Contact Us Today! 1-844-237-4300

Central Technology Solutions Blog

Welcome to our blog, full of IT tips and business technology best practices

Adware Lawsuit Between Lenovo And FTC Settled

Adware Lawsuit Between Lenovo And FTC Settled

About two and a half years ago, Lenovo was brought under fire for manufacturing products that had adware preinstalled on them. This malware, a variant called Superfish, was installed on up to 750,000 Lenovo devices, and the company--eager to put this incident behind them--still refuses to admit fault, despite paying reparations and other fees as a result. Superfish allowed access to sensitive information and a root certificate, which could be used to access encrypted data on the same network. All in all, it was a rather embarrassing and dangerous scenario for Lenovo, and it comes with its fair share of consequences.

0 Comment
Continue reading

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Productivity Cloud Data Hosted Solutions Network Security Privacy IT Services Data Backup Email Internet Malware Hackers Software IT Support Business Efficiency Outsourced IT Innovation Microsoft Data Recovery Computer Hardware Mobile Devices Productivity Managed IT Services Business Continuity IT Support Small Business Google Upgrade Cloud Computing Backup Ransomware Cybersecurity Tech Term User Tips Communication Collaboration Phishing Managed IT Services Smartphone Managed Service Provider Disaster Recovery Business Management Windows 10 Workplace Tips Internet of Things Mobile Device VoIP Smartphones Android Paperless Office Social Media Data Management Remote Monitoring Encryption Managed IT Managed Service Quick Tips communications Facebook Browser Office 365 Artificial Intelligence Save Money Windows 10 Windows Server Network Saving Money Virtualization Miscellaneous BDR Risk Management Holiday BYOD Help Desk Wi-Fi Passwords Compliance Business Technology Microsoft Office Mobile Device Management Users Healthcare Automation Windows 7 Government Document Management Apps Vendor Management Remote Work App Password Health Training Chrome Firewall Recovery Bandwidth Unified Threat Management Laptops Avoiding Downtime Applications Bring Your Own Device Going Green Gmail Employer-Employee Relationship Robot Office Big Data Data Security Analytics Computers File Sharing Blockchain Storage Processor Apple Hosted Solution Website IT Management Redundancy Money Tip of the week Data storage Information Computing Scam Antivirus Content Filtering Project Management Two-factor Authentication Information Technology Infrastructure Telephone Systems SaaS Wireless Regulations Data loss Vulnerability Mobility Proactive Unified Communications Settings Tablet OneDrive Access Control Employee-Employer Relationship Meetings Downtime Files Social Covid-19 Flexibility Hard Drive Customer Service Politics IoT Work/Life Balance Virtual Reality VPN Software as a Service Budget Router Operating System Maintenance Printing Customer Relationship Management Company Culture RMM Virtual Private Network Gadgets IT Service Machine Learning Remote Computing Payment Cards Server Management Internet Exlporer Alert How To Electronic Medical Records Spam Managed Services Provider HIPAA Business Growth Co-Managed IT Uninterrupted Power Supply Cooperation YouTube Consultation WiFi Remote Monitoring and Management Mobile Security How To Samsung Mobile Computing Management Hacker Professional Services Managed Services Solid State Drive Private Cloud Word Search Remote Workers Chromebook Administration LiFi Current Events Education Wireless Technology Legal Tech Support Digital Payment Augmented Reality Mobile Office Remote Worker Dark Web IT solutions Websites Identity Theft Upgrades The Internet of Things Twitter Licensing Electronic Health Records Bitcoin Patch Management Monitoring Time Management Networking Employees Sports Social Network Smart Technology Display Data Breach Net Neutrality Outlook Recycling End of Support Data Storage Mouse Utility Computing Consulting File Management Network Management Google Drive Assessment Monitors Voice over Internet Protocol Technology Laws Tech Terms GDPR Outsourcing Mail Merge eWaste Comparison Read Only Identity GPS Cables Social Engineering Backup and Disaster Recovery Cookies USB 5G IT VoIP Sponsor Google Calendar Remote Working Google Wallet PowerPoint Value of Managed Services Touchscreen Techology Hard Drives Google Docs Supercomputer Mobile Data Crowdsourcing Windows Server Lenovo Enterprise Content Management Managed IT Service Finance San Diego Telephone Statistics Theft Humor G Suite History Video Conferencing Address Specifications Tracking Wires Permissions Safety Human Error Nanotechnology Backups Google Maps Wireless Internet Business Telephone Digital Obstacle Cost Management Legislation Dark Data E-Commerce IT Technicians Personal Information Drones Taxes Disaster Resistance IT Budget Manufacturing Optimization Connectivity SharePoint Staff Deep Learning Security Cameras User Management Superfish Vulnerabilities Break Fix Authentication Social Networking Transportation Mobile VoIP Bluetooth Unified Threat Management WPA3 Hotspot Financial Notifications Cabling Biometric Enterprise Resource Planning Black Friday Bookmarks Roanoke — Central Technology Solutions Fraud Permission Screen Reader Black Market Employer/Employee Relationships IT Assessment Spyware Course Features Mirgation Peripheral Virtual Desktop Alt Codes Virtual Assistant Vendor Proactive IT Cryptocurrency Hard Disk Drives Virtual Machines Shortcut Downloads Point of Sale Batteries Geography Writing Authorization Motherboard Emoji Cyber security User Error Fleet Tracking Language Procurement Cybercrime Projects Gamification Firefox Mobile Cyber Monday Network Congestion Favorites technology services provider Heating/Cooling IT Consulting Test Smart Tech Hacks Sync Proactive Maintenance Digitize Cache Migration PCI DSS Computer Repair Typing Telephony Wasting Time Smart Devices Cortana Public Cloud Solid State Drives Credit Cards WannaCry Star Wars Operations Outsource IT Physical Security Best Practice Law Enforcement ROI High-Speed Internet Data Warehousing Retail Botnet Teamwork Hacking Asset Tracking Computing Infrastructure 3D Printing Travel Return on Investment Conferencing Marketing Technology Assurance Group ’s 18 Servers MSP Buisness Processors Mobile Device Managment Software Tips Database Management Shadow IT Technology Tips Cyberattacks Chatbots Database Sensors Development Microsoft Excel Zero-Day Threat Modem Windows 8 Save Time Automobile Computer Care Options Holidays Multi-Factor Security Office Tips Wearable Technology Laptop Gadget Notes Identities Shared resources Windows Server 2008 Disaster Trending Printer OneNote Alerts Unsupported Software Virus Active Directory Managing Stress Distributed Denial of Service Instant Messaging Annual Convention Update CRM Administrator CCTV Relocation Printers Webcam IT Consultant Error Hard Disk Drive Students Regulation Web Server Emergency CrashOverride Cameras Motion Sickness