Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Adware Lawsuit Between Lenovo And FTC Settled

Adware Lawsuit Between Lenovo And FTC Settled

About two and a half years ago, Lenovo was brought under fire for manufacturing products that had adware preinstalled on them. This malware, a variant called Superfish, was installed on up to 750,000 Lenovo devices, and the company--eager to put this incident behind them--still refuses to admit fault, despite paying reparations and other fees as a result. Superfish allowed access to sensitive information and a root certificate, which could be used to access encrypted data on the same network. All in all, it was a rather embarrassing and dangerous scenario for Lenovo, and it comes with its fair share of consequences.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Email Workplace Tips Computer Google Phishing Collaboration Hosted Solutions Workplace Strategy Users Small Business Ransomware Mobile Device Productivity Microsoft Backup Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone AI Android Data Recovery Disaster Recovery VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Facebook Miscellaneous Automation Artificial Intelligence Information Holiday Training Gadgets Cloud Computing Covid-19 Compliance Server Managed Service Provider Remote Work IT Support Outsourced IT Employee/Employer Relationship Spam Encryption Windows 10 Office Business Continuity Government Data Management Virtualization Business Technology Bandwidth Blockchain Windows 10 Wi-Fi Two-factor Authentication Apps Data Security Mobile Office Vendor WiFi Tip of the week Employer-Employee Relationship Managed Services Chrome Voice over Internet Protocol Budget Networking Apple App Mobile Device Management BYOD Gmail Information Technology Access Control Office 365 Conferencing Hacker Avoiding Downtime How To BDR Marketing HIPAA Applications Computing Risk Management Health Big Data 2FA Help Desk Analytics Office Tips Augmented Reality Retail Healthcare Computers Storage Password Managed IT Services Bring Your Own Device Website Router Operating System Virtual Private Network The Internet of Things Printer Windows 11 Paperless Office Infrastructure Monitoring Social Excel Document Management Remote Workers Customer Service Telephone Scam Data loss Free Resource Cooperation Project Management Windows 7 Patch Management Microsoft 365 Save Money Remote Monitoring Going Green Vulnerability End of Support Solutions Vendor Management Firewall Physical Security Cybercrime Display Computer Repair Mobile Security Cryptocurrency Processor Holidays Data Storage Virtual Desktop Supply Chain Smart Technology LiFi Data storage Video Conferencing Managed Services Provider Machine Learning Professional Services Saving Time Virtual Machines Outlook Customer Relationship Management Money Managed IT Service Humor Maintenance Hacking Antivirus Downloads iPhone Presentation Licensing Sports Mouse Vulnerabilities Wireless Technology Entertainment Data Privacy Administration Images 101 Telephone System Multi-Factor Authentication Robot Mobility Word Cost Management Settings Wireless IT Management Printing Content Filtering Employees VPN Meetings Integration Safety YouTube User Tip Modem Surveillance Database Virtual Assistant Outsource IT 5G Network Management Virtual Machine Environment Tech Support IT Technicians Media Medical IT Monitors Cyber Monday Unified Communications Experience Reviews Proxy Server Cookies Google Docs Development Tactics Transportation Small Businesses Hotspot Bitcoin Running Cable Application Hypervisor Displays Websites Mirgation Google Wallet PowerPoint Shopping Optimization Nanotechnology Addiction Employer/Employee Relationships Outsourcing Electronic Medical Records Language Windows 8 Laptop IBM SharePoint PCI DSS Management Chatbots Drones Navigation Workplace Writing Distributed Denial of Service Gig Economy Lenovo Screen Reader Internet Service Provider Service Level Agreement Teamwork Hiring/Firing Virtual Reality Computing Infrastructure Halloween Regulations Compliance Server Management Private Cloud Identity Paperless Evernote Co-managed IT Competition Superfish Bookmark Memes Identity Theft Smart Tech Net Neutrality Download SQL Server Technology Care Twitter Alerts Hacks Scary Stories Fun Financial Data History Error Business Communications Scams Social Engineering Break Fix Deep Learning Smartwatch Browsers IT Connectivity User Procurement Upload Azure Hybrid Work Remote Computing Telework Social Network Cyber security Human Resources Multi-Factor Security Tech Education Cables Dark Web CES Communitications Tablet IoT Supply Chain Management Trends Alert Mobile Computing IP Address Search FinTech Managed IT Customer Resource management File Sharing Regulations Google Apps Dark Data Google Calendar Term IT Maintenance How To Microsoft Excel Best Practice Data Analysis IT Assessment Star Wars Recovery Flexibility Gamification Value Business Intelligence Notifications Staff Buisness Hard Drives Organization Travel Social Networking Legal Shortcuts Legislation IT solutions Ransmoware Business Growth Domains Digital Security Cameras Techology Fileless Malware Smart Devices Google Maps Remote Working Content Memory Vendors Wearable Technology Cortana Refrigeration Health IT Data Breach Unified Threat Management Motherboard Be Proactive Comparison Google Play Workforce Permissions Alt Codes Public Speaking Videos Unified Threat Management Directions Electronic Health Records Assessment Wasting Time Threats Downtime Lithium-ion battery Hosted Solution Entrepreneur Trend Micro Workplace Strategies Network Congestion Specifications Security Cameras Software as a Service Internet Exlporer Meta Fraud Typing User Error Microchip Username Managing Costs Amazon SSID Black Friday Knowledge Undo eCommerce Point of Sale Google Drive

Blog Archive