Infracore LLC Blog

Infracore has been providing enterprise-level IT Support for medium sized businesses in and around San Diego, CA since 2003. Time and experience has helped us develop best practices, workflow procedures and a proactive philosophy toward the management of IT departments for our clients.

How Vizio Got Busted for Spying on Its Customers

How Vizio Got Busted for Spying on Its Customers

What have you watched on TV lately? Actually, never mind; if you don’t want to tell us, we can just ask Vizio. Relax--we’re not actually going through with this, but the fact remains that 11 million owners of Vizio televisions had their viewing habits tracked by the manufacturer. Were you one of them?

0 Comments
Continue reading

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Cloud Business computing Google Productivity Network Security Hosted Solutions Internet User Tips Microsoft Data Malware Software Innovation Hackers Hardware Smartphones Business Email Mobile Devices Backup Tech Term Workplace Tips Communications Smartphone Data Backup Browser Business Management Efficiency Windows 10 Android IT Services VoIP Business Continuity Cloud Computing Computer Small Business Managed IT Services Alert Data Recovery Communication Disaster Recovery Outsourced IT Chrome Office Network Managed IT Services Artificial Intelligence Computers Router Ransomware Windows 10 Miscellaneous Cybercrime Collaboration Cybersecurity Windows Internet of Things IT Support Social Media Law Enforcement Password Applications Facebook Virtualization Productivity Money Passwords Health Mobile Device Gadgets Server Telephone Systems Quick Tips How To Office 365 Holiday Upgrade Phishing Work/Life Balance Word Private Cloud Information Social Engineering App Google Drive Spam Automation Saving Money Wi-Fi Mobile Device Management Mobility Encryption Keyboard Connectivity Apps Scam Data Breach Operating System Data Security BDR HaaS Office Tips Paperless Office IT Support Data Protection Voice over Internet Protocol Vulnerability Training Bring Your Own Device Settings Microsoft Office Managed Service Hacking Save Money Two-factor Authentication Sports Infrastructure Automobile Telephone System Save Time Employer-Employee Relationship History OneNote Wireless IT Management Redundancy Charger Avoiding Downtime Patch Management Software as a Service Spam Blocking Data Management VPN PDF IT Plan Users Human Resources Cleaning Google Docs Augmented Reality Fraud Worker Access Control Big Data Marketing Managed Service Provider Unsupported Software Cryptocurrency Comparison Staff Computer Care Remote Monitoring Battery Servers Website CES Government Managed IT Samsung Electronic Medical Records Telephony Education Content Management Bandwidth Windows 7 Remote Computing Public Cloud Machine Learning Entertainment Botnet USB Value BYOD Flexibility Virtual Assistant Business Intelligence Data Storage Firewall Display Blockchain Networking Update Legal Identity Theft End of Support Meetings Troubleshooting Mouse Loyalty Cache Millennials Google Search Start Menu Password Management Multi-Factor Security Smart Technology Security Cameras HIPAA Current Events Audit Mobile Computing Evernote Apple WiFi Criminal Excel Best Practice File Sharing Credit Cards Business Technology Inventory Internet exploMicrosoft Smart Office Administrator Password Manager SaaS IT solutions Physical Security Workforce Proactive IT Tools iPhone Techology NIST Trending Two Factor Authentication Hacker Knowledge Computer Fan Information Technology Sync Experience Camera Wireless Charging Devices Data loss Shortcuts Tip of the week Content Risk Management Biometric Security Advertising Document Management Microchip Business Mangement Hiring/Firing Net Neutrality Accountants Relocation User Error Downtime Search webinar Virtual Reality Smartwatch Network Congestion The Internet of Things Instant Messaging Music Cortana Thought Leadership Screen Mirroring Transportation Social Safety Monitor Windows 10s Windows Server 2008 Video Games Audiobook Politics Remote Worker Amazon Rootkit 5G Authentication Books Search Engine Gmail Assessment HBO Telecommuting Employer Employee Relationship ISP Root Cause Analysis How to Conferencing Software Tips Worker Commute Safe Mode Specifications Employee IT Consultant FENG Wireless Internet Wearable Technology Warranty Google Apps Cast HVAC Benefits Vendor Wiring Amazon Web Services OLED Nanotechnology Recovery Bing Recycling Television Outlook Remote Work Computer Accessories Cryptomining Practices Humor Internet Exlporer Black Market Wire Printer Workers Addiction Emails Digital Signage Digital Signature Leadership Files Skype Computing Infrastructure Enterprise Content Management Data storage Solid State Drive Flash Scalability Unified Threat Management Online Shopping Vendor Management Smart Tech Hybrid Cloud Travel YouTube Emergency Help Desk eWaste Public Computer Frequently Asked Questions MSP Bluetooth Database Hosted Computing Webinar Company Culture Thank You Compliance CrashOverride Managing Stress Congratulations Regulation Printers Twitter Manufacturing

Recent Comments

Sara George Tip of the Week: Locating a Misplaced Smartphone
16 April 2019
If you’re smart phone will be missed then with the software of the tracking location has to find the...
Jenna Ray What Star Wars can Teach About Mentorship
15 April 2019
There are lots of things in this world from we can learn positivity and people of this era are to ad...
Henry Lasseter What Volkswagen is Doing to Prevent Hackers From Controlling Your Car
09 April 2019
Volkswagen was doing to prevent hackers for from controlling your car it was done by the hackers. I ...
Hunter Gill Essential Cybersecurity Tips From The FBI
09 April 2019
FBI is the federal agency of the investigation the firm which investigates the cases of severe term ...
Donald Can Chargers Be Interchanged Between Devices?
02 April 2019
Technology has brought the change in our life even we can easily use it for our work. There are a lo...