Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Adware Lawsuit Between Lenovo And FTC Settled

Adware Lawsuit Between Lenovo And FTC Settled

About two and a half years ago, Lenovo was brought under fire for manufacturing products that had adware preinstalled on them. This malware, a variant called Superfish, was installed on up to 750,000 Lenovo devices, and the company--eager to put this incident behind them--still refuses to admit fault, despite paying reparations and other fees as a result. Superfish allowed access to sensitive information and a root certificate, which could be used to access encrypted data on the same network. All in all, it was a rather embarrassing and dangerous scenario for Lenovo, and it comes with its fair share of consequences.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Business Computing Best Practices Productivity Data Software Hackers Innovation Business Network Security Cloud IT Support Hardware Internet User Tips Malware Email Efficiency Phishing Privacy Workplace Tips Computer Google Collaboration Hosted Solutions Users IT Services Cybersecurity Quick Tips Ransomware Data Backup Microsoft Small Business Communication Smartphones Mobile Device communications Android Business Management Workplace Strategy Mobile Devices Smartphone VoIP Saving Money Managed IT Services Microsoft Office Browser Managed Service Data Recovery Social Media Passwords Upgrade Backup Disaster Recovery Network Internet of Things Tech Term Automation Covid-19 Remote Cloud Computing Managed Service Provider Remote Work Artificial Intelligence Server Facebook Miscellaneous Windows Gadgets Spam Encryption Holiday Windows 10 Information Employee/Employer Relationship Outsourced IT Data Management Business Continuity Government Wi-Fi Windows 10 Blockchain Business Technology Productivity Compliance Two-factor Authentication Virtualization Bandwidth Apps Data Security Current Events Mobile Device Management Gmail Vendor Chrome Budget Employer-Employee Relationship Networking Managed Services Apple Voice over Internet Protocol Office App Computing Information Technology Access Control Office 365 Applications How To BDR Hacker Conferencing Avoiding Downtime Mobile Office Operating System Virtual Private Network Training Health Risk Management WiFi Router Analytics Office Tips Retail Big Data Augmented Reality Storage Password Managed IT Services Help Desk Bring Your Own Device Computers BYOD Website Marketing Windows 7 Cybercrime Display Cooperation Printer Microsoft 365 Firewall Paperless Office AI Infrastructure Solutions Tip of the week Document Management The Internet of Things HIPAA IT Support Social Scam Data loss Monitoring Customer Service Windows 11 Remote Workers Patch Management Save Money Healthcare Remote Monitoring Vulnerability Excel End of Support Going Green Vendor Management Telephone Free Resource Project Management Images 101 Content Filtering Word Entertainment Multi-Factor Authentication Computer Repair Mobility YouTube Cryptocurrency Data Privacy Telephone System Cost Management Safety Virtual Desktop Employees Data storage Machine Learning Integration LiFi Outlook Maintenance Holidays Money Antivirus User Tip Humor Modem Mobile Security Processor Data Storage Video Conferencing Customer Relationship Management Sports Managed Services Provider Virtual Machines Mouse Professional Services Smart Technology Hacking Administration Saving Time 2FA Presentation Robot Supply Chain iPhone Wireless Technology Managed IT Service IT Management Vulnerabilities Downloads Settings VPN Meetings Printing Licensing Wireless Technology Care Social Network IT Assessment Hard Drives Hosted Solution Multi-Factor Security Dark Web Flexibility Point of Sale Business Communications IoT Value Domains Typing Trends Organization Scams Digital Security Cameras Network Management Hybrid Work Customer Resource management Smart Devices Google Drive Tech Support Regulations Refrigeration Google Calendar Knowledge Microsoft Excel Data Analysis Remote Working Human Resources Star Wars Memory Public Speaking Monitors Cables Gamification Data Breach Lithium-ion battery Staff Google Play 5G Videos Electronic Health Records Google Docs Websites Social Networking Unified Communications Legislation Entrepreneur Experience Running Cable Fileless Malware Google Apps Wasting Time Bitcoin IT Maintenance Content Trend Micro Google Wallet Electronic Medical Records Wearable Technology Security Cameras SharePoint Business Intelligence Health IT Software as a Service Motherboard Undo Comparison Writing Permissions Laptop Lenovo Directions Shortcuts Assessment Managing Costs Windows 8 Ransmoware eCommerce Drones Virtual Reality SSID Server Management Vendors Surveillance Private Cloud Virtual Assistant Specifications Fraud Halloween Superfish Microchip Identity Theft Be Proactive Internet Exlporer Virtual Machine Workforce Username Twitter Medical IT Application Reviews Threats Development Error Transportation Black Friday Hacks Social Engineering Scary Stories Workplace Strategies Database Hypervisor IBM Meta Optimization Remote Computing IT Technicians PowerPoint Fun Shopping Amazon Proxy Server Cookies Employer/Employee Relationships Deep Learning Cyber Monday Hotspot Navigation PCI DSS Tablet Tactics Outsource IT Alert Mirgation Education Gig Economy Managed IT Environment Internet Service Provider File Sharing Media Nanotechnology Teamwork Competition Dark Data Mobile Computing How To Language Evernote Regulations Compliance Addiction Small Businesses Management Memes Notifications Chatbots Search Displays Net Neutrality Travel Screen Reader SQL Server Best Practice Distributed Denial of Service History Computing Infrastructure User Buisness Techology Financial Data Google Maps Service Level Agreement Smartwatch Outsourcing IT Legal Identity IT solutions Bookmark Procurement Unified Threat Management Smart Tech Azure Business Growth Download Cyber security IP Address Alerts Tech Unified Threat Management Telework Workplace CES Hiring/Firing Communitications Cortana Break Fix Browsers Supply Chain Management Paperless Connectivity Alt Codes Network Congestion Upload Physical Security Term Recovery Downtime User Error FinTech Co-managed IT

Blog Archive