Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Adware Lawsuit Between Lenovo And FTC Settled

Adware Lawsuit Between Lenovo And FTC Settled

About two and a half years ago, Lenovo was brought under fire for manufacturing products that had adware preinstalled on them. This malware, a variant called Superfish, was installed on up to 750,000 Lenovo devices, and the company--eager to put this incident behind them--still refuses to admit fault, despite paying reparations and other fees as a result. Superfish allowed access to sensitive information and a root certificate, which could be used to access encrypted data on the same network. All in all, it was a rather embarrassing and dangerous scenario for Lenovo, and it comes with its fair share of consequences.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Phishing Email Workplace Tips Computer IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Passwords Quick Tips Backup Cybersecurity Saving Money Communication Productivity Data Backup Smartphone Managed Service Android Upgrade AI VoIP Business Management Smartphones communications Data Recovery Mobile Devices Disaster Recovery Windows Social Media Browser Microsoft Office Managed IT Services Current Events Network Tech Term Remote Internet of Things Artificial Intelligence Automation Facebook Information Cloud Computing Holiday Training Covid-19 Miscellaneous Gadgets Server Managed Service Provider Remote Work Compliance Outsourced IT IT Support Encryption Employee/Employer Relationship Spam Office Windows 10 Government Business Continuity Data Management Bandwidth Windows 10 Business Technology Blockchain Wi-Fi Virtualization Data Security Mobile Office Vendor Two-factor Authentication Apps Chrome Budget BYOD Apple Mobile Device Management App Gmail Tip of the week Employer-Employee Relationship Managed Services Networking Voice over Internet Protocol BDR Hacker Avoiding Downtime Conferencing Marketing Access Control WiFi Computing HIPAA Information Technology Applications How To Office 365 Analytics Office Tips Computers Augmented Reality Help Desk Storage Password Website Bring Your Own Device Virtual Private Network Health Operating System 2FA Big Data Retail Risk Management Router Managed IT Services Healthcare Customer Service Monitoring Patch Management Save Money Free Resource Remote Monitoring Vulnerability Project Management End of Support Vendor Management Windows 7 Microsoft 365 Physical Security Telephone Display Solutions Printer Firewall Paperless Office Infrastructure Cooperation Going Green Document Management Windows 11 The Internet of Things Cybercrime Social Excel Scam Data loss Remote Workers Outlook iPhone Hacking Robot Presentation Money Humor Smart Technology Vulnerabilities Data Privacy Wireless Technology Saving Time Images 101 Sports IT Management VPN Meetings Multi-Factor Authentication Mobility Mouse Managed IT Service Word Administration Downloads Computer Repair Licensing Employees Integration Entertainment Safety Settings Wireless Machine Learning Printing Telephone System Content Filtering Holidays Cost Management YouTube Data Storage Supply Chain Cryptocurrency Maintenance Video Conferencing Antivirus Managed Services Provider Virtual Machines Professional Services Virtual Desktop Customer Relationship Management Data storage LiFi User Tip Modem Mobile Security Processor Proxy Server Smartwatch Cookies IT Scams Cyber Monday How To Hybrid Work Hotspot Notifications Azure Halloween Tactics Procurement Telework Mirgation Travel Cyber security Human Resources Tech User Techology CES Nanotechnology Google Maps Communitications Cables Language Hacks Scary Stories Addiction Supply Chain Management Management FinTech Fun Chatbots Unified Threat Management Google Apps Term IP Address Deep Learning Unified Threat Management Screen Reader IT Assessment IT Maintenance Distributed Denial of Service Flexibility Business Intelligence Computing Infrastructure Value Service Level Agreement Education Organization Identity Shortcuts Network Congestion Recovery Bookmark User Error Digital Security Cameras Smart Tech Smart Devices Ransmoware Remote Working Vendors Alerts Memory Hard Drives Mobile Computing Download Search Point of Sale Data Breach Be Proactive Google Play Domains Best Practice Browsers Videos Connectivity Electronic Health Records Workforce Break Fix Network Management Threats Tech Support Wasting Time Refrigeration Buisness Upload IT solutions Social Network Trend Micro Workplace Strategies Multi-Factor Security Monitors Security Cameras Public Speaking Legal Lithium-ion battery Business Growth IoT Software as a Service Meta Dark Web Amazon Websites Managing Costs Entrepreneur Trends Customer Resource management Cortana Regulations eCommerce Google Calendar SSID Electronic Medical Records Virtual Assistant Alt Codes Data Analysis SharePoint Star Wars Surveillance Outsource IT Microsoft Excel Environment Staff Virtual Machine Media Undo Downtime Gamification Hosted Solution Lenovo Reviews Social Networking Legislation Writing Medical IT Virtual Reality Transportation Typing Fileless Malware Development Small Businesses Content Server Management Displays Wearable Technology Private Cloud Hypervisor Google Drive Health IT Superfish Shopping Knowledge Motherboard Identity Theft Optimization Comparison PowerPoint Permissions Twitter Employer/Employee Relationships Application Directions Assessment Outsourcing PCI DSS 5G Error Navigation IBM Google Docs Unified Communications Gig Economy Experience Workplace Specifications Social Engineering Fraud Remote Computing Teamwork Bitcoin Microchip Running Cable Internet Exlporer Internet Service Provider Hiring/Firing Username Regulations Compliance Paperless Evernote Google Wallet Tablet Memes Co-managed IT Black Friday Alert SQL Server Windows 8 Laptop Database Net Neutrality Technology Care Managed IT Financial Data IT Technicians File Sharing History Business Communications Dark Data Competition Drones

Blog Archive