Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Adware Lawsuit Between Lenovo And FTC Settled

Adware Lawsuit Between Lenovo And FTC Settled

About two and a half years ago, Lenovo was brought under fire for manufacturing products that had adware preinstalled on them. This malware, a variant called Superfish, was installed on up to 750,000 Lenovo devices, and the company--eager to put this incident behind them--still refuses to admit fault, despite paying reparations and other fees as a result. Superfish allowed access to sensitive information and a root certificate, which could be used to access encrypted data on the same network. All in all, it was a rather embarrassing and dangerous scenario for Lenovo, and it comes with its fair share of consequences.

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Cloud Privacy Email Hackers Business User Tips Microsoft Business Computing Malware Network Security Software Hosted Solutions Computer Productivity Google Internet Tech Term Communication Data Small Business Backup Mobile Devices Efficiency IT Services Ransomware Workplace Tips Hardware Windows 10 Smartphone Cloud Computing Android Saving Money Data Recovery IT Support Microsoft Office Upgrade Productivity Office 365 Social Media Information Managed IT Services Gmail Windows Data Management Facebook Browser Business Continuity Users Phishing Internet of Things Word Innovation Managed IT Services Mobile Device Data Backup Server Miscellaneous Disaster Recovery Smartphones Outsourced IT App Passwords Windows 10 Artificial Intelligence communications Business Management Managed Service Provider VoIP Remote Monitoring Employer-Employee Relationship Encryption Network Chrome Vulnerability Cybersecurity Managed Service Government Money Apps Applications Infrastructure BYOD Office Tips Save Money Virtual Reality Hacker Apple Gadgets Tip of the week Analytics Content Filtering Spam IT Support Big Data Website Unified Threat Management VPN Education Robot Risk Management Access Control Router Wireless Printing Development Automation Firewall Customer Service Augmented Reality IT Management WiFi Avoiding Downtime Maintenance The Internet of Things Settings Two-factor Authentication Tablet Data storage Paperless Office Virtualization Display Bandwidth Antivirus YouTube Employee-Employer Relationship Outlook Hard Disk Drive Monitors Holiday Search HIPAA IBM Data Security Data loss Business Technology Operating System Chromebook Mobile Device Management Virtual Private Network Administration Collaboration Customer Relationship Management End of Support Hacking OneNote Server Management Bring Your Own Device Wi-Fi Computing Touchscreen Google Drive Laptop Password Mobile Security Document Management Mouse Vendor Management Telephone Systems Presentation LiFi Safety Computers Office Quick Tips Business Intelligence Storage Downtime Scam Wireless Technology Recovery Retail Hosted Solution SaaS Solid State Drive Company Culture Networking Recycling Human Error IT service Heating/Cooling Smart Technology Motherboard Remote Computing Sports Students WannaCry Going Green Social Engineering Computing Infrastructure Dongle Knowledge Legislation Identity Update Mobile Office MSP Scalability Social Hard Drives Permissions Assessment Time Management Managing Stress Managed Services Cabling Typing FCC Smart Tech PowerPoint Updates Firefox Unified Communications eWaste Device BDR Servers Deep Learning Humor Distributed Denial of Service Mixed Reality Alerts Service Level Agreement Digital Payment Experience User Comparison Running Cable Migration Hacks Refrigeration Fraud Internet Exlporer Politics LED Network Management SharePoint Cables Laptops Managed IT Cryptocurrency Title II Connectivity Virtual Desktop Onboarding Techology Budget Public Speaking Continuity Mobility Google Maps sip Managed IT Service Modem Buisness Slack Data Breach Digital Lenovo How To Competition Licensing Private Cloud Specifications Compliance Lithium-ion battery Charging Mail Merge Value Tech Support IT solutions Smart Office Co-Managed IT Downloads IT Technicians File Sharing Wires Software as a Service Disaster Shortcut Bitcoin Network Congestion Online IoT Computer Care Digital Signage GDPR Unified Threat Management Solar Print Toner Statistics Best Practice telephony Break Fix Cookies Samsung 5G Monitoring Hard Disk Drives Spyware Superfish Information Technology Cooperation Google Docs Black Friday Regulations Halloween Messaging Address Writing Undo Hotspot Professional Services Websites Identity Theft Cortana Work Content Multi-Factor Security Mirgation Voice over Internet Protocol Entertainment Uninterrupted Power Supply Patch Management Windows 8 Marketing Microsoft Excel Star Wars Training Fun Desktop Data Warehouse User Error Automobile Shortcuts Bluetooth Business Growth Application Dark Web Nanotechnology G Suite Spying Solid State Drives Google Wallet Staff Streaming Cyber Monday Social Networking Scary Stories Analysis Employee-Employer Relationships Corporate Profile Current Events Language USB Optimization Google Calendar Chatbots IP Address Cybercrime FinTech iOS Blockchain Cost Management Troubleshooting VoIP Legal Security Cameras Alt Codes Dark Data Net Neutrality Screen Reader National Security How To Drones Business Analysis Printer Wearable Technology Web Server Emergency Machine Learning IT Budget GPS Printers Computer Repair IT Consultant Unsupported Software Domains Processors Cameras Relocation Meetings Tracking Health Cleaning Mobile Data Alert CCTV Emoji Webcam Windows 7 Electronic Medical Records Work/Life Balance Error Black Market Point of Sale Regulation Mobile Computing Travel Law Enforcement Physical Security Notifications CrashOverride Upgrades Twitter Botnet Supercomputer Motion Sickness Gadget Staffing Personal Information Administrator Crowdsourcing Taxes 3D Printing