Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Adware Lawsuit Between Lenovo And FTC Settled

Adware Lawsuit Between Lenovo And FTC Settled

About two and a half years ago, Lenovo was brought under fire for manufacturing products that had adware preinstalled on them. This malware, a variant called Superfish, was installed on up to 750,000 Lenovo devices, and the company--eager to put this incident behind them--still refuses to admit fault, despite paying reparations and other fees as a result. Superfish allowed access to sensitive information and a root certificate, which could be used to access encrypted data on the same network. All in all, it was a rather embarrassing and dangerous scenario for Lenovo, and it comes with its fair share of consequences.

The Federal Trade Commission has finally declared a sentence for Lenovo, following this debacle. Lenovo must now notify all of their customers about the software that is preinstalled on any purchased devices, and retrieve the user’s consent. Furthermore, the company must allow security audits for the next 20 years, as well as pay $3.5 million in penalties and reparations. However, Lenovo continues to deny any fault in the matter, claiming that there are no instances of a third party actually exploiting this vulnerability to gain access to sensitive information or root access. These consequences feel like a slap in the face for those who felt wronged by Lenovo, but it’s better than nothing.

In the meantime, you need to make sure that your devices aren’t preloaded with Superfish--especially if you bought a device before 2014 and haven’t gone through the Superfish removal process. Furthermore, you should always be careful when buying new devices or technology, particularly if the devices are used. However, this incident shows that even brand new devices can potentially contain flaws, so it’s best to reach out to your IT provider, should you have any questions regarding the integrity of any technology purchases.

Voyage Technology can provide your business with a network audit to determine just what kinds of security vulnerabilities you’re dealing with. We can then implement solutions to keep your business secure. Furthermore, we can remote into your devices and remove any issues that we encounter without an on-site visit.

Do you need a hand with network security? Voyage Technology has got you covered. To learn more about how we can help your business, reach out to us at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 22 October 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Hackers Cloud Network Security Hardware User Tips Efficiency Internet Malware IT Support Privacy Google Phishing Workplace Tips Computer Email Collaboration IT Services Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Passwords Backup Quick Tips Cybersecurity Saving Money Communication Data Backup Smartphone Managed Service Productivity Android Upgrade Business Management Smartphones VoIP Data Recovery communications Mobile Devices Disaster Recovery Social Media Windows Browser Microsoft Office AI Managed IT Services Network Current Events Remote Tech Term Internet of Things Information Artificial Intelligence Facebook Automation Cloud Computing Covid-19 Holiday Miscellaneous Gadgets Server Managed Service Provider Remote Work Training Outsourced IT Encryption Compliance Employee/Employer Relationship Spam Office IT Support Windows 10 Government Data Management Business Continuity Wi-Fi Blockchain Windows 10 Bandwidth Virtualization Business Technology Data Security Mobile Office Two-factor Authentication Vendor Apps Networking Mobile Device Management BYOD Gmail Chrome Budget Tip of the week Apple Employer-Employee Relationship Managed Services Voice over Internet Protocol App Hacker How To BDR Computing Avoiding Downtime Information Technology Marketing HIPAA Office 365 Applications WiFi Access Control Conferencing Computers Managed IT Services Operating System Website 2FA Risk Management Router Office Tips Analytics Virtual Private Network Augmented Reality Health Storage Password Big Data Help Desk Bring Your Own Device Retail Healthcare Going Green Customer Service Scam Data loss Cooperation Free Resource Cybercrime Project Management Windows 11 Windows 7 Patch Management Save Money Microsoft 365 Remote Monitoring End of Support Vulnerability Excel Vendor Management Solutions Firewall Physical Security Display Printer The Internet of Things Paperless Office Infrastructure Monitoring Social Document Management Remote Workers Telephone iPhone Licensing Hacking Presentation Settings Printing Vulnerabilities Wireless Entertainment Content Filtering Wireless Technology YouTube Images 101 Robot Mobility Telephone System Multi-Factor Authentication Cryptocurrency Cost Management Supply Chain Word Virtual Desktop IT Management Data storage LiFi VPN Employees Meetings Integration Outlook User Tip Modem Money Computer Repair Mobile Security Safety Processor Humor Holidays Data Storage Data Privacy Smart Technology Sports Video Conferencing Mouse Machine Learning Managed Services Provider Professional Services Saving Time Virtual Machines Administration Managed IT Service Customer Relationship Management Maintenance Downloads Antivirus Connectivity IT Workplace Strategies Social Engineering Break Fix Browsers Smartwatch Upload Procurement Meta Remote Computing Azure Cortana Multi-Factor Security Tech Social Network Telework Amazon Cyber security Alt Codes Tablet IoT Communitications Dark Web Downtime User CES Trends Supply Chain Management Outsource IT Alert Hosted Solution Dark Data Google Calendar Term Managed IT Customer Resource management FinTech Environment File Sharing Regulations Media Typing Star Wars IT Assessment How To Microsoft Excel IP Address Data Analysis Gamification Flexibility Small Businesses Google Drive Notifications Staff Value Knowledge Legislation Organization Displays Travel Social Networking Google Maps Smart Devices Recovery 5G Techology Fileless Malware Digital Security Cameras Content Remote Working Outsourcing Google Docs Wearable Technology Memory Unified Communications Hard Drives Experience Bitcoin Comparison Google Play Domains Running Cable Health IT Unified Threat Management Motherboard Data Breach Assessment Electronic Health Records Workplace Google Wallet Permissions Unified Threat Management Directions Videos Hiring/Firing Wasting Time Refrigeration Windows 8 Network Congestion Specifications Security Cameras Public Speaking Laptop Trend Micro Paperless Internet Exlporer Software as a Service Co-managed IT Drones Fraud Lithium-ion battery User Error Microchip Entrepreneur Username Technology Care Managing Costs Black Friday SSID Halloween Point of Sale eCommerce Business Communications Database Surveillance Scams Virtual Assistant Network Management Hybrid Work Tech Support IT Technicians Virtual Machine Undo Hacks Monitors Cyber Monday Medical IT Scary Stories Proxy Server Reviews Cookies Human Resources Tactics Development Cables Hotspot Transportation Fun Websites Mirgation Hypervisor Deep Learning PowerPoint Shopping Nanotechnology Optimization Google Apps Addiction IT Maintenance Electronic Medical Records Language Employer/Employee Relationships Education Application SharePoint Management PCI DSS Business Intelligence Chatbots Navigation Shortcuts Mobile Computing Writing Distributed Denial of Service IBM Lenovo Gig Economy Screen Reader Service Level Agreement Internet Service Provider Ransmoware Virtual Reality Computing Infrastructure Teamwork Search Server Management Regulations Compliance Vendors Private Cloud Identity Best Practice Evernote Identity Theft Smart Tech Memes Be Proactive Buisness Superfish Bookmark Download Net Neutrality Workforce Legal Twitter Alerts SQL Server IT solutions Competition Financial Data Threats Error History Business Growth

Blog Archive