Login 
Contact us today!
(808) 529-4605

Indevtech Blog

Indevtech has been serving the Honolulu area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How Vizio Got Busted for Spying on Its Customers

How Vizio Got Busted for Spying on Its Customers

What have you watched on TV lately? Actually, never mind; if you don’t want to tell us, we can just ask Vizio. Relax--we’re not actually going through with this, but the fact remains that 11 million owners of Vizio televisions had their viewing habits tracked by the manufacturer. Were you one of them?

0 Comments
Continue reading

Request a Consultation

Request a
Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for you!

Contact Us!

Free Consultation
 

Tag Cloud

Tip of the Week Security Technology Privacy Best Practices Cloud Business Computing Hackers Google Backup Malware Hosted Solutions Microsoft Internet Software Network Security Windows 10 Innovation User Tips Mobile Devices Data Smartphones Email Browser Business Hardware Tech Term Efficiency VoIP Disaster Recovery Business Continuity Productivity Smartphone Computer IT Services Ransomware Workplace Tips Miscellaneous Data Backup Business Management communications Productivity Android Cybercrime Outsourced IT Automation Cloud Computing Network Alert Chrome Data Recovery Office Windows Save Money Computers Router Managed IT Services Telephone Systems Upgrade Managed IT Services Server Artificial Intelligence Communication Facebook Windows 10 Collaboration Social Media Internet of Things Small Business Quick Tips Money Law Enforcement Virtualization Social Engineering Holiday Spam IT Support Office Tips How To Health Office 365 Applications Passwords Wi-Fi App Cybersecurity Password Remote Computing Bandwidth Gadgets Bring Your Own Device Gmail Operating System Information Mobile Device Work/Life Balance Mobile Device Management Settings Two-factor Authentication BDR Word Google Drive History VPN Networking Voice over Internet Protocol Phishing Vulnerability Private Cloud HaaS Application Recovery Scam Managed Service Hacking Microsoft Office Data Protection Entertainment Marketing Connectivity Flexibility Keyboard Safety Data Security Encryption Sports Mobility Mouse Managed Service Provider Data Breach Data Management Apps IT Plan Website Firewall Employer-Employee Relationship Telephony Legal Windows 7 Remote Monitoring Human Resources Black Market Business Intelligence Meetings Hiring/Firing Battery Managed IT Unsupported Software Social YouTube Servers Software as a Service Patch Management Budget Update USB eWaste OneNote Botnet Identity Theft Government The Internet of Things CES Redundancy Internet Exlporer Infrastructure Training Paperless Office Public Cloud Virtual Assistant Downtime IT Support Saving Money BYOD Best Practice DDoS Content Management Data Storage Physical Security Machine Learning Big Data Telephone System Data storage User Error End of Support Avoiding Downtime Blockchain Comparison Fraud Electronic Medical Records PDF IT Management Google Docs Access Control Spam Blocking Charger Mobile Computing Wearable Technology Cleaning Retail Robot Information Technology Notifications Maintenance Authentication Relocation Windows 10s Audiobook Recycling SaaS Help Desk Emergency Knowledge Reputation Tech Support Google Apps Worker Smart Office Printer Advertising Virtual Reality Data loss Music Automobile Cryptocurrency Hacker Techology Outlook Amazon Web Services Wiring Going Green Remote Work Smart Technology Nanotechnology Humor Skype Criminal Programming Biometrics Practices Network Congestion Customers Flash Running Cable Shadow IT Workers Rootkit Document Management Administrator Worker Commute Screen Mirroring Staff IBM Safe Mode Frequently Asked Questions Millennials Online Shopping Employer Employee Relationship Addiction Netflix Unified Threat Management Files Education Streaming Media Customer Relationship Management Laptop Wireless Software Tips Multi-Factor Security Two Factor Authentication Smart Tech webinar MSP Search Solid State Drive Start Menu Risk Management Assessment HVAC Shortcuts Computer Care Lithium-ion battery Hosted Computing IT Consultant Video Games Microchip Cast Troubleshooting Supercomputer Excel Workforce Environment Evernote Computer Accessories Cache Camera Computing Infrastructure Travel Customer Service Enterprise Content Management Vendor Touchpad Trending Shortcut Credit Cards Conferencing File Sharing How to Audit Tools Social Networking NarrowBand Politics Television WiFi Transportation Inventory Samsung Scalability Sync Password Manager Vendor Management Search Engine Hybrid Cloud Digital Signature Tip of the week Telecommuting Uninterrupted Power Supply IT solutions Wireless Charging Bluetooth Wireless Internet Root Cause Analysis Fax Server Public Computer Password Management Display People Devices Emails Augmented Reality Apple Computer Fan Distributed Denial of Service Wireless Technology Benefits Leadership Instant Messaging Content Business Mangement Bing Books Accountants Current Events Monitor Windows Server 2008 Cortana Wire Warranty Internet exploMicrosoft Users Experience HIPAA NIST Security Cameras HBO Specifications Mobile Office Amazon Save Time Thought Leadership Remote Worker iPhone FENG Value Chromecast Managing Stress Regulation Twitter IT solutions Congratulations Smartwatch CrashOverride Printers Company Culture Compliance Webinar Thank You
QR-Code