Infracore LLC Blog

Infracore has been providing enterprise-level IT Support for medium sized businesses in and around San Diego, CA since 2003. Time and experience has helped us develop best practices, workflow procedures and a proactive philosophy toward the management of IT departments for our clients.

How Vizio Got Busted for Spying on Its Customers

How Vizio Got Busted for Spying on Its Customers

What have you watched on TV lately? Actually, never mind; if you don’t want to tell us, we can just ask Vizio. Relax--we’re not actually going through with this, but the fact remains that 11 million owners of Vizio televisions had their viewing habits tracked by the manufacturer. Were you one of them?

0 Comments
Continue reading

Tag Cloud

Tip of the Week Security Technology Privacy Best Practices Cloud Business computing Network Security Google Malware Hackers Microsoft Hosted Solutions Innovation Software Data User Tips Business Hardware Internet Tech Term Backup Smartphones Data Backup Business Continuity Email Browser Mobile Devices Windows 10 Computer Smartphone Android VoIP Small Business Alert Workplace Tips Communications Data Recovery Business Management IT Services Cloud Computing Productivity Outsourced IT Managed IT Services Miscellaneous Chrome Office Efficiency Managed IT Services Ransomware Computers Disaster Recovery Cybercrime Network Artificial Intelligence Communication Law Enforcement Password Applications How To Facebook Virtualization Windows Telephone Systems Internet of Things Productivity Collaboration Cybersecurity IT Support Money Passwords Router Social Media Windows 10 Office 365 Google Drive Quick Tips Saving Money Holiday Upgrade Information Work/Life Balance Word Server Health App Spam Gadgets Social Engineering Bring Your Own Device Automation Mobile Device Management Save Money Apps BDR Mobile Device Keyboard Phishing HaaS Office Tips Data Security Managed Service Data Protection IT Support Scam Data Breach Voice over Internet Protocol Microsoft Office Private Cloud Hacking Vulnerability Two-factor Authentication Wi-Fi Mobility Connectivity Entertainment OneNote VPN USB Value Data Management IT Management Firewall Networking Redundancy Human Resources End of Support Fraud Avoiding Downtime Spam Blocking Google Docs Employer-Employee Relationship Servers History Charger IT Plan Paperless Office Marketing Comparison Patch Management Operating System Website CES Battery Cleaning PDF Unsupported Software Remote Monitoring Content Management Worker Virtual Assistant Managed IT Big Data Remote Computing Computer Care Managed Service Provider Business Intelligence Telephony Telephone System Government Flexibility Sports Windows 7 Blockchain Identity Theft Settings Update Encryption Samsung Legal BYOD Infrastructure Electronic Medical Records Software as a Service Public Cloud Automobile Data Storage Bandwidth Training Humor Internet Exlporer Meetings Credit Cards Travel Inventory Television Camera WiFi Frequently Asked Questions Criminal Computer Accessories NIST Workforce Start Menu Augmented Reality Best Practice Password Manager Leadership Shortcuts Files Vendor Management Hybrid Cloud Wireless Charging Devices Document Management Microchip Data storage Audit Trending Techology Users Access Control Emergency Public Computer Information Technology Excel Bluetooth Cryptocurrency Tools Accountants Troubleshooting Loyalty Remote Worker Content IT solutions Physical Security Business Mangement Save Time Apple Cortana Thought Leadership Smart Technology Current Events Search Engine Search Computer Fan Sync Staff Internet exploMicrosoft Virtual Reality Data loss Amazon Authentication Wireless Internet Warranty Instant Messaging Tip of the week Safe Mode Downtime Telecommuting SaaS Wiring Video Games Audiobook Gmail HVAC Experience iPhone webinar Google Apps Two Factor Authentication Knowledge Machine Learning Bing How to The Internet of Things Specifications Advertising Worker Commute Screen Mirroring Amazon Web Services Nanotechnology Wire Printer Windows 10s Windows Server 2008 Risk Management Education Root Cause Analysis Remote Work Practices Unified Threat Management Recovery HBO Recycling Hiring/Firing Enterprise Content Management Relocation User Error Digital Signature Music MSP Conferencing Software Tips Workers Addiction Network Congestion YouTube Help Desk Black Market FENG Cast Online Shopping Smart Tech Transportation Safety Mouse Monitor Politics Rootkit Computing Infrastructure Botnet Hosted Computing Books Assessment Mobile Computing Scalability Outlook eWaste Employer Employee Relationship Password Management Millennials Skype Wearable Technology File Sharing Emails Cache IT Consultant Evernote Benefits Smart Office Administrator Wireless Solid State Drive Multi-Factor Security Flash HIPAA Webinar Managing Stress Regulation Printers CrashOverride Thank You Twitter Congratulations Company Culture Compliance

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

JoseSClark How You Can Get Microsoft Office Certified
14 December 2018
Many users want to get Microsoft Office certified for theirselve and it was a good post for them. Re...
Donna Brock 3 Significant Ways the Cloud Can Grow Your Business
13 December 2018
In every field of life technology have a big name and now technology provide the facility to save yo...
Phillip Bond A Checklist of 40 Microsoft Software Titles Reaching End of Life/Extended Support in July 2016
11 December 2018
A checklist of the components is done for the widening of the elements. The scope of the check list ...
Erickson Ferry Tip of the Week: Useful Shortcuts for Google
30 November 2018
Your blog was too good. I was exceptionally satisfied to discover this site. I needed to thank you f...
Alex Ling Would Your Users be Tricked by Social Engineering?
27 November 2018
I came to know about the user that was tricked by the users in this community this was all on social...