Contact Us Today! 1-844-237-4300

Central Technology Solutions Blog

Welcome to our blog, full of IT tips and business technology best practices

Adware Lawsuit Between Lenovo And FTC Settled

Adware Lawsuit Between Lenovo And FTC Settled

About two and a half years ago, Lenovo was brought under fire for manufacturing products that had adware preinstalled on them. This malware, a variant called Superfish, was installed on up to 750,000 Lenovo devices, and the company--eager to put this incident behind them--still refuses to admit fault, despite paying reparations and other fees as a result. Superfish allowed access to sensitive information and a root certificate, which could be used to access encrypted data on the same network. All in all, it was a rather embarrassing and dangerous scenario for Lenovo, and it comes with its fair share of consequences.

0 Comment
Continue reading

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Productivity Cloud Data Privacy Network Security Hosted Solutions IT Services Data Backup Email Malware Internet Hackers Software Business Efficiency IT Support Outsourced IT Innovation Microsoft Mobile Devices Productivity Data Recovery Computer Hardware Managed IT Services Small Business Google Upgrade Business Continuity IT Support Cloud Computing Cybersecurity Backup Collaboration Ransomware User Tips Communication Tech Term Phishing Smartphone Managed Service Provider Disaster Recovery Managed IT Services Workplace Tips Windows 10 Business Management Smartphones Mobile Device VoIP Internet of Things Android Quick Tips Data Management Remote Monitoring Social Media Paperless Office Managed IT communications Facebook Managed Service Browser Encryption Windows Save Money Server Network Saving Money Office 365 Windows 10 Artificial Intelligence Virtualization BDR Business Technology Miscellaneous BYOD Help Desk Wi-Fi Compliance Risk Management Holiday Passwords Automation App Remote Work Training Users Vendor Management Password Health Mobile Device Management Windows 7 Apps Government Microsoft Office Healthcare Document Management Laptops Recovery Employer-Employee Relationship Bring Your Own Device Avoiding Downtime Big Data Going Green Data Security Chrome Robot Bandwidth Analytics Office Applications Firewall Gmail Unified Threat Management Scam Two-factor Authentication Project Management Antivirus Money Covid-19 Data storage Computing Infrastructure Information Data loss Vulnerability Information Technology Blockchain Mobility Wireless File Sharing Telephone Systems SaaS Hosted Solution Regulations Website IT Management Processor Redundancy Computers Content Filtering Storage Tip of the week Apple Social Politics Software as a Service Work/Life Balance Router Maintenance VPN Flexibility Gadgets Hard Drive Customer Relationship Management Virtual Private Network Customer Service IoT Unified Communications Budget Virtual Reality Access Control Printing Machine Learning Operating System Downtime Company Culture RMM Tablet Meetings Remote Computing IT Service OneDrive Files Settings Proactive Employee-Employer Relationship Management Hacker Remote Monitoring and Management The Internet of Things How To Samsung Digital Payment Sports Solid State Drive Current Events Websites Identity Theft Smart Technology Wireless Technology Legal Remote Worker Remote Workers Time Management Networking Licensing Chromebook Net Neutrality Patch Management Data Breach Social Network Network Management Internet Exlporer Bitcoin Electronic Health Records Upgrades Assessment HIPAA Mobile Office Spam Twitter How To Cooperation YouTube Employees Server Management WiFi Monitoring File Management Mobile Security Outlook Mouse Recycling Payment Cards Consultation Display Uninterrupted Power Supply End of Support Administration Utility Computing Google Drive Consulting LiFi Co-Managed IT Education Data Storage Business Growth Monitors Word Search Managed Services Alert Augmented Reality Private Cloud Electronic Medical Records Dark Web IT solutions Professional Services Managed Services Provider Mobile Computing Tech Support Backups Transportation Mobile VoIP Mobile Data Migration Drones Theft Biometric Remote Working Shortcut Smart Tech Virtual Assistant E-Commerce Vendor Point of Sale Firefox Operations Deep Learning Wires Employer/Employee Relationships Human Error IT Assessment Data Warehousing Cost Management Safety Computing Infrastructure Vulnerabilities Hard Disk Drives Authentication Virtual Machines Dark Data Personal Information Heating/Cooling Technology Assurance Group ’s 18 IT Consulting Marketing Connectivity Batteries Cybercrime Buisness Enterprise Resource Planning Bookmarks Cyber security Telephony Technology Tips Chatbots Alt Codes WPA3 Projects Financial Gamification Sync WannaCry Cryptocurrency Wasting Time Features Smart Devices Law Enforcement Multi-Factor Security Notifications Wearable Technology Proactive Maintenance Permission Digitize Public Cloud Microsoft Excel Hacking Modem Printer Black Market Alerts Geography Solid State Drives Authorization Credit Cards Botnet Distributed Denial of Service Servers Annual Convention ROI Travel Hacks Mobile Teamwork Favorites Comparison Identity Typing Fleet Tracking Return on Investment Procurement Mobile Device Managment Software Tips Writing Peripheral Emoji Cache Database Sensors Gadget Google Calendar Best Practice Database Management Test Shadow IT Automobile Computer Care Network Congestion Disaster Trending Cookies Mail Merge High-Speed Internet Options Holidays Computer Repair Managed IT Service San Diego Technology Laws Star Wars Notes Sponsor Shared resources Conferencing Windows Server 2008 GPS Physical Security Specifications Touchscreen Techology Asset Tracking Active Directory Retail PCI DSS Cortana VoIP Windows 8 Save Time Voice over Internet Protocol Cyberattacks 3D Printing Legislation IT Technicians Lenovo MSP GDPR Outsourcing Outsource IT Permissions Nanotechnology SharePoint Processors Staff Address Development 5G Zero-Day Threat IT Supercomputer Break Fix Statistics Social Networking Identities PowerPoint Value of Managed Services Crowdsourcing Unified Threat Management Digital Hotspot Obstacle Managing Stress Instant Messaging Tracking Office Tips Black Friday Roanoke — Central Technology Solutions Disaster Resistance OneNote Windows Server G Suite History eWaste Read Only Telephone Taxes Unsupported Software Virus Mirgation Superfish Virtual Desktop Google Wallet Tech Terms Video Conferencing Google Maps Laptop Update Fraud Screen Reader Downloads Cables Wireless Internet Backup and Disaster Recovery Business Telephone IT Budget Bluetooth Motherboard Hard Drives Google Docs Social Engineering User Error USB Spyware Language Course Enterprise Content Management Humor Manufacturing Finance Optimization Cyber Monday technology services provider Proactive IT Security Cameras User Management Cabling Printers IT Consultant Hard Disk Drive Error Students Web Server Emergency CrashOverride Cameras Regulation Motion Sickness CCTV Administrator Relocation Webcam CRM