Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Adware Lawsuit Between Lenovo And FTC Settled

Adware Lawsuit Between Lenovo And FTC Settled

About two and a half years ago, Lenovo was brought under fire for manufacturing products that had adware preinstalled on them. This malware, a variant called Superfish, was installed on up to 750,000 Lenovo devices, and the company--eager to put this incident behind them--still refuses to admit fault, despite paying reparations and other fees as a result. Superfish allowed access to sensitive information and a root certificate, which could be used to access encrypted data on the same network. All in all, it was a rather embarrassing and dangerous scenario for Lenovo, and it comes with its fair share of consequences.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Workplace Tips Phishing Privacy Email Computer Google Workplace Strategy Collaboration Hosted Solutions Small Business Backup Users Ransomware Managed Service Mobile Device Productivity Microsoft AI Passwords Quick Tips Saving Money Communication Cybersecurity Data Backup Smartphone Data Recovery Disaster Recovery Android Upgrade VoIP Smartphones Business Management Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Miscellaneous Information Holiday Artificial Intelligence Automation Facebook Gadgets Compliance Cloud Computing Covid-19 Training Outsourced IT Server Remote Work Managed Service Provider IT Support Encryption Spam Employee/Employer Relationship Office Windows 10 Government Business Continuity Data Management Wi-Fi Blockchain Bandwidth Business Technology Windows 10 Virtualization Apps Data Security Two-factor Authentication Vendor Mobile Office Managed Services Networking Employer-Employee Relationship BYOD Chrome Mobile Device Management Budget Gmail Tip of the week Apple WiFi Voice over Internet Protocol App Managed IT Services How To Computing BDR Information Technology Hacker HIPAA Avoiding Downtime Physical Security Office 365 Applications Marketing Access Control Password Conferencing 2FA Operating System Risk Management Computers Router Analytics Website Office Tips Virtual Private Network Augmented Reality Health Storage Help Desk Bring Your Own Device Retail Big Data Healthcare Social Scam Windows 11 Going Green Data loss Cooperation Free Resource Excel Project Management Cybercrime Windows 7 Patch Management Customer Service Save Money Microsoft 365 Remote Monitoring Vulnerability End of Support Vendor Management Solutions Display Printer Paperless Office Infrastructure Monitoring Firewall Document Management The Internet of Things Remote Workers Managed IT Service Telephone iPhone Licensing Settings Vulnerabilities Wireless Entertainment Supply Chain Printing Content Filtering Customer Relationship Management YouTube Images 101 Telephone System Cryptocurrency Multi-Factor Authentication Robot Mobility Hacking Cost Management Presentation Virtual Desktop Data storage IT Management LiFi Wireless Technology VPN Employees Meetings Integration Outlook Data Privacy User Tip Modem Computer Repair Mobile Security Processor Money Humor Word Holidays Data Storage Sports Smart Technology Mouse Video Conferencing Machine Learning Managed Services Provider Saving Time Virtual Machines Safety Professional Services Administration Maintenance Antivirus Downloads Application Browsers Smartwatch Connectivity IT Social Engineering Break Fix Upload Procurement Remote Computing Azure Cortana Small Businesses Displays Social Network Telework Alt Codes Cyber security IBM Multi-Factor Security Tech Dark Web CES Tablet IoT Communitications Downtime Trends Supply Chain Management Hosted Solution Alert Outsourcing Managed IT Customer Resource management FinTech Typing File Sharing Regulations Dark Data Google Calendar Term How To Microsoft Excel Data Analysis Workplace Star Wars IT Assessment Google Drive Gamification Flexibility Notifications Staff Value Competition Knowledge Hiring/Firing Organization Paperless Travel Social Networking Legislation 5G Techology Fileless Malware Digital Security Cameras Co-managed IT Google Maps Smart Devices Google Docs Content Remote Working Unified Communications Wearable Technology Memory Experience Technology Care Health IT Business Communications Bitcoin Unified Threat Management Motherboard Data Breach Running Cable Comparison Google Play User Permissions Unified Threat Management Directions Videos Scams Google Wallet Assessment Electronic Health Records Wasting Time Hybrid Work Human Resources Windows 8 Trend Micro IP Address Laptop Network Congestion Specifications Security Cameras Fraud User Error Microchip Cables Drones Internet Exlporer Software as a Service Username Managing Costs Google Apps Point of Sale eCommerce Halloween Black Friday SSID Recovery Virtual Assistant Hard Drives IT Maintenance Database Surveillance Network Management Tech Support IT Technicians Virtual Machine Domains Business Intelligence Proxy Server Reviews Shortcuts Hacks Cookies Scary Stories Monitors Cyber Monday Medical IT Hotspot Transportation Refrigeration Fun Ransmoware Tactics Development Deep Learning Websites Mirgation Hypervisor Public Speaking Vendors Shopping Be Proactive Nanotechnology Optimization Lithium-ion battery PowerPoint Education Electronic Medical Records Language Employer/Employee Relationships Entrepreneur SharePoint Workforce Addiction Management PCI DSS Chatbots Navigation Threats Lenovo Gig Economy Workplace Strategies Mobile Computing Screen Reader Writing Distributed Denial of Service Virtual Reality Computing Infrastructure Teamwork Undo Search Meta Service Level Agreement Internet Service Provider Amazon Server Management Regulations Compliance Best Practice Private Cloud Identity Evernote Superfish Bookmark Identity Theft Smart Tech Memes Buisness IT solutions Twitter Alerts SQL Server Outsource IT Legal Download Net Neutrality Environment Financial Data Media Business Growth Error History

Blog Archive