Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Adware Lawsuit Between Lenovo And FTC Settled

Adware Lawsuit Between Lenovo And FTC Settled

About two and a half years ago, Lenovo was brought under fire for manufacturing products that had adware preinstalled on them. This malware, a variant called Superfish, was installed on up to 750,000 Lenovo devices, and the company--eager to put this incident behind them--still refuses to admit fault, despite paying reparations and other fees as a result. Superfish allowed access to sensitive information and a root certificate, which could be used to access encrypted data on the same network. All in all, it was a rather embarrassing and dangerous scenario for Lenovo, and it comes with its fair share of consequences.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Privacy Workplace Tips Google Email Computer Phishing Workplace Strategy Collaboration Hosted Solutions Small Business Backup Users Ransomware Managed Service Mobile Device Productivity Microsoft Passwords Quick Tips Saving Money AI Communication Cybersecurity Smartphone Data Backup Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Internet of Things Remote Information Automation Artificial Intelligence Facebook Miscellaneous Holiday Compliance Gadgets Cloud Computing Covid-19 Training Server Managed Service Provider Outsourced IT Remote Work IT Support Employee/Employer Relationship Encryption Spam Windows 10 Office Business Continuity Data Management Government Business Technology Bandwidth Windows 10 Virtualization Blockchain Wi-Fi Mobile Office Managed Services Data Security Apps Vendor Two-factor Authentication Tip of the week Chrome Mobile Device Management Budget Gmail Voice over Internet Protocol Apple Networking WiFi App Employer-Employee Relationship BYOD Avoiding Downtime Office 365 Marketing Conferencing Managed IT Services How To BDR HIPAA Computing Physical Security Applications Information Technology Hacker Access Control Help Desk Analytics Website Office Tips 2FA Augmented Reality Retail Storage Password Bring Your Own Device Healthcare Big Data Operating System Router Virtual Private Network Risk Management Computers Health Monitoring Windows 11 Document Management Excel Managed IT Service Firewall Telephone Scam Data loss Remote Workers Cooperation The Internet of Things Going Green Patch Management Social Free Resource Project Management Save Money Windows 7 Remote Monitoring Vulnerability End of Support Vendor Management Cybercrime Microsoft 365 Solutions Customer Service Display Printer Paperless Office Infrastructure Smart Technology Holidays Outlook Machine Learning Money Saving Time Data Storage Word Supply Chain Humor Video Conferencing Managed Services Provider Virtual Machines Professional Services Maintenance Antivirus Sports Downloads Mouse Licensing Safety Entertainment Administration iPhone Vulnerabilities Telephone System Robot Data Privacy Cost Management Images 101 Settings Printing Wireless Multi-Factor Authentication Mobility Content Filtering IT Management Customer Relationship Management VPN YouTube Meetings Cryptocurrency User Tip Modem Hacking Processor Presentation Employees Computer Repair Mobile Security Integration Virtual Desktop Data storage LiFi Wireless Technology IP Address Laptop Websites Mirgation Surveillance Virtual Assistant Outsource IT Windows 8 Media Drones Nanotechnology Virtual Machine Environment Medical IT SharePoint Addiction Reviews Electronic Medical Records Language Management Halloween Chatbots Recovery Development Transportation Small Businesses Lenovo Screen Reader Hard Drives Writing Distributed Denial of Service Hypervisor Displays Virtual Reality Computing Infrastructure Optimization PowerPoint Service Level Agreement Domains Shopping Hacks Server Management Scary Stories Private Cloud Identity Employer/Employee Relationships Outsourcing Navigation Superfish Bookmark Identity Theft Smart Tech Refrigeration PCI DSS Fun Twitter Alerts Workplace Deep Learning Download Public Speaking Gig Economy Lithium-ion battery Error Internet Service Provider Teamwork Hiring/Firing Evernote Paperless Browsers Education Connectivity Regulations Compliance Social Engineering Break Fix Entrepreneur Remote Computing Memes Co-managed IT Upload Mobile Computing Social Network Net Neutrality Multi-Factor Security SQL Server Technology Care Business Communications Tablet IoT Undo Financial Data Search Dark Web History Smartwatch Alert IT Scams Best Practice Trends Managed IT Customer Resource management Buisness File Sharing Regulations Procurement Dark Data Google Calendar Azure Hybrid Work Cyber security Tech Human Resources Legal Data Analysis IT solutions Star Wars Telework How To Microsoft Excel CES Notifications Staff Communitications Cables Business Growth Gamification Travel Social Networking Application Supply Chain Management Legislation Term Google Apps Techology Fileless Malware Google Maps FinTech Cortana Wearable Technology IT Assessment IT Maintenance Alt Codes Content IBM Health IT Downtime Unified Threat Management Motherboard Flexibility Comparison Value Business Intelligence Shortcuts Unified Threat Management Directions Hosted Solution Assessment Organization Permissions Digital Security Cameras Smart Devices Ransmoware Typing Remote Working Network Congestion Specifications Memory Vendors Data Breach Google Play Be Proactive Google Drive User Error Microchip Internet Exlporer Competition Knowledge Fraud Videos Electronic Health Records Workforce Username Point of Sale 5G Black Friday Wasting Time Threats Trend Micro Security Cameras Workplace Strategies Google Docs Unified Communications Database Experience Running Cable Tech Support IT Technicians User Software as a Service Meta Bitcoin Network Management Google Wallet Proxy Server Cookies Monitors Cyber Monday Managing Costs Amazon eCommerce SSID Tactics Hotspot

Blog Archive