Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Adware Lawsuit Between Lenovo And FTC Settled

Adware Lawsuit Between Lenovo And FTC Settled

About two and a half years ago, Lenovo was brought under fire for manufacturing products that had adware preinstalled on them. This malware, a variant called Superfish, was installed on up to 750,000 Lenovo devices, and the company--eager to put this incident behind them--still refuses to admit fault, despite paying reparations and other fees as a result. Superfish allowed access to sensitive information and a root certificate, which could be used to access encrypted data on the same network. All in all, it was a rather embarrassing and dangerous scenario for Lenovo, and it comes with its fair share of consequences.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Phishing Email Workplace Tips Computer IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Passwords Quick Tips Backup Productivity Cybersecurity Saving Money Communication Data Backup Smartphone Managed Service Android Upgrade VoIP AI Business Management Smartphones Mobile Devices communications Data Recovery Disaster Recovery Windows Social Media Browser Microsoft Office Managed IT Services Current Events Network Tech Term Internet of Things Remote Artificial Intelligence Information Automation Facebook Cloud Computing Holiday Training Covid-19 Miscellaneous Gadgets Server Managed Service Provider Remote Work Compliance Outsourced IT IT Support Encryption Employee/Employer Relationship Spam Office Windows 10 Government Business Continuity Data Management Bandwidth Blockchain Windows 10 Business Technology Wi-Fi Virtualization Data Security Mobile Office Vendor Two-factor Authentication Apps Chrome Budget BYOD Apple Mobile Device Management App Gmail Tip of the week Networking Employer-Employee Relationship Managed Services Voice over Internet Protocol Conferencing BDR Hacker Avoiding Downtime Marketing Access Control HIPAA Applications Computing WiFi Information Technology How To Office 365 Analytics Office Tips Healthcare Augmented Reality Computers Storage Password Bring Your Own Device Website Virtual Private Network Health 2FA Router Operating System Retail Big Data Risk Management Help Desk Managed IT Services Patch Management Customer Service Save Money Telephone Remote Monitoring Vulnerability End of Support Vendor Management Free Resource Project Management Windows 7 Cooperation Physical Security Microsoft 365 Display Printer Solutions Paperless Office Infrastructure Going Green Firewall Windows 11 Document Management Cybercrime Excel The Internet of Things Social Monitoring Scam Data loss Remote Workers Data Privacy Outlook Managed IT Service iPhone Money Robot Downloads Hacking Humor Presentation Vulnerabilities Licensing IT Management Wireless Technology Sports Entertainment VPN Mouse Meetings Images 101 Mobility Multi-Factor Authentication Administration Computer Repair Telephone System Cost Management Word Employees Integration Settings Printing Machine Learning Supply Chain Wireless Content Filtering Safety Modem User Tip Processor Mobile Security YouTube Holidays Maintenance Cryptocurrency Data Storage Antivirus Video Conferencing Smart Technology Managed Services Provider Professional Services Virtual Desktop Virtual Machines LiFi Data storage Saving Time Customer Relationship Management How To Net Neutrality SQL Server Identity Smart Tech Notifications Competition Halloween Financial Data Google Apps History Bookmark IT Download Alerts Travel Smartwatch IT Maintenance Business Intelligence Procurement Azure Techology Google Maps Tech Connectivity Hacks Break Fix Scary Stories Telework Shortcuts Cyber security Browsers Ransmoware Fun Communitications Upload Unified Threat Management CES User Deep Learning Multi-Factor Security Vendors Supply Chain Management Social Network Unified Threat Management Term IoT Dark Web FinTech Be Proactive Workforce IT Assessment Trends IP Address Education Network Congestion Google Calendar Threats Flexibility Value Customer Resource management User Error Regulations Star Wars Mobile Computing Microsoft Excel Organization Workplace Strategies Data Analysis Recovery Meta Search Smart Devices Gamification Staff Point of Sale Digital Security Cameras Best Practice Legislation Hard Drives Amazon Remote Working Memory Social Networking Google Play Network Management Tech Support Domains Buisness Data Breach Fileless Malware Outsource IT Electronic Health Records Content Legal Wearable Technology IT solutions Videos Monitors Business Growth Comparison Refrigeration Environment Media Wasting Time Health IT Motherboard Security Cameras Assessment Permissions Websites Public Speaking Trend Micro Directions Small Businesses Cortana Software as a Service Lithium-ion battery Alt Codes Specifications Electronic Medical Records Displays Entrepreneur Managing Costs SharePoint Microchip SSID Internet Exlporer Fraud Downtime eCommerce Outsourcing Surveillance Virtual Assistant Username Lenovo Hosted Solution Writing Typing Black Friday Virtual Reality Undo Virtual Machine Medical IT Database Server Management Private Cloud Reviews Workplace Hiring/Firing Knowledge Development Transportation Superfish Google Drive IT Technicians Identity Theft Cookies Cyber Monday Twitter Paperless Hypervisor Proxy Server PowerPoint Tactics Hotspot Error Shopping Co-managed IT 5G Optimization Social Engineering Application Technology Care Experience Employer/Employee Relationships Google Docs Mirgation Unified Communications Nanotechnology Bitcoin Remote Computing Running Cable PCI DSS Business Communications Navigation Addiction Google Wallet Language IBM Gig Economy Scams Hybrid Work Internet Service Provider Teamwork Management Chatbots Tablet Screen Reader Windows 8 Distributed Denial of Service Alert Laptop Regulations Compliance Human Resources Evernote Memes Service Level Agreement Managed IT Drones Computing Infrastructure File Sharing Dark Data Cables

Blog Archive