Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Adware Lawsuit Between Lenovo And FTC Settled

Adware Lawsuit Between Lenovo And FTC Settled

About two and a half years ago, Lenovo was brought under fire for manufacturing products that had adware preinstalled on them. This malware, a variant called Superfish, was installed on up to 750,000 Lenovo devices, and the company--eager to put this incident behind them--still refuses to admit fault, despite paying reparations and other fees as a result. Superfish allowed access to sensitive information and a root certificate, which could be used to access encrypted data on the same network. All in all, it was a rather embarrassing and dangerous scenario for Lenovo, and it comes with its fair share of consequences.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Passwords Backup Quick Tips Saving Money Cybersecurity Communication Productivity Smartphone Managed Service Data Backup Android Upgrade AI Business Management VoIP Smartphones Data Recovery communications Mobile Devices Windows Disaster Recovery Browser Social Media Microsoft Office Managed IT Services Current Events Network Internet of Things Remote Tech Term Information Artificial Intelligence Facebook Automation Cloud Computing Holiday Training Covid-19 Miscellaneous Gadgets Server Managed Service Provider Remote Work Compliance Outsourced IT IT Support Employee/Employer Relationship Encryption Spam Office Windows 10 Government Data Management Business Continuity Wi-Fi Blockchain Windows 10 Bandwidth Virtualization Business Technology Data Security Two-factor Authentication Mobile Office Vendor Apps Networking Managed Services Voice over Internet Protocol Mobile Device Management BYOD Chrome Gmail Budget Apple Tip of the week App Employer-Employee Relationship Computing Hacker How To Information Technology BDR Avoiding Downtime Marketing Office 365 HIPAA Applications Access Control WiFi Conferencing Computers Managed IT Services Risk Management Healthcare Website Office Tips Analytics Router Augmented Reality Virtual Private Network Storage Password Health Bring Your Own Device Help Desk Big Data Retail 2FA Operating System Cooperation Remote Workers Patch Management Save Money Remote Monitoring Vulnerability End of Support Vendor Management Free Resource Project Management Firewall Windows 7 Physical Security Display Microsoft 365 Printer Paperless Office The Internet of Things Solutions Infrastructure Monitoring Social Document Management Going Green Windows 11 Telephone Scam Customer Service Cybercrime Excel Data loss Presentation Virtual Machines YouTube Professional Services Entertainment Cryptocurrency Wireless Technology Robot Virtual Desktop iPhone Telephone System Cost Management Data storage LiFi Word Vulnerabilities Outlook Data Privacy IT Management VPN Images 101 Meetings Money Humor Multi-Factor Authentication Mobility User Tip Modem Processor Safety Computer Repair Mobile Security Sports Mouse Employees Smart Technology Administration Integration Machine Learning Saving Time Holidays Customer Relationship Management Managed IT Service Settings Maintenance Data Storage Printing Downloads Supply Chain Wireless Antivirus Video Conferencing Content Filtering Managed Services Provider Licensing Hacking Gig Economy Multi-Factor Security Workplace Social Network Tablet IoT Google Drive Internet Service Provider Dark Web User Teamwork Hiring/Firing Knowledge Evernote Paperless Trends Regulations Compliance Alert File Sharing Regulations Memes Dark Data Google Calendar Co-managed IT 5G Managed IT Customer Resource management Data Analysis Star Wars IP Address Google Docs Net Neutrality How To Microsoft Excel Unified Communications SQL Server Technology Care Experience Bitcoin History Running Cable Business Communications Gamification Financial Data Notifications Staff Smartwatch Travel Social Networking Google Wallet IT Legislation Scams Techology Fileless Malware Google Maps Procurement Recovery Azure Hybrid Work Hard Drives Windows 8 Cyber security Laptop Tech Human Resources Content Telework Wearable Technology Health IT CES Unified Threat Management Motherboard Domains Drones Communitications Comparison Cables Unified Threat Management Directions Assessment Supply Chain Management Permissions Refrigeration Halloween Term Google Apps FinTech Public Speaking IT Assessment Network Congestion Specifications IT Maintenance User Error Microchip Internet Exlporer Lithium-ion battery Flexibility Fraud Value Business Intelligence Hacks Entrepreneur Scary Stories Shortcuts Username Organization Digital Security Cameras Point of Sale Smart Devices Black Friday Ransmoware Fun Database Remote Working Deep Learning Memory Vendors Tech Support IT Technicians Undo Data Breach Google Play Be Proactive Network Management Proxy Server Videos Cookies Electronic Health Records Monitors Cyber Monday Education Workforce Wasting Time Threats Tactics Hotspot Websites Mirgation Mobile Computing Trend Micro Security Cameras Workplace Strategies Nanotechnology Software as a Service Meta Search Managing Costs Amazon SharePoint Addiction Electronic Medical Records Language Application Best Practice Chatbots eCommerce Buisness SSID Management Lenovo Screen Reader IBM Legal Surveillance Writing Distributed Denial of Service IT solutions Virtual Assistant Outsource IT Virtual Machine Environment Media Service Level Agreement Virtual Reality Computing Infrastructure Business Growth Reviews Private Cloud Identity Medical IT Server Management Superfish Bookmark Identity Theft Smart Tech Development Transportation Small Businesses Cortana Hypervisor Displays Download Twitter Alerts Alt Codes Shopping Error Competition Optimization Downtime PowerPoint Browsers Connectivity Social Engineering Break Fix Hosted Solution Employer/Employee Relationships Outsourcing Navigation Upload PCI DSS Remote Computing Typing

Blog Archive