Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Adware Lawsuit Between Lenovo And FTC Settled

Adware Lawsuit Between Lenovo And FTC Settled

About two and a half years ago, Lenovo was brought under fire for manufacturing products that had adware preinstalled on them. This malware, a variant called Superfish, was installed on up to 750,000 Lenovo devices, and the company--eager to put this incident behind them--still refuses to admit fault, despite paying reparations and other fees as a result. Superfish allowed access to sensitive information and a root certificate, which could be used to access encrypted data on the same network. All in all, it was a rather embarrassing and dangerous scenario for Lenovo, and it comes with its fair share of consequences.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Business Computing Best Practices Productivity Data Software Hackers Innovation Business Network Security Cloud Hardware IT Support Internet User Tips Malware Email Efficiency Phishing Workplace Tips Computer Google Privacy Collaboration Hosted Solutions IT Services Users Cybersecurity Quick Tips Ransomware Data Backup Microsoft Small Business Communication Smartphones Mobile Device Business Management communications Android Mobile Devices Workplace Strategy Smartphone VoIP Saving Money Managed IT Services Microsoft Office Browser Managed Service Data Recovery Social Media Passwords Network Disaster Recovery Upgrade Backup Tech Term Internet of Things Automation Covid-19 Cloud Computing Remote Remote Work Artificial Intelligence Server Managed Service Provider Facebook Miscellaneous Encryption Gadgets Spam Windows Information Holiday Employee/Employer Relationship Windows 10 Outsourced IT Government Data Management Business Continuity Wi-Fi Business Technology Productivity Blockchain Windows 10 Virtualization Apps Two-factor Authentication Compliance Bandwidth Data Security Current Events Gmail App Vendor Employer-Employee Relationship Managed Services Voice over Internet Protocol Office Chrome Budget Networking Mobile Device Management Apple Applications Computing Access Control Information Technology Conferencing Office 365 Hacker Avoiding Downtime Mobile Office How To BDR Router BYOD WiFi Operating System Virtual Private Network Big Data Training Help Desk Health Risk Management Office Tips Analytics Computers Retail Augmented Reality Storage Website Password Managed IT Services Marketing Bring Your Own Device Remote Monitoring Solutions End of Support Vulnerability HIPAA Going Green Vendor Management The Internet of Things Display Cybercrime Printer Social Paperless Office Monitoring Infrastructure Tip of the week Document Management Customer Service Remote Workers IT Support Healthcare Telephone Scam Data loss Free Resource Windows 11 Cooperation Project Management Windows 7 Microsoft 365 Excel Firewall Patch Management Save Money AI Safety Employees IT Management Integration Meetings Settings VPN Modem Printing Wireless User Tip Content Filtering Processor Mobile Security Holidays Data Privacy Computer Repair YouTube Cryptocurrency Data Storage Smart Technology Video Conferencing Managed Services Provider Customer Relationship Management Saving Time Virtual Machines Professional Services Virtual Desktop Data storage Machine Learning LiFi Hacking Managed IT Service Outlook Presentation Downloads Maintenance Money iPhone Antivirus Humor Wireless Technology Licensing Entertainment Vulnerabilities Sports Images 101 Mouse 2FA Word Supply Chain Multi-Factor Authentication Mobility Telephone System Cost Management Administration Robot Videos Directions Electronic Health Records Assessment Legal Paperless Permissions IT solutions Entrepreneur Unified Threat Management Business Growth Wasting Time Co-managed IT Unified Threat Management Trend Micro Technology Care Security Cameras Specifications Cortana Microchip Software as a Service Internet Exlporer Undo Business Communications Fraud Alt Codes Network Congestion Username Managing Costs Scams User Error eCommerce Hybrid Work SSID Black Friday Physical Security Downtime Surveillance Database Virtual Assistant Human Resources Hosted Solution Point of Sale Typing Virtual Machine Cables IT Technicians Proxy Server Cookies Medical IT Application Cyber Monday Reviews Knowledge Development Tactics Network Management Google Drive Transportation Google Apps Hotspot Tech Support Mirgation Monitors Hypervisor IBM IT Maintenance Optimization Business Intelligence Nanotechnology PowerPoint 5G Shopping Experience Addiction Google Docs Employer/Employee Relationships Shortcuts Language Websites Unified Communications Chatbots Bitcoin Navigation Running Cable PCI DSS Management Ransmoware SharePoint Vendors Screen Reader Google Wallet Distributed Denial of Service Electronic Medical Records Gig Economy Internet Service Provider Service Level Agreement Teamwork Competition Be Proactive Computing Infrastructure Workforce Identity Windows 8 Evernote Writing Laptop Regulations Compliance Lenovo Bookmark Memes Threats Smart Tech Drones Virtual Reality Net Neutrality Download Server Management SQL Server Workplace Strategies Alerts Private Cloud Meta Identity Theft User Halloween Financial Data Superfish History Browsers IT Amazon Connectivity Break Fix Twitter Smartwatch Procurement Upload Azure Error IP Address Outsource IT Hacks Tech Multi-Factor Security Social Engineering Scary Stories Telework Social Network Cyber security CES Communitications Environment IoT Media Dark Web Remote Computing Fun Supply Chain Management Trends Deep Learning Small Businesses Regulations Tablet Term Recovery Google Calendar FinTech Customer Resource management Data Analysis IT Assessment Displays Star Wars Hard Drives Microsoft Excel Alert Education Dark Data Flexibility Gamification Managed IT Value Domains Staff File Sharing Outsourcing Social Networking Mobile Computing Legislation How To Organization Digital Security Cameras Fileless Malware Smart Devices Refrigeration Notifications Search Best Practice Remote Working Content Memory Public Speaking Workplace Wearable Technology Travel Techology Data Breach Lithium-ion battery Hiring/Firing Motherboard Google Maps Google Play Comparison Buisness Health IT

Blog Archive