Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Adware Lawsuit Between Lenovo And FTC Settled

Adware Lawsuit Between Lenovo And FTC Settled

About two and a half years ago, Lenovo was brought under fire for manufacturing products that had adware preinstalled on them. This malware, a variant called Superfish, was installed on up to 750,000 Lenovo devices, and the company--eager to put this incident behind them--still refuses to admit fault, despite paying reparations and other fees as a result. Superfish allowed access to sensitive information and a root certificate, which could be used to access encrypted data on the same network. All in all, it was a rather embarrassing and dangerous scenario for Lenovo, and it comes with its fair share of consequences.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Workplace Tips Computer Google Email Phishing Workplace Strategy Hosted Solutions Collaboration Users Small Business Ransomware Backup Mobile Device Productivity Microsoft Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone AI Disaster Recovery Data Recovery Android Upgrade VoIP Smartphones Business Management Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Information Holiday Automation Artificial Intelligence Facebook Miscellaneous Gadgets Cloud Computing Covid-19 Training Remote Work Server Managed Service Provider Compliance IT Support Outsourced IT Encryption Spam Employee/Employer Relationship Office Windows 10 Government Business Continuity Data Management Blockchain Wi-Fi Business Technology Windows 10 Bandwidth Virtualization Apps Vendor Two-factor Authentication Mobile Office Data Security Employer-Employee Relationship BYOD Tip of the week Chrome Mobile Device Management Managed Services Budget Voice over Internet Protocol Gmail WiFi Apple Networking App HIPAA Computing Applications Information Technology Hacker Avoiding Downtime Access Control Office 365 Marketing Conferencing How To BDR Operating System Router Physical Security Computers Virtual Private Network Risk Management Health 2FA Website Help Desk Analytics Office Tips Augmented Reality Retail Storage Password Healthcare Bring Your Own Device Managed IT Services Big Data Going Green Patch Management Save Money Microsoft 365 Remote Monitoring Vulnerability End of Support Vendor Management Solutions Cybercrime Customer Service Display Printer Windows 11 Paperless Office Infrastructure Monitoring Excel Document Management Firewall Remote Workers Telephone Scam Data loss The Internet of Things Cooperation Free Resource Project Management Social Windows 7 Telephone System Multi-Factor Authentication Mobility Robot Cost Management Settings Printing Customer Relationship Management Wireless Content Filtering IT Management Employees VPN YouTube Meetings Hacking Integration Cryptocurrency Presentation User Tip Modem Computer Repair Processor Mobile Security Wireless Technology Holidays Virtual Desktop LiFi Data storage Data Storage Smart Technology Supply Chain Video Conferencing Outlook Managed Services Provider Machine Learning Word Saving Time Virtual Machines Money Professional Services Humor Managed IT Service Maintenance Antivirus Downloads Sports Safety Mouse iPhone Licensing Entertainment Vulnerabilities Administration Data Privacy Images 101 Organization Social Networking Legislation Shortcuts Travel IBM Cortana Fileless Malware Digital Security Cameras Smart Devices Techology Ransmoware Google Maps Wearable Technology Memory Vendors Alt Codes Content Remote Working Health IT Motherboard Data Breach Comparison Google Play Be Proactive Downtime Unified Threat Management Directions Videos Assessment Electronic Health Records Unified Threat Management Permissions Workforce Hosted Solution Wasting Time Threats Typing Competition Trend Micro Specifications Security Cameras Workplace Strategies Network Congestion Knowledge Microchip Internet Exlporer Software as a Service Google Drive User Error Fraud Meta Managing Costs Amazon Username User eCommerce Black Friday SSID Point of Sale 5G Unified Communications Experience Database Surveillance Google Docs Virtual Assistant Outsource IT IT Technicians Virtual Machine Environment Bitcoin Network Management Media Running Cable Tech Support Monitors Proxy Server Reviews Cookies Google Wallet Cyber Monday Medical IT IP Address Tactics Development Hotspot Transportation Small Businesses Mirgation Hypervisor Displays Windows 8 Laptop Websites Recovery Shopping Nanotechnology Optimization Drones PowerPoint Language Employer/Employee Relationships Outsourcing Electronic Medical Records Hard Drives Addiction SharePoint Management PCI DSS Chatbots Navigation Halloween Domains Writing Gig Economy Screen Reader Lenovo Distributed Denial of Service Workplace Computing Infrastructure Teamwork Hiring/Firing Virtual Reality Refrigeration Service Level Agreement Internet Service Provider Regulations Compliance Identity Hacks Server Management Evernote Paperless Scary Stories Private Cloud Public Speaking Lithium-ion battery Fun Bookmark Smart Tech Memes Superfish Co-managed IT Identity Theft Alerts SQL Server Technology Care Deep Learning Twitter Entrepreneur Download Net Neutrality Financial Data History Business Communications Error Social Engineering Browsers Smartwatch Connectivity IT Break Fix Scams Education Azure Hybrid Work Remote Computing Undo Upload Procurement Social Network Telework Cyber security Mobile Computing Multi-Factor Security Tech Human Resources Search CES IoT Communitications Dark Web Cables Tablet Best Practice Alert Trends Supply Chain Management Customer Resource management FinTech Regulations Managed IT Google Calendar Term Google Apps Buisness File Sharing Dark Data How To Application Data Analysis Star Wars IT Assessment Legal Microsoft Excel IT Maintenance IT solutions Staff Value Business Intelligence Business Growth Notifications Gamification Flexibility

Blog Archive