Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Adware Lawsuit Between Lenovo And FTC Settled

Adware Lawsuit Between Lenovo And FTC Settled

About two and a half years ago, Lenovo was brought under fire for manufacturing products that had adware preinstalled on them. This malware, a variant called Superfish, was installed on up to 750,000 Lenovo devices, and the company--eager to put this incident behind them--still refuses to admit fault, despite paying reparations and other fees as a result. Superfish allowed access to sensitive information and a root certificate, which could be used to access encrypted data on the same network. All in all, it was a rather embarrassing and dangerous scenario for Lenovo, and it comes with its fair share of consequences.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Computer Phishing Email Workplace Tips IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Passwords Quick Tips Backup Cybersecurity Saving Money Communication Productivity Managed Service Data Backup Smartphone Android Upgrade Smartphones AI VoIP Business Management Data Recovery Mobile Devices communications Windows Disaster Recovery Social Media Browser Microsoft Office Managed IT Services Current Events Network Remote Tech Term Internet of Things Artificial Intelligence Automation Facebook Information Gadgets Covid-19 Cloud Computing Holiday Training Miscellaneous Remote Work Server Managed Service Provider Outsourced IT Compliance Spam IT Support Employee/Employer Relationship Encryption Office Windows 10 Government Business Continuity Data Management Bandwidth Windows 10 Business Technology Blockchain Virtualization Wi-Fi Two-factor Authentication Apps Data Security Mobile Office Vendor Employer-Employee Relationship Networking Chrome Budget BYOD Apple Mobile Device Management App Gmail Managed Services Voice over Internet Protocol Tip of the week Applications How To Office 365 BDR Hacker Avoiding Downtime Conferencing Marketing Access Control WiFi Computing HIPAA Information Technology Managed IT Services Analytics Office Tips Help Desk Augmented Reality Computers Storage Password Website Bring Your Own Device Virtual Private Network Health 2FA Operating System Healthcare Big Data Retail Router Risk Management Free Resource Scam Data loss Project Management Windows 7 Microsoft 365 Customer Service Monitoring Solutions Patch Management Save Money Remote Monitoring End of Support Vulnerability Vendor Management Physical Security Telephone Display Printer Paperless Office Firewall Cooperation Infrastructure Going Green Windows 11 Remote Workers Document Management The Internet of Things Excel Cybercrime Social Modem User Tip Processor Mobile Security Virtual Desktop Images 101 LiFi Customer Relationship Management Data storage Mobility Multi-Factor Authentication Outlook Data Privacy Smart Technology Hacking Presentation Robot Money Humor Employees Saving Time Wireless Technology Integration Managed IT Service IT Management Sports Mouse VPN Meetings Downloads Holidays Word Licensing Administration Data Storage Computer Repair Entertainment Video Conferencing Managed Services Provider Virtual Machines Professional Services Settings Safety Telephone System Cost Management Printing Supply Chain Machine Learning Wireless Content Filtering iPhone YouTube Cryptocurrency Maintenance Vulnerabilities Antivirus Unified Communications Experience IBM Supply Chain Management Social Engineering Username Google Docs Technology Care Term Bitcoin Business Communications Black Friday Running Cable FinTech Remote Computing IT Assessment Database Google Wallet Scams Tablet Flexibility Value Hybrid Work IT Technicians Cookies Windows 8 Human Resources Cyber Monday Laptop Organization Alert Proxy Server Competition Smart Devices Dark Data Tactics Drones Cables Hotspot Managed IT Digital Security Cameras File Sharing Remote Working How To Memory Mirgation Google Play Nanotechnology Google Apps Halloween Notifications Data Breach Electronic Health Records Addiction IT Maintenance Language Videos Travel Google Maps User Wasting Time Management Business Intelligence Chatbots Techology Security Cameras Screen Reader Hacks Shortcuts Distributed Denial of Service Scary Stories Trend Micro Fun Software as a Service Service Level Agreement Ransmoware Computing Infrastructure Unified Threat Management Deep Learning IP Address Managing Costs Vendors Identity Unified Threat Management SSID Smart Tech Be Proactive eCommerce Bookmark Surveillance Network Congestion Virtual Assistant Download Workforce Alerts Education User Error Recovery Virtual Machine Threats Browsers Medical IT Connectivity Mobile Computing Workplace Strategies Break Fix Reviews Hard Drives Point of Sale Search Domains Development Transportation Upload Meta Best Practice Multi-Factor Security Hypervisor Social Network Amazon Optimization PowerPoint IoT Dark Web Network Management Buisness Shopping Tech Support Refrigeration Public Speaking Monitors Employer/Employee Relationships Trends Legal Outsource IT IT solutions Navigation Regulations Business Growth Media Google Calendar Lithium-ion battery PCI DSS Customer Resource management Environment Data Analysis Entrepreneur Star Wars Microsoft Excel Gig Economy Websites Cortana Internet Service Provider Teamwork Gamification Small Businesses Staff Evernote Social Networking SharePoint Alt Codes Legislation Regulations Compliance Electronic Medical Records Displays Undo Memes Fileless Malware Downtime Net Neutrality Writing SQL Server Content Outsourcing Wearable Technology Lenovo Hosted Solution Motherboard Typing Comparison Financial Data Virtual Reality History Health IT IT Directions Assessment Workplace Permissions Server Management Smartwatch Private Cloud Identity Theft Knowledge Procurement Azure Google Drive Hiring/Firing Superfish Tech Paperless Specifications Telework Twitter Application Cyber security Communitications Microchip Internet Exlporer Co-managed IT Fraud CES Error 5G

Blog Archive