Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Adware Lawsuit Between Lenovo And FTC Settled

Adware Lawsuit Between Lenovo And FTC Settled

About two and a half years ago, Lenovo was brought under fire for manufacturing products that had adware preinstalled on them. This malware, a variant called Superfish, was installed on up to 750,000 Lenovo devices, and the company--eager to put this incident behind them--still refuses to admit fault, despite paying reparations and other fees as a result. Superfish allowed access to sensitive information and a root certificate, which could be used to access encrypted data on the same network. All in all, it was a rather embarrassing and dangerous scenario for Lenovo, and it comes with its fair share of consequences.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Privacy Workplace Tips Phishing Google Email Computer Workplace Strategy Collaboration Hosted Solutions Backup Small Business Users Managed Service Ransomware Mobile Device Productivity Microsoft Passwords Quick Tips Saving Money Communication Cybersecurity AI Data Backup Smartphone Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones communications Mobile Devices Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Information Holiday Automation Artificial Intelligence Facebook Miscellaneous Cloud Computing Training Compliance Covid-19 Gadgets Server Managed Service Provider Outsourced IT Remote Work IT Support Encryption Spam Employee/Employer Relationship Office Windows 10 Data Management Business Continuity Government Wi-Fi Business Technology Windows 10 Bandwidth Virtualization Blockchain Vendor Two-factor Authentication Mobile Office Data Security Apps BYOD Managed Services Voice over Internet Protocol Mobile Device Management Tip of the week Chrome Gmail Budget WiFi Apple Networking App Employer-Employee Relationship HIPAA Computing Hacker Applications Information Technology Avoiding Downtime Access Control Marketing Office 365 Conferencing How To BDR Operating System 2FA Computers Router Physical Security Virtual Private Network Risk Management Website Health Help Desk Healthcare Analytics Office Tips Augmented Reality Retail Storage Password Bring Your Own Device Managed IT Services Big Data Windows 11 Vendor Management Customer Service Cybercrime Display Excel Printer Paperless Office Infrastructure Remote Workers Monitoring Firewall Document Management Free Resource Managed IT Service Project Management Windows 7 Telephone The Internet of Things Scam Microsoft 365 Data loss Solutions Social Cooperation Going Green Patch Management Save Money Remote Monitoring End of Support Vulnerability Content Filtering Holidays Hacking IT Management Data Storage Presentation VPN YouTube Meetings Supply Chain Video Conferencing Cryptocurrency Managed Services Provider Wireless Technology User Tip Modem Professional Services Computer Repair Mobile Security Virtual Machines Processor Virtual Desktop Data storage LiFi Smart Technology Word Outlook iPhone Machine Learning Money Saving Time Humor Vulnerabilities Data Privacy Safety Maintenance Images 101 Downloads Antivirus Sports Multi-Factor Authentication Mouse Mobility Licensing Administration Entertainment Employees Integration Robot Telephone System Cost Management Customer Relationship Management Settings Wireless Printing Medical IT Hosted Solution Assessment Permissions Reviews Unified Threat Management Directions Development Transportation Small Businesses Typing Network Congestion Specifications Hypervisor Displays PowerPoint User Internet Exlporer Knowledge Fraud Shopping Optimization Google Drive User Error Microchip Employer/Employee Relationships Outsourcing Username 5G Black Friday PCI DSS Navigation Point of Sale Workplace Unified Communications Database Experience Gig Economy IP Address Google Docs Internet Service Provider Teamwork Hiring/Firing Bitcoin Network Management Running Cable Tech Support IT Technicians Monitors Cyber Monday Regulations Compliance Google Wallet Proxy Server Evernote Paperless Cookies Co-managed IT Recovery Tactics Hotspot Memes Net Neutrality SQL Server Technology Care Hard Drives Windows 8 Laptop Websites Mirgation Nanotechnology Financial Data History Domains Drones Business Communications SharePoint Scams Addiction Electronic Medical Records Language Smartwatch IT Procurement Azure Hybrid Work Refrigeration Management Halloween Chatbots Screen Reader Writing Distributed Denial of Service Telework Cyber security Public Speaking Lenovo Tech Human Resources Lithium-ion battery Cables Service Level Agreement Virtual Reality Computing Infrastructure CES Communitications Supply Chain Management Hacks Server Management Entrepreneur Scary Stories Private Cloud Identity Identity Theft Smart Tech Fun FinTech Superfish Bookmark Term Google Apps IT Maintenance Deep Learning Download Twitter Alerts IT Assessment Flexibility Value Business Intelligence Undo Error Education Connectivity Social Engineering Break Fix Organization Browsers Shortcuts Ransmoware Upload Remote Computing Digital Security Cameras Smart Devices Multi-Factor Security Remote Working Memory Vendors Mobile Computing Social Network Tablet IoT Search Dark Web Data Breach Google Play Be Proactive Workforce Application Best Practice Trends Alert Videos Electronic Health Records Dark Data Google Calendar Wasting Time Threats Managed IT Customer Resource management Buisness File Sharing Regulations IT solutions Star Wars How To Microsoft Excel Trend Micro IBM Legal Data Analysis Security Cameras Workplace Strategies Software as a Service Meta Business Growth Gamification Notifications Staff Legislation Managing Costs Amazon Travel Social Networking SSID Google Maps Cortana eCommerce Techology Fileless Malware Surveillance Virtual Assistant Outsource IT Alt Codes Content Wearable Technology Comparison Virtual Machine Environment Competition Health IT Media Downtime Unified Threat Management Motherboard

Blog Archive