Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Adware Lawsuit Between Lenovo And FTC Settled

Adware Lawsuit Between Lenovo And FTC Settled

About two and a half years ago, Lenovo was brought under fire for manufacturing products that had adware preinstalled on them. This malware, a variant called Superfish, was installed on up to 750,000 Lenovo devices, and the company--eager to put this incident behind them--still refuses to admit fault, despite paying reparations and other fees as a result. Superfish allowed access to sensitive information and a root certificate, which could be used to access encrypted data on the same network. All in all, it was a rather embarrassing and dangerous scenario for Lenovo, and it comes with its fair share of consequences.

The Federal Trade Commission has finally declared a sentence for Lenovo, following this debacle. Lenovo must now notify all of their customers about the software that is preinstalled on any purchased devices, and retrieve the user’s consent. Furthermore, the company must allow security audits for the next 20 years, as well as pay $3.5 million in penalties and reparations. However, Lenovo continues to deny any fault in the matter, claiming that there are no instances of a third party actually exploiting this vulnerability to gain access to sensitive information or root access. These consequences feel like a slap in the face for those who felt wronged by Lenovo, but it’s better than nothing.

In the meantime, you need to make sure that your devices aren’t preloaded with Superfish--especially if you bought a device before 2014 and haven’t gone through the Superfish removal process. Furthermore, you should always be careful when buying new devices or technology, particularly if the devices are used. However, this incident shows that even brand new devices can potentially contain flaws, so it’s best to reach out to your IT provider, should you have any questions regarding the integrity of any technology purchases.

Voyage Technology can provide your business with a network audit to determine just what kinds of security vulnerabilities you’re dealing with. We can then implement solutions to keep your business secure. Furthermore, we can remote into your devices and remove any issues that we encounter without an on-site visit.

Do you need a hand with network security? Voyage Technology has got you covered. To learn more about how we can help your business, reach out to us at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 11 June 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Hardware Internet Efficiency IT Support Privacy Malware Google Email Computer Phishing Workplace Tips IT Services Users Collaboration Hosted Solutions Mobile Device Workplace Strategy Ransomware Quick Tips Cybersecurity Small Business Microsoft Communication Passwords Data Backup Saving Money Smartphone Backup Managed Service Business Management VoIP Smartphones Android Upgrade Mobile Devices communications Disaster Recovery Browser Data Recovery Managed IT Services Social Media Windows Microsoft Office Tech Term Current Events Remote Network Internet of Things Productivity Artificial Intelligence Facebook Automation Cloud Computing AI Covid-19 Gadgets Managed Service Provider Remote Work Miscellaneous Server Holiday Outsourced IT Information Training Compliance Employee/Employer Relationship Encryption Spam Windows 10 Office Government Business Continuity Data Management Bandwidth Windows 10 Virtualization Business Technology Blockchain Wi-Fi IT Support Apps Vendor Two-factor Authentication Data Security Mobile Office Chrome Mobile Device Management BYOD Budget Gmail Apple App Employer-Employee Relationship Managed Services Networking Voice over Internet Protocol Conferencing Access Control WiFi Tip of the week Computing HIPAA Hacker Information Technology How To Applications BDR Avoiding Downtime Marketing Office 365 Analytics Office Tips Help Desk Augmented Reality Storage Virtual Private Network Password Bring Your Own Device Health Big Data Retail Operating System Router Computers Managed IT Services Risk Management Healthcare Website Free Resource Remote Monitoring Monitoring Vulnerability End of Support Project Management Windows 7 Vendor Management Firewall Microsoft 365 Physical Security Display Printer Solutions Telephone Paperless Office The Internet of Things Infrastructure Social Cooperation Document Management Going Green Cybercrime Windows 11 Scam Customer Service Data loss 2FA Remote Workers Excel Patch Management Save Money Outlook Smart Technology Word Money Images 101 Humor IT Management VPN Saving Time Mobility Meetings Multi-Factor Authentication Data Privacy Managed IT Service Sports Safety Computer Repair Mouse Downloads Employees Administration Integration Licensing Entertainment Machine Learning Holidays Data Storage Settings Telephone System Wireless Cost Management Customer Relationship Management Printing Video Conferencing Content Filtering Maintenance Managed Services Provider Antivirus Professional Services YouTube Virtual Machines Hacking Presentation Cryptocurrency Supply Chain Modem Wireless Technology User Tip Processor iPhone Mobile Security Virtual Desktop LiFi Data storage Robot Vulnerabilities Mirgation Hard Drives Supply Chain Management Technology Care Term Unified Threat Management Nanotechnology Domains FinTech Halloween Business Communications IT Assessment Scams Unified Threat Management Addiction Language Chatbots Refrigeration Flexibility Hybrid Work Value Management Screen Reader Public Speaking Network Congestion Hacks Distributed Denial of Service Organization Scary Stories Human Resources Smart Devices Cables Fun User Error Service Level Agreement Lithium-ion battery Computing Infrastructure Digital Security Cameras Identity Deep Learning Entrepreneur Remote Working Memory Google Apps Bookmark Google Play Point of Sale Smart Tech Data Breach Education Electronic Health Records IT Maintenance Download Alerts Videos Tech Support Undo Business Intelligence Wasting Time Network Management Shortcuts Browsers Security Cameras Connectivity Monitors Mobile Computing Break Fix Trend Micro Software as a Service Ransmoware Search Upload Websites Best Practice Multi-Factor Security Vendors Managing Costs Social Network Be Proactive SSID IoT Dark Web Buisness eCommerce IT solutions Surveillance Workforce SharePoint Virtual Assistant Trends Electronic Medical Records Legal Application Regulations Business Growth Google Calendar Threats Virtual Machine Customer Resource management Workplace Strategies Lenovo Data Analysis Medical IT Star Wars IBM Writing Microsoft Excel Reviews Development Meta Cortana Transportation Gamification Virtual Reality Staff Private Cloud Social Networking Alt Codes Legislation Amazon Hypervisor Server Management Superfish Fileless Malware PowerPoint Identity Theft Shopping Downtime Optimization Hosted Solution Outsource IT Employer/Employee Relationships Content Twitter Wearable Technology Error Motherboard Competition Typing Comparison PCI DSS Environment Media Health IT Navigation Directions Assessment Social Engineering Permissions Gig Economy Internet Service Provider Small Businesses Knowledge Teamwork Remote Computing Google Drive Specifications Regulations Compliance Displays Evernote Memes 5G Microchip Tablet Internet Exlporer Fraud User Unified Communications Net Neutrality Outsourcing Experience SQL Server Username Alert Google Docs File Sharing Dark Data Bitcoin Black Friday Financial Data Running Cable History Managed IT IT Workplace Database IP Address How To Google Wallet Smartwatch Procurement Hiring/Firing Azure Notifications IT Technicians Proxy Server Tech Travel Cookies Windows 8 Cyber Monday Telework Laptop Cyber security Paperless Communitications Co-managed IT Techology Google Maps Tactics Drones Hotspot Recovery CES

Blog Archive