 7 Windows 10 Health Government Document Management Remote Work Healthcare Microsoft Office Training Users Employer-Employee Relationship Laptops Automation Password Vendor Management Risk Management Windows Applications Office Data Security Tip of the week Data loss Storage Avoiding Downtime Telephone Systems Unified Threat Management File Sharing Bandwidth Antivirus Blockchain Recovery Mobility Information Redundancy Going Green Maintenance Vulnerability Regulations IT Management Scam Two-factor Authentication Analytics Project Management Apps Chrome Infrastructure Processor SaaS Router Employee-Employer Relationship Big Data Meetings OneDrive RMM Gmail Software as a Service Computing Website Tablet App Hard Drive IoT Files Wireless Mobile Device Management Covid-19 Money Word Data Storage Politics Company Culture Flexibility VPN Machine Learning Access Control Virtual Reality Work/Life Balance Bring Your Own Device Virtual Private Network IT Service Gadgets Proactive Hosted Solution Computers Robot Customer Relationship Management Firewall Smart Technology File Management Data Storage Management Licensing Remote Monitoring and Management Net Neutrality Professional Services Display Assessment Payment Cards HIPAA Alert Customer Service Mobile Office Remote Workers How To Operating System Patch Management Internet Exlporer Apple Time Management Co-Managed IT Uninterrupted Power Supply How To Monitors Consultation Samsung Remote Worker Managed Services Cooperation Information Technology Mobile Security Search Network Management Chromebook Server Management Monitoring Settings Twitter Recycling Augmented Reality Solid State Drive Utility Computing Electronic Health Records Networking Social Printing Dark Web Consulting Remote Computing Data Breach Electronic Medical Records The Internet of Things Downtime Outlook Unified Communications Digital Payment Social Network Employees Upgrades Managed Services Provider Identity Theft Wireless Internet Holidays Technology Laws Legal Law Enforcement Procurement Mail Merge Computing Infrastructure USB Unsupported Software Active Directory Shortcut Laptop Cost Management Private Cloud Read Only Windows Server 2008 Techology Personal Information Identity Wires Zero-Day Threat Disaster 3D Printing Bluetooth Outsourcing Downloads Microsoft Excel Update Connectivity Point of Sale Lenovo Vulnerabilities Employer/Employee Relationships Heating/Cooling IT Unified Threat Management Distributed Denial of Service Modem Gadget WiFi Security Cameras VoIP Dark Data Value of Managed Services Address Alerts Enterprise Resource Planning Instant Messaging Software Tips Manufacturing Virus WPA3 Mobile Data Windows Server Remote Working Technology Tips Transportation Social Engineering Disaster Resistance Cybercrime Backup and Disaster Recovery Bitcoin Video Conferencing Multi-Factor Security E-Commerce Virtual Assistant Telephone Superfish IT Technicians Geography Spam Proactive Maintenance Servers Business Telephone User Error Managed IT Service Cookies GPS YouTube Black Market Mobile Finance Hard Disk Drives Computer Repair Social Networking Crowdsourcing Fleet Tracking Tech Terms User Management Mouse Cache Bookmarks Google Maps Optimization Proactive IT Travel Human Error Current Events Hacking Biometric Google Calendar Permissions Star Wars Botnet Features Supercomputer Wasting Time Mobile VoIP Mirgation Notifications High-Speed Internet Database Management IT Assessment Printer Break Fix Sports Nanotechnology Tracking ROI Network Congestion Vendor Physical Security Staff Content Filtering Authentication History Virtual Machines IT Consulting Black Friday Motherboard Asset Tracking Theft Corporate Profile Humor Batteries Peripheral Comparison Hotspot Business Growth Favorites Teamwork Solid State Drives Touchscreen MSP Permission Cortana Projects Trending Gamification Legislation Fraud Wireless Technology 5G IT Budget Database End of Support Cyber security Migration Development Tech Support GDPR Websites Digitize Screen Reader Telephony Safety Notes Digital Education Smart Devices Operations Managing Stress IBM G Suite Authorization Cabling Options Credit Cards Cyber Monday Mobile Computing Hacker OneNote Computer Care Financial WannaCry Office Tips PCI DSS Specifications Language eWaste Automobile Conferencing Shared resources Budget Taxes Test Hard Disk Drive Return on Investment Outsource IT Emoji Cyberattacks Voice over Internet Protocol Google Drive Chatbots Cables Statistics Shadow IT SharePoint Data Warehousing Smart Tech PowerPoint Spyware Firefox Sensors IT Solutions Wearable Technology Processors Enterprise Content Management IP Address Staffing Sync IT Consultant Fun CrashOverride CRM Mobile Device Managment Error Domains Administrator Printers Hard Drives Public Cloud Public Speaking Students Regulation Presentation Lithium-ion battery Cleaning Motion Sickness Hacks Emergency Marketing Relocation Hiring/Firing Competition