Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Adware Lawsuit Between Lenovo And FTC Settled

Adware Lawsuit Between Lenovo And FTC Settled

About two and a half years ago, Lenovo was brought under fire for manufacturing products that had adware preinstalled on them. This malware, a variant called Superfish, was installed on up to 750,000 Lenovo devices, and the company--eager to put this incident behind them--still refuses to admit fault, despite paying reparations and other fees as a result. Superfish allowed access to sensitive information and a root certificate, which could be used to access encrypted data on the same network. All in all, it was a rather embarrassing and dangerous scenario for Lenovo, and it comes with its fair share of consequences.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Backup Quick Tips Passwords Saving Money Communication Cybersecurity Smartphone Productivity Data Backup Managed Service Android Upgrade AI Business Management VoIP Smartphones Data Recovery Mobile Devices communications Disaster Recovery Windows Browser Social Media Managed IT Services Microsoft Office Current Events Network Remote Tech Term Internet of Things Artificial Intelligence Information Facebook Automation Covid-19 Miscellaneous Gadgets Cloud Computing Holiday Training Remote Work Server Managed Service Provider Outsourced IT Compliance IT Support Employee/Employer Relationship Encryption Spam Office Windows 10 Data Management Business Continuity Government Blockchain Windows 10 Bandwidth Virtualization Wi-Fi Business Technology Vendor Data Security Apps Two-factor Authentication Mobile Office Mobile Device Management Tip of the week Chrome Gmail Budget Apple Networking App Employer-Employee Relationship Managed Services BYOD Voice over Internet Protocol HIPAA Applications WiFi How To BDR Conferencing Computing Hacker Information Technology Avoiding Downtime Access Control Marketing Office 365 Analytics Office Tips Augmented Reality Retail Storage Router Password Bring Your Own Device Managed IT Services Big Data 2FA Help Desk Operating System Computers Healthcare Risk Management Virtual Private Network Website Health Microsoft 365 Firewall Document Management Solutions The Internet of Things Scam Data loss Social Windows 11 Monitoring Going Green Patch Management Save Money Excel Remote Monitoring End of Support Vulnerability Customer Service Vendor Management Remote Workers Cybercrime Telephone Physical Security Display Printer Paperless Office Cooperation Free Resource Infrastructure Project Management Windows 7 Outlook Telephone System Multi-Factor Authentication Mobility Cost Management Machine Learning Money Humor Safety Employees Maintenance Antivirus Sports Integration Mouse User Tip Modem Processor Mobile Security Administration Holidays Data Storage Smart Technology Supply Chain Robot Video Conferencing Managed Services Provider Customer Relationship Management Saving Time Virtual Machines Settings Professional Services Wireless Printing Content Filtering Hacking IT Management Managed IT Service YouTube Meetings Presentation VPN Downloads Cryptocurrency iPhone Licensing Wireless Technology Computer Repair Entertainment Vulnerabilities Virtual Desktop Data Privacy Data storage LiFi Images 101 Word SharePoint Organization Social Networking Electronic Medical Records Legislation Shortcuts Fileless Malware Digital Security Cameras Refrigeration Smart Devices Halloween Ransmoware Wearable Technology Memory Vendors Writing Public Speaking Lenovo Content Remote Working Lithium-ion battery Health IT Motherboard Data Breach Virtual Reality Comparison Google Play Be Proactive Directions Videos Hacks Server Management Assessment Electronic Health Records Entrepreneur Scary Stories Private Cloud Permissions Workforce Identity Theft Wasting Time Threats Fun Superfish Deep Learning Trend Micro Twitter Specifications Security Cameras Workplace Strategies Microchip Undo Internet Exlporer Software as a Service Error Fraud Meta Education Managing Costs Amazon Social Engineering Username eCommerce Remote Computing Black Friday SSID Mobile Computing Database Surveillance Virtual Assistant Outsource IT Tablet IT Technicians Virtual Machine Environment Search Media Proxy Server Reviews Application Best Practice Cookies Alert Cyber Monday Medical IT Hotspot Transportation Small Businesses Dark Data Managed IT Tactics Development Buisness File Sharing IT solutions Mirgation Hypervisor Displays How To IBM Legal Shopping Business Growth Nanotechnology Optimization Notifications PowerPoint Language Employer/Employee Relationships Outsourcing Addiction Travel Techology Management PCI DSS Google Maps Chatbots Cortana Navigation Gig Economy Alt Codes Screen Reader Distributed Denial of Service Workplace Downtime Unified Threat Management Computing Infrastructure Teamwork Hiring/Firing Competition Service Level Agreement Internet Service Provider Unified Threat Management Regulations Compliance Hosted Solution Identity Evernote Paperless Bookmark Typing Smart Tech Memes Co-managed IT Alerts SQL Server Technology Care Network Congestion Download Net Neutrality Google Drive User Error Financial Data User History Knowledge Business Communications Browsers Smartwatch Connectivity IT Break Fix Scams Point of Sale Azure Hybrid Work 5G Upload Procurement IP Address Google Docs Social Network Telework Unified Communications Cyber security Experience Multi-Factor Security Tech Human Resources CES Bitcoin Network Management IoT Communitications Running Cable Tech Support Dark Web Cables Monitors Google Wallet Trends Supply Chain Management Customer Resource management FinTech Recovery Regulations Google Calendar Term Google Apps Data Analysis Hard Drives Windows 8 Star Wars IT Assessment Laptop Websites Microsoft Excel IT Maintenance Staff Value Business Intelligence Domains Drones Gamification Flexibility

Blog Archive