Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Adware Lawsuit Between Lenovo And FTC Settled

Adware Lawsuit Between Lenovo And FTC Settled

About two and a half years ago, Lenovo was brought under fire for manufacturing products that had adware preinstalled on them. This malware, a variant called Superfish, was installed on up to 750,000 Lenovo devices, and the company--eager to put this incident behind them--still refuses to admit fault, despite paying reparations and other fees as a result. Superfish allowed access to sensitive information and a root certificate, which could be used to access encrypted data on the same network. All in all, it was a rather embarrassing and dangerous scenario for Lenovo, and it comes with its fair share of consequences.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Services IT Support Privacy Workplace Tips Google Email Computer Phishing Workplace Strategy Collaboration Hosted Solutions Small Business Users Backup Ransomware Mobile Device Productivity Microsoft Managed Service Quick Tips Saving Money Communication Passwords Cybersecurity Smartphone Data Backup Disaster Recovery Data Recovery AI Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Information Facebook Miscellaneous Holiday Automation Artificial Intelligence Covid-19 Gadgets Cloud Computing Training Remote Work Compliance Server Managed Service Provider Outsourced IT IT Support Employee/Employer Relationship Encryption Spam Office Windows 10 Business Continuity Data Management Government Bandwidth Windows 10 Virtualization Wi-Fi Business Technology Blockchain Vendor Data Security Apps Two-factor Authentication Mobile Office Mobile Device Management Budget Gmail Apple Networking WiFi App Employer-Employee Relationship Managed Services BYOD Voice over Internet Protocol Tip of the week Chrome HIPAA Applications How To BDR Conferencing Computing Information Technology Hacker Access Control Avoiding Downtime Office 365 Marketing Retail Router Storage Password Bring Your Own Device Managed IT Services 2FA Big Data Help Desk Operating System Physical Security Healthcare Virtual Private Network Risk Management Computers Health Office Tips Analytics Website Augmented Reality Solutions Firewall Scam Data loss The Internet of Things Windows 11 Monitoring Going Green Patch Management Social Excel Save Money Remote Monitoring Vulnerability End of Support Vendor Management Cybercrime Remote Workers Telephone Customer Service Display Printer Cooperation Free Resource Paperless Office Project Management Infrastructure Windows 7 Microsoft 365 Document Management Employees Maintenance Integration Antivirus Sports Mouse User Tip Modem Mobile Security Safety Processor Administration Holidays Data Storage Smart Technology Supply Chain Robot Video Conferencing Managed Services Provider Settings Saving Time Virtual Machines Professional Services Printing Wireless Content Filtering IT Management Customer Relationship Management Managed IT Service VPN YouTube Meetings Downloads Cryptocurrency iPhone Licensing Hacking Computer Repair Presentation Entertainment Vulnerabilities Data Privacy Virtual Desktop Data storage LiFi Wireless Technology Images 101 Telephone System Multi-Factor Authentication Outlook Mobility Machine Learning Cost Management Money Word Humor Permissions Workforce Hacks Server Management Scary Stories Private Cloud Directions Videos Assessment Electronic Health Records Wasting Time Threats Superfish Identity Theft Refrigeration Fun Twitter Trend Micro Specifications Security Cameras Workplace Strategies Deep Learning Public Speaking Fraud Meta Lithium-ion battery Error Microchip Internet Exlporer Software as a Service Username Managing Costs Amazon Education Social Engineering Entrepreneur Remote Computing eCommerce Black Friday SSID Virtual Assistant Outsource IT Mobile Computing Database Surveillance IT Technicians Virtual Machine Environment Media Tablet Undo Search Alert Proxy Server Reviews Cookies Cyber Monday Medical IT Best Practice Hotspot Transportation Small Businesses Managed IT Buisness File Sharing Dark Data Tactics Development Mirgation Hypervisor Displays Legal IT solutions How To Notifications Shopping Nanotechnology Optimization PowerPoint Business Growth Language Employer/Employee Relationships Outsourcing Travel Application Addiction Management PCI DSS Chatbots Techology Navigation Google Maps Cortana Alt Codes IBM Gig Economy Screen Reader Distributed Denial of Service Workplace Computing Infrastructure Teamwork Hiring/Firing Downtime Unified Threat Management Service Level Agreement Internet Service Provider Regulations Compliance Identity Unified Threat Management Evernote Paperless Hosted Solution Typing Bookmark Smart Tech Memes Co-managed IT Alerts SQL Server Technology Care Network Congestion Download Net Neutrality Knowledge Financial Data History Google Drive User Error Business Communications Competition Browsers Smartwatch Connectivity IT Break Fix Scams Azure Hybrid Work Point of Sale 5G Upload Procurement Experience Social Network Telework Cyber security Google Docs Multi-Factor Security Tech Human Resources Unified Communications Bitcoin Network Management Running Cable Tech Support User CES IoT Communitications Dark Web Cables Google Wallet Monitors Trends Supply Chain Management Customer Resource management FinTech Regulations Google Calendar Term Google Apps Windows 8 IP Address Laptop Websites Data Analysis Star Wars IT Assessment Microsoft Excel IT Maintenance Gamification Flexibility Staff Value Business Intelligence Drones Electronic Medical Records Organization Social Networking SharePoint Legislation Shortcuts Ransmoware Halloween Recovery Fileless Malware Digital Security Cameras Smart Devices Content Remote Working Wearable Technology Memory Vendors Lenovo Hard Drives Writing Virtual Reality Health IT Motherboard Data Breach Comparison Google Play Be Proactive Domains

Blog Archive