Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Adware Lawsuit Between Lenovo And FTC Settled

Adware Lawsuit Between Lenovo And FTC Settled

About two and a half years ago, Lenovo was brought under fire for manufacturing products that had adware preinstalled on them. This malware, a variant called Superfish, was installed on up to 750,000 Lenovo devices, and the company--eager to put this incident behind them--still refuses to admit fault, despite paying reparations and other fees as a result. Superfish allowed access to sensitive information and a root certificate, which could be used to access encrypted data on the same network. All in all, it was a rather embarrassing and dangerous scenario for Lenovo, and it comes with its fair share of consequences.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Google Phishing Email Workplace Tips Computer IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Productivity Backup Passwords Quick Tips Cybersecurity Saving Money Communication Managed Service Data Backup Smartphone Android Upgrade VoIP Business Management AI Smartphones Data Recovery Mobile Devices Disaster Recovery communications Windows Social Media Browser Microsoft Office Managed IT Services Current Events Network Tech Term Remote Internet of Things Artificial Intelligence Automation Facebook Miscellaneous Information Cloud Computing Holiday Training Gadgets Covid-19 Remote Work Server Managed Service Provider Compliance Outsourced IT IT Support Employee/Employer Relationship Encryption Spam Office Windows 10 Government Business Continuity Data Management Bandwidth Windows 10 Business Technology Virtualization Wi-Fi Blockchain Data Security Mobile Office Vendor Apps Two-factor Authentication Chrome Budget BYOD Managed Services Apple Voice over Internet Protocol Mobile Device Management App Gmail Tip of the week Employer-Employee Relationship Networking Applications How To Office 365 BDR Hacker Avoiding Downtime Marketing Conferencing Access Control WiFi Computing Information Technology HIPAA Analytics Office Tips Augmented Reality Computers 2FA Help Desk Storage Password Website Bring Your Own Device Virtual Private Network Healthcare Health Operating System Retail Big Data Risk Management Router Managed IT Services Customer Service Patch Management Windows 11 Save Money Remote Monitoring Monitoring End of Support Vulnerability Vendor Management Excel Physical Security Display Remote Workers Printer Telephone Firewall Paperless Office Infrastructure Going Green Cooperation Free Resource Project Management The Internet of Things Windows 7 Document Management Cybercrime Microsoft 365 Social Scam Solutions Data loss User Tip Modem Outlook Processor Mobile Security Hacking Robot Money Holidays Presentation Humor Data Storage Wireless Technology Smart Technology Supply Chain Video Conferencing Sports Managed Services Provider IT Management Mouse Saving Time Virtual Machines VPN Professional Services Meetings Administration Managed IT Service Word Computer Repair Downloads iPhone Licensing Entertainment Vulnerabilities Settings Data Privacy Safety Printing Wireless Machine Learning Images 101 Content Filtering Telephone System YouTube Multi-Factor Authentication Mobility Cost Management Maintenance Cryptocurrency Antivirus Employees Virtual Desktop Data storage LiFi Customer Relationship Management Integration Laptop Managing Costs Amazon Alert Windows 8 Username Dark Data Drones eCommerce Competition Managed IT Black Friday SSID File Sharing How To Database Surveillance Virtual Assistant Outsource IT Halloween IT Technicians Virtual Machine Environment Media Notifications Proxy Server Reviews Cookies Cyber Monday Medical IT Travel User Google Maps Tactics Development Techology Hotspot Transportation Small Businesses Scary Stories Mirgation Hypervisor Displays Hacks Shopping Nanotechnology Optimization Fun PowerPoint Unified Threat Management Deep Learning Addiction IP Address Unified Threat Management Language Employer/Employee Relationships Outsourcing Chatbots Navigation Management PCI DSS Network Congestion Gig Economy Education Screen Reader Distributed Denial of Service Workplace Recovery Service Level Agreement Internet Service Provider User Error Computing Infrastructure Teamwork Hiring/Firing Mobile Computing Regulations Compliance Identity Hard Drives Evernote Paperless Bookmark Smart Tech Memes Domains Search Co-managed IT Point of Sale Alerts SQL Server Technology Care Best Practice Download Net Neutrality Financial Data Buisness History Refrigeration Network Management Business Communications Tech Support Monitors Legal Browsers Smartwatch IT solutions Connectivity IT Public Speaking Break Fix Scams Azure Hybrid Work Business Growth Upload Procurement Lithium-ion battery Social Network Telework Cyber security Multi-Factor Security Tech Human Resources Entrepreneur Websites CES IoT Communitications Cortana Dark Web Cables Electronic Medical Records Alt Codes Trends Supply Chain Management SharePoint Customer Resource management FinTech Downtime Regulations Undo Google Calendar Term Google Apps Writing Data Analysis Hosted Solution Star Wars IT Assessment Lenovo Microsoft Excel IT Maintenance Staff Value Business Intelligence Virtual Reality Typing Gamification Flexibility Organization Social Networking Server Management Legislation Shortcuts Private Cloud Google Drive Fileless Malware Digital Security Cameras Smart Devices Superfish Knowledge Ransmoware Identity Theft Wearable Technology Memory Vendors Application Twitter Content Remote Working Health IT Motherboard Data Breach 5G Comparison Google Play Be Proactive Error Social Engineering Google Docs Directions Videos Unified Communications Assessment Electronic Health Records IBM Experience Permissions Workforce Running Cable Wasting Time Threats Remote Computing Bitcoin Google Wallet Trend Micro Specifications Security Cameras Workplace Strategies Tablet Microchip Internet Exlporer Software as a Service Fraud Meta

Blog Archive