Get Started Today!  (415) 295-4898

croom new

415 IT Blog

415 IT has been serving the San Rafael area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses

Adware Lawsuit Between Lenovo And FTC Settled

Adware Lawsuit Between Lenovo And FTC Settled

About two and a half years ago, Lenovo was brought under fire for manufacturing products that had adware preinstalled on them. This malware, a variant called Superfish, was installed on up to 750,000 Lenovo devices, and the company--eager to put this incident behind them--still refuses to admit fault, despite paying reparations and other fees as a result. Superfish allowed access to sensitive information and a root certificate, which could be used to access encrypted data on the same network. All in all, it was a rather embarrassing and dangerous scenario for Lenovo, and it comes with its fair share of consequences.

  0 Comments
0 Comments
Continue reading

Mobile? Grab this Article

QR Code

Tag Cloud

Security Tip of the Week Productivity Technology Best Practices Business Computing Data Data Backup IT Support Network Security Privacy Hosted Solutions Cloud IT Services Data Recovery Efficiency Internet Email Software Business Managed IT Services Malware Outsourced IT Innovation Small Business Business Management Tech Term Collaboration Cybersecurity Hackers Google Cloud Computing Upgrade Hardware Phishing User Tips Computer Windows 10 Microsoft Business Continuity Mobile Devices Smartphone Managed Service Mobile Device Workplace Tips VoIp Communication Android Quick Tips Managed Service Provider Ransomware Paperless Office Disaster Recovery Backup Smartphones Encryption Communications Covid-19 Remote Work Server Browser Data Management Office 365 Business Technology Saving Money BDR Remote Monitoring Managed IT Network Healthcare Social Media Internet of Things Compliance Passwords Holiday Wi-Fi Document Management Artificial Intelligence Windows 7 Vulnerability Users Facebook Applications Blockchain Managed IT services Microsoft Office Help Desk Miscellaneous Laptops Chrome Data Security Government Save Money Health Virtualization Information Processor Employer-Employee Relationship Tip of the week Office Vendor Management Analytics Project Management Avoiding Downtime Bandwidth Antivirus Two-factor Authentication Scam Automation Redundancy VPN RMM Website Infrastructure Company Culture Software as a Service Proactive Meetings Files Access Control Mobility Virtual Private Network IoT Windows Regulations Hard Drive IT Management Gadgets Employee-Employer Relationship Storage Customer Relationship Management Router OneDrive Data Loss Training Mobile Office Machine Learning BYOD Apps Maintenance Time Management Gmail The Internet of Things Co-Managed IT Cooperation Networking Recycling Risk Management Search Password Money Unified Threat Management Net Neutrality Monitoring Remote Worker Tablet File Management Dark Web Augmented Reality Financial Internet Exlporer Remote Monitoring and Management Smart Technology Operating System Management Server Management Word Payment Cards Data Storage File Sharing Computing Electronic Health Records Patch Management Data Breach Employees Information Technology Consulting Downtime Assessment Social Network Instant Messaging Network Management Managed Services HIPAA Utility Computing Flexibility Professional Services Bring Your Own Device Mobile Security Managed Services Provider Consultation Unified Communications Alert Remote Workers Backup and Disaster Recovery Touchscreen Manufacturing Hacking Vendor Tech Support Operations Read Only Security Cameras Technology Laws Virtual Assistant Bitcoin G Suite Digital Payment Hotspot Asset Tracking Holidays Batteries Smart Tech Managed IT Service Point of Sale Outsource IT Tech Terms Outlook Disaster Resistance GDPR Mobile MSP Finance Emergency Multi-Factor Security Black Friday Outsourcing Wireless Internet Big Data Conferencing Remote Printer Transportation Heating/Cooling Active Directory Development IT Human Error Trending Smart Devices IT Technicians Cost Management Peripheral Printing Unified Threat Management Wasting Time Current Events Motherboard Chromebook Mouse Language CIO applications Statistics Connectivity Break Fix E-Commerce Laptop Theft Shortcut Proactive IT Optimization Authentication Cookies Cables Cyber Monday Staff Video Conferencing Electronic Medical Records Employer/Employee Relationships Apple Migration eWaste Permissions Banking Servers Windows Server OneNote Business Telephone Permission Lenovo Hard Disk Drives Sensors Microsoft Excel PCI DSS Database Vulnerabilities Computing Infrastructure Bluetooth Features Remote Working IT Consulting Notes Recovery Managing Stress Virtual Machines Authorization Samsung Nanotechnology Wires Biometric Proactive Maintenance Solid State Drive Chatbots Google Calendar Fraud Politics SharePoint User Management Alerts How To IT Assessment Test Superfish Solid State Drives Mirgation Private Cloud Mail Merge User Error Voice over Internet Protocol Projects Mobile Computing Value of Managed Services Wearable Technology Star Wars Virtual Reality Budget Procurement PowerPoint Display Spam Enterprise Content Management Travel WPA3 Credit Cards Websites App Firewall Gamification Cybercrime Cyber security Identity Theft Enterprise Resource Planning Downloads Teamwork Comparison Licensing Digitize Options Telephone Cache Bookmarks CRM ROI Address WiFi Return on Investment Geography Data Warehousing Cyberattacks Social Social Networking Technology Tips Fleet Tracking Computers Zero-Day Threat Shared resources SaaS Going Green Screen Reader Distributed Denial of Service Mobile Device Management Techology Database Management Identity Legislation Windows Server 2008 Customer Service Specifications Shadow IT Wireless 5G Mobile VoIP Remote Computing Favorites Content Filtering Settings Personal Information Modem High-Speed Internet Printers Education Twitter CEO Students Marketing Daniel Stevens Regulation

Latest Blog

Did you know that, as of July 2020, 69 percent of global desktop Internet users utilized Google Chrome as their browser of choice? With such a large market share, the security associated with Google Chrome is important to keep in mind. To help increase some of this awareness...

Latest News

We are proud to announce that 415 IT and our CEO, Daniel Stevens, were recently featured by CIO Applications. We discussed how and why we serve our clients, as well as some sneak peeks for our future. Read our interview by visiting:  https:...