Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Adware Lawsuit Between Lenovo And FTC Settled

Adware Lawsuit Between Lenovo And FTC Settled

About two and a half years ago, Lenovo was brought under fire for manufacturing products that had adware preinstalled on them. This malware, a variant called Superfish, was installed on up to 750,000 Lenovo devices, and the company--eager to put this incident behind them--still refuses to admit fault, despite paying reparations and other fees as a result. Superfish allowed access to sensitive information and a root certificate, which could be used to access encrypted data on the same network. All in all, it was a rather embarrassing and dangerous scenario for Lenovo, and it comes with its fair share of consequences.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Productivity Backup Passwords Quick Tips Communication Cybersecurity Saving Money Smartphone Managed Service Data Backup Android Upgrade Business Management Smartphones Data Recovery VoIP AI Disaster Recovery Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Current Events Network Tech Term Internet of Things Remote Facebook Artificial Intelligence Miscellaneous Information Automation Gadgets Covid-19 Cloud Computing Holiday Training Remote Work Server Managed Service Provider Outsourced IT Compliance IT Support Spam Encryption Employee/Employer Relationship Office Windows 10 Business Continuity Government Data Management Virtualization Bandwidth Blockchain Wi-Fi Windows 10 Business Technology Apps Data Security Vendor Mobile Office Two-factor Authentication Managed Services Tip of the week Voice over Internet Protocol Chrome Budget Employer-Employee Relationship Apple Networking App BYOD Mobile Device Management Gmail WiFi Conferencing How To BDR Hacker Avoiding Downtime HIPAA Computing Marketing Applications Information Technology Access Control Office 365 Analytics Office Tips Augmented Reality Healthcare Retail Big Data Storage Password Bring Your Own Device Managed IT Services Computers Operating System Router Website Virtual Private Network Risk Management 2FA Health Help Desk Remote Workers Document Management The Internet of Things Social Telephone Scam Free Resource Project Management Data loss Windows 7 Cooperation Microsoft 365 Customer Service Going Green Patch Management Solutions Save Money Remote Monitoring Vulnerability End of Support Vendor Management Cybercrime Physical Security Windows 11 Display Printer Firewall Paperless Office Infrastructure Excel Monitoring Safety Outlook Machine Learning Money Saving Time Humor iPhone Managed IT Service Maintenance Vulnerabilities Sports Downloads Antivirus Mouse Data Privacy Licensing Images 101 Customer Relationship Management Entertainment Administration Multi-Factor Authentication Mobility Hacking Telephone System Robot Presentation Cost Management Settings Employees Printing Integration Wireless Wireless Technology Content Filtering IT Management VPN YouTube Meetings Holidays Cryptocurrency Word User Tip Modem Data Storage Processor Computer Repair Mobile Security Supply Chain Virtual Desktop Video Conferencing Data storage Managed Services Provider LiFi Virtual Machines Professional Services Smart Technology Regulations Compliance SharePoint Addiction Evernote Paperless Electronic Medical Records Language Halloween Chatbots Undo Memes Management Co-managed IT Net Neutrality Lenovo SQL Server Technology Care Screen Reader Writing Distributed Denial of Service Financial Data History Service Level Agreement Business Communications Virtual Reality Computing Infrastructure Scams Scary Stories Private Cloud Identity Smartwatch IT Hacks Server Management Procurement Superfish Bookmark Azure Hybrid Work Identity Theft Smart Tech Fun Telework Application Cyber security Deep Learning Download Tech Human Resources Twitter Alerts Cables Error CES Communitications IBM Supply Chain Management Browsers Education Connectivity Social Engineering Break Fix FinTech Upload Term Google Apps Remote Computing Mobile Computing Social Network IT Maintenance Multi-Factor Security IT Assessment Flexibility Value Business Intelligence Tablet IoT Search Dark Web Alert Organization Best Practice Trends Shortcuts Managed IT Customer Resource management Ransmoware Buisness File Sharing Regulations Dark Data Google Calendar Digital Security Cameras Competition Smart Devices Remote Working Legal Data Analysis Memory Vendors IT solutions Star Wars How To Microsoft Excel Notifications Staff Data Breach Business Growth Gamification Google Play Be Proactive Workforce Travel Social Networking Legislation Videos Electronic Health Records User Techology Fileless Malware Wasting Time Threats Google Maps Cortana Wearable Technology Trend Micro Alt Codes Content Security Cameras Workplace Strategies Health IT Meta Downtime Unified Threat Management Motherboard Comparison Software as a Service IP Address Unified Threat Management Directions Managing Costs Amazon Hosted Solution Assessment Permissions eCommerce Typing SSID Virtual Assistant Outsource IT Network Congestion Specifications Surveillance Recovery Google Drive User Error Microchip Virtual Machine Environment Internet Exlporer Media Knowledge Fraud Reviews Hard Drives Username Medical IT Transportation Small Businesses Point of Sale 5G Black Friday Domains Development Google Docs Hypervisor Displays Unified Communications Database Experience Running Cable Tech Support IT Technicians Shopping Refrigeration Optimization Bitcoin Network Management PowerPoint Google Wallet Proxy Server Employer/Employee Relationships Outsourcing Cookies Monitors Cyber Monday Public Speaking Lithium-ion battery PCI DSS Tactics Navigation Hotspot Laptop Websites Mirgation Gig Economy Entrepreneur Windows 8 Workplace Drones Teamwork Hiring/Firing Nanotechnology Internet Service Provider

Blog Archive