Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Adware Lawsuit Between Lenovo And FTC Settled

Adware Lawsuit Between Lenovo And FTC Settled

About two and a half years ago, Lenovo was brought under fire for manufacturing products that had adware preinstalled on them. This malware, a variant called Superfish, was installed on up to 750,000 Lenovo devices, and the company--eager to put this incident behind them--still refuses to admit fault, despite paying reparations and other fees as a result. Superfish allowed access to sensitive information and a root certificate, which could be used to access encrypted data on the same network. All in all, it was a rather embarrassing and dangerous scenario for Lenovo, and it comes with its fair share of consequences.

Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Hackers Cloud Email Malware Privacy Business Computing Internet Tech Term Computer Network Security Business Data Hosted Solutions IT Services Efficiency Innovation Software Data Backup Android Mobile Devices User Tips Smartphone Hardware Communication Browser Microsoft Google Windows 10 Business Management Small Business Workplace Tips Productivity Productivity Ransomware Artificial Intelligence Data Recovery Backup Gmail Data Management Facebook Smartphones IT Support Social Media Managed Service Provider Internet of Things App Saving Money Encryption Collaboration Two-factor Authentication Server Microsoft Office Information Cloud Computing Applications Business Technology communications Cybersecurity Miscellaneous Windows 10 Managed Service Automation Spam Windows Office 365 Office Tips Phishing Bandwidth Passwords Managed IT Services Disaster Recovery Mobile Device Upgrade Firewall BDR Blockchain Going Green Printer The Internet of Things Access Control WiFi Computing Big Data Social Infrastructure Employer-Employee Relationship Tip of the week Apps Paperless Office Users Government Scam IT Support BYOD Holiday Business Continuity Website Outsourced IT VoIP Mobile Device Management End of Support Cost Management Network Settings Safety HIPAA Printing Quick Tips Content Filtering Vendor Cybercrime Wi-Fi Mobile Security Risk Management Data storage LiFi Customer Service Saving Time Analytics Hacking Computers Money Antivirus Chrome Augmented Reality Presentation Document Management Hacker Maintenance Office Wireless Technology Storage Data Security Sports Mouse Bring Your Own Device Apple Vulnerability Administration Robot Staff Black Friday Current Events Remote Monitoring Buisness Google Play Save Money Refrigeration Gamification Public Speaking Telephone System Social Networking Legal VPN IT solutions Machine Learning Business Growth Lithium-ion battery Fileless Malware User Error Entrepreneur Wearable Technology Cyber Monday IT Management Security Cameras Vendor Management Content Cortana Health IT Motherboard Virtual Private Network Error Alt Codes Google Maps Directions Network Congestion Assessment Permissions Smart Technology Downtime Electronic Medical Records Wireless Undo Router Operating System Hosted Solution Typing Microchip Display Internet Exlporer Fraud Distributed Denial of Service Network Management YouTube Virtual Reality Virtualization Username Travel Knowledge User Tip Modem Google Drive SharePoint Cryptocurrency Processor Monitors Application Database IT Technicians Managed IT Service Information Technology Remote Computing 5G Unified Threat Management Experience IBM Proxy Server Cookies Gadgets Google Docs Lenovo Unified Communications Downloads Bitcoin Running Cable Navigation Tactics Hotspot Mirgation Break Fix Google Wallet Virtual Desktop Alert Monitoring Customer Relationship Management Help Desk Nanotechnology Superfish Multi-Factor Security Windows 8 Laptop Evernote Writing Addiction Language Chatbots Drones Server Management Competition Management Screen Reader Outlook Google Calendar Managed IT Services Halloween Healthcare Retail Service Level Agreement Computing Infrastructure Conferencing Identity Bookmark User Smart Tech Humor Networking Alerts Legislation Hacks Scary Stories Tech Social Engineering Download Telephone Budget Fun Identity Theft IP Address Browsers Avoiding Downtime Connectivity Deep Learning Licensing Comparison Password Data loss Term Upload Social Network Compliance Patch Management Education Tech Support Mobile Office Entertainment Dark Data Recovery IoT Marketing Dark Web Techology Cooperation Specifications Mobile Computing Mobility How To Hard Drives Trends Search Domains Customer Resource management Word Regulations Websites Best Practice Tablet Data Analysis Star Wars Microsoft Excel Unified Threat Management

Sign Up For Our Newsletter!