312-253-4321    Get SUPPORT

Alchetec Blog

Alchetec has been serving the Chicago area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Adware Lawsuit Between Lenovo And FTC Settled

Adware Lawsuit Between Lenovo And FTC Settled

About two and a half years ago, Lenovo was brought under fire for manufacturing products that had adware preinstalled on them. This malware, a variant called Superfish, was installed on up to 750,000 Lenovo devices, and the company--eager to put this incident behind them--still refuses to admit fault, despite paying reparations and other fees as a result. Superfish allowed access to sensitive information and a root certificate, which could be used to access encrypted data on the same network. All in all, it was a rather embarrassing and dangerous scenario for Lenovo, and it comes with its fair share of consequences.

0 Comments
Continue reading

Subscribe to Our Blog!

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Business Computing Productivity Cloud Network Security Data Backup Data IT Services Privacy Hosted Solutions Malware Email Software Internet IT Support Hackers Outsourced IT Data Recovery Microsoft Computer Innovation Business Efficiency Hardware Productivity Managed IT Services Business Continuity Cloud Computing Tech Term Ransomware User Tips Backup Upgrade Mobile Devices Small Business Managed IT Services Windows 10 Google Collaboration Phishing Workplace Tips Cybersecurity VoIP IT Support Communication Paperless Office Business Management Remote Monitoring Smartphones Android Office 365 Smartphone Disaster Recovery Managed Service Server Internet of Things Data Management Mobile Device Managed IT Save Money Communications Passwords Managed Service Provider Facebook Social Media Help Desk Holiday Artificial Intelligence Encryption Browser BDR Saving Money Virtualization Network Quick Tips Windows 10 Document Management Wi-Fi Business Technology Government BYOD Automation Windows 7 Password Laptops Compliance Windows Risk Management Applications Microsoft Office Training Healthcare Miscellaneous Employer-Employee Relationship IT Management Scam Analytics Project Management Recovery Going Green Vendor Management Chrome Blockchain Information Infrastructure Data loss Tip of the week Apps Avoiding Downtime Unified Threat Management SaaS Antivirus Redundancy Telephone Systems Processor File Sharing Vulnerability Bandwidth Maintenance RMM Word Files VPN Wireless Mobile Device Management Money Access Control Data Storage Two-factor Authentication Regulations Politics Data Security Firewall Machine Learning Virtual Reality Software as a Service Tablet Bring Your Own Device IT Service Work/Life Balance Hosted Solution Office Gadgets Computers Robot Customer Relationship Management Storage Mobility Big Data Gmail Website Router App File Management Remote Monitoring and Management Net Neutrality How To HIPAA Settings Professional Services Server Management Monitors Payment Cards Remote Workers Samsung Operating System Networking Internet Exlporer Hard Drive Solid State Drive Search IoT Co-Managed IT Chromebook Virtual Private Network Downtime Cooperation Digital Payment Twitter Mobile Security Flexibility Identity Theft Health Licensing Social Monitoring Company Culture Remote Computing Recycling Printing Assessment The Internet of Things Utility Computing Electronic Medical Records Outlook Dark Web Consulting Patch Management Apple Upgrades How To Proactive Consultation Unified Communications Uninterrupted Power Supply Computing Employees Social Network Users OneDrive Smart Technology Display Employee-Employer Relationship Alert Network Management Customer Service Management Google Calendar Identity Dark Data Supercomputer Cost Management Travel Wireless Internet Holidays Read Only Gadget Hacking Vulnerabilities Mobile Data Tracking Active Directory Wires Zero-Day Threat Microsoft Excel Connectivity Social Engineering Content Filtering History Windows Server 2008 Point of Sale Virus Printer Instant Messaging Manufacturing Comparison Distributed Denial of Service Modem Security Cameras Touchscreen IT Consulting Spam Alerts Enterprise Resource Planning Corporate Profile Trending Legislation IT Budget Value of Managed Services WPA3 Black Market Employer/Employee Relationships IT Transportation IT Technicians Geography Digital Windows Server Backup and Disaster Recovery G Suite Cabling Computer Repair E-Commerce Crowdsourcing Virtual Assistant Websites WannaCry Bitcoin Finance Botnet Hard Disk Drives Specifications Managed IT Service Cookies Telephone Notifications Remote Worker Data Breach Mobile Computer Care Social Networking Network Congestion Managed Services Physical Security Fleet Tracking Tech Terms Google Drive Cache Taxes Hard Disk Drive Proactive Maintenance Business Telephone Sports Bookmarks Mirgation Humor High-Speed Internet Spyware User Management Business Growth Human Error Firefox Augmented Reality Permissions Star Wars Optimization Features Wasting Time Statistics SharePoint Current Events Authentication Mail Merge Wireless Technology 5G Break Fix Nanotechnology End of Support Mobile VoIP ROI Technology Laws Tech Support Staff Cortana Favorites Telephony Teamwork Shortcut Safety Black Friday Motherboard Education Vendor Asset Tracking Theft Techology IBM Hotspot Database Management Migration Office Tips Development Batteries MSP Permission Automobile Lenovo Fraud Disaster Solid State Drives Virtual Machines Electronic Health Records Database Bluetooth Downloads Hacker Managing Stress WiFi VoIP Projects Emoji Authorization Address Screen Reader Software Tips Cyber security Notes Heating/Cooling Unified Threat Management Operations Conferencing Shared resources Technology Tips Cyber Monday Mobile Computing Smart Devices IT Solutions OneNote Processors Financial Time Management Disaster Resistance Language eWaste GDPR Chatbots Cables Remote Work USB Test Superfish Cybercrime Options Credit Cards Legal Cyberattacks Law Enforcement Voice over Internet Protocol Multi-Factor Security Wearable Technology Enterprise Content Management Unsupported Software GPS YouTube Return on Investment Private Cloud Data Warehousing Smart Tech Personal Information Managed Services Provider PowerPoint Servers User Error Update Meetings Mouse Google Maps Sensors Procurement Proactive IT Computing Infrastructure 3D Printing Information Technology Mobile Office Error Domains Cleaning Hard Drives Motion Sickness Printers Public Cloud Emergency Public Speaking Presentation Students Lithium-ion battery Regulation Staffing Sync Hacks IT Consultant IT Assessment CrashOverride Marketing Relocation Mobile Device Managment Budget Competition Administrator Hiring/Firing IP Address Fun