Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Adware Lawsuit Between Lenovo And FTC Settled

Adware Lawsuit Between Lenovo And FTC Settled

About two and a half years ago, Lenovo was brought under fire for manufacturing products that had adware preinstalled on them. This malware, a variant called Superfish, was installed on up to 750,000 Lenovo devices, and the company--eager to put this incident behind them--still refuses to admit fault, despite paying reparations and other fees as a result. Superfish allowed access to sensitive information and a root certificate, which could be used to access encrypted data on the same network. All in all, it was a rather embarrassing and dangerous scenario for Lenovo, and it comes with its fair share of consequences.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Backup Quick Tips Passwords Saving Money Communication Cybersecurity Productivity Smartphone Data Backup Managed Service Android Upgrade Business Management VoIP Smartphones AI Data Recovery Mobile Devices communications Windows Disaster Recovery Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Internet of Things Remote Artificial Intelligence Facebook Information Automation Miscellaneous Cloud Computing Gadgets Holiday Training Covid-19 Managed Service Provider Remote Work Server Outsourced IT Compliance Employee/Employer Relationship IT Support Encryption Spam Windows 10 Office Data Management Business Continuity Government Windows 10 Bandwidth Virtualization Blockchain Wi-Fi Business Technology Two-factor Authentication Mobile Office Data Security Apps Vendor Mobile Device Management Chrome Networking Gmail Budget Managed Services Voice over Internet Protocol Apple BYOD App Employer-Employee Relationship Tip of the week Marketing Office 365 How To Conferencing BDR WiFi HIPAA Access Control Computing Hacker Applications Information Technology Avoiding Downtime Website Retail Help Desk Analytics Office Tips Augmented Reality Managed IT Services 2FA Storage Password Bring Your Own Device Healthcare Big Data Virtual Private Network Operating System Health Router Computers Risk Management Monitoring Scam Data loss Firewall Windows 11 Telephone Remote Workers Excel Patch Management The Internet of Things Save Money Remote Monitoring Vulnerability End of Support Vendor Management Cooperation Social Free Resource Physical Security Project Management Windows 7 Going Green Display Printer Microsoft 365 Paperless Office Customer Service Cybercrime Infrastructure Solutions Document Management Virtual Desktop Data storage LiFi Holidays Maintenance Word Smart Technology Antivirus Outlook Data Storage Saving Time Money Video Conferencing Humor Managed Services Provider Virtual Machines Professional Services Supply Chain Managed IT Service Safety Sports Downloads Robot Mouse Licensing iPhone Administration Entertainment Vulnerabilities IT Management VPN Meetings Telephone System Images 101 Cost Management Customer Relationship Management Computer Repair Data Privacy Multi-Factor Authentication Settings Mobility Wireless Printing Content Filtering Hacking YouTube Presentation Employees Cryptocurrency Integration Machine Learning User Tip Wireless Technology Modem Mobile Security Processor Workplace Strategies Cyber Monday Virtual Assistant Server Management Private Cloud Proxy Server Google Wallet Cookies Surveillance Tactics Recovery Meta Hotspot Virtual Machine Superfish Identity Theft Twitter Reviews Hard Drives Windows 8 Amazon Mirgation Laptop Medical IT Transportation Error Domains Drones Nanotechnology Development Addiction Outsource IT Language Hypervisor Social Engineering Remote Computing Management Shopping Refrigeration Environment Chatbots Optimization Halloween Media PowerPoint Distributed Denial of Service Employer/Employee Relationships Public Speaking Screen Reader Lithium-ion battery Service Level Agreement PCI DSS Small Businesses Computing Infrastructure Navigation Tablet Alert Gig Economy Hacks Displays Identity Entrepreneur Scary Stories Teamwork Managed IT Fun File Sharing Bookmark Dark Data Smart Tech Internet Service Provider How To Download Regulations Compliance Deep Learning Outsourcing Alerts Evernote Notifications Undo Memes Net Neutrality Education Workplace Break Fix SQL Server Travel Browsers Connectivity Upload Financial Data Hiring/Firing History Techology Google Maps Social Network Smartwatch Mobile Computing IT Paperless Multi-Factor Security IoT Procurement Co-managed IT Dark Web Azure Search Unified Threat Management Trends Telework Application Best Practice Technology Care Cyber security Unified Threat Management Tech Google Calendar Customer Resource management CES Regulations Communitications Buisness Business Communications Star Wars Supply Chain Management IT solutions Scams Microsoft Excel Data Analysis Network Congestion IBM Legal Gamification FinTech Business Growth Hybrid Work Staff User Error Term Legislation Social Networking IT Assessment Human Resources Flexibility Cables Value Cortana Point of Sale Fileless Malware Content Organization Alt Codes Wearable Technology Google Apps Comparison Network Management Tech Support Health IT Digital Security Cameras Competition Motherboard Smart Devices Downtime Assessment Remote Working Hosted Solution IT Maintenance Permissions Memory Directions Monitors Typing Business Intelligence Data Breach Google Play Shortcuts Specifications Websites Videos Electronic Health Records Google Drive Internet Exlporer User Ransmoware Fraud Wasting Time Knowledge Microchip Electronic Medical Records Username Vendors Trend Micro SharePoint Security Cameras Be Proactive Black Friday 5G Software as a Service IP Address Google Docs Database Unified Communications Workforce Managing Costs Lenovo Experience Writing Virtual Reality Bitcoin Threats IT Technicians eCommerce Running Cable SSID

Blog Archive