Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Adware Lawsuit Between Lenovo And FTC Settled

Adware Lawsuit Between Lenovo And FTC Settled

About two and a half years ago, Lenovo was brought under fire for manufacturing products that had adware preinstalled on them. This malware, a variant called Superfish, was installed on up to 750,000 Lenovo devices, and the company--eager to put this incident behind them--still refuses to admit fault, despite paying reparations and other fees as a result. Superfish allowed access to sensitive information and a root certificate, which could be used to access encrypted data on the same network. All in all, it was a rather embarrassing and dangerous scenario for Lenovo, and it comes with its fair share of consequences.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Quick Tips Passwords Backup Productivity Cybersecurity Saving Money Communication Managed Service Data Backup Smartphone Android Upgrade Business Management Smartphones AI VoIP Data Recovery communications Mobile Devices Windows Disaster Recovery Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Facebook Information Artificial Intelligence Automation Miscellaneous Gadgets Cloud Computing Covid-19 Holiday Training Server Remote Work Managed Service Provider Outsourced IT Compliance Encryption Spam IT Support Employee/Employer Relationship Office Windows 10 Government Business Continuity Data Management Virtualization Wi-Fi Bandwidth Business Technology Windows 10 Blockchain Vendor Apps Data Security Two-factor Authentication Mobile Office Managed Services Voice over Internet Protocol App Networking Employer-Employee Relationship BYOD Chrome Budget Mobile Device Management Tip of the week Gmail Apple HIPAA WiFi Applications How To Computing BDR Information Technology Hacker Conferencing Office 365 Avoiding Downtime Marketing Access Control Router Big Data Healthcare Managed IT Services Operating System Help Desk Risk Management Computers Analytics Office Tips Virtual Private Network Augmented Reality Website Health Storage Password Bring Your Own Device 2FA Retail The Internet of Things Remote Workers Scam Going Green Data loss Social Cybercrime Free Resource Project Management Windows 7 Patch Management Monitoring Save Money Remote Monitoring Customer Service Microsoft 365 Vulnerability End of Support Vendor Management Solutions Physical Security Display Telephone Printer Paperless Office Infrastructure Cooperation Windows 11 Firewall Document Management Excel Maintenance Antivirus iPhone Settings User Tip Wireless Modem Printing Processor Content Filtering Mobile Security Vulnerabilities YouTube Customer Relationship Management Data Privacy Cryptocurrency Images 101 Robot Smart Technology Multi-Factor Authentication Mobility Hacking Saving Time Presentation Virtual Desktop IT Management LiFi Data storage VPN Meetings Wireless Technology Managed IT Service Employees Outlook Integration Downloads Computer Repair Money Humor Licensing Entertainment Word Holidays Sports Data Storage Mouse Machine Learning Telephone System Video Conferencing Administration Cost Management Managed Services Provider Supply Chain Professional Services Virtual Machines Safety IT solutions Twitter Directions Regulations Compliance Assessment Workplace Permissions Evernote Legal Business Growth Error Memes Hiring/Firing Social Engineering Net Neutrality SQL Server Paperless Specifications Remote Computing Microchip Financial Data Cortana Internet Exlporer History Co-managed IT Fraud Application Alt Codes Smartwatch Username IT Technology Care Procurement Azure Business Communications Black Friday Tablet Downtime Hosted Solution Alert Telework Database Cyber security Scams IBM Tech IT Technicians Managed IT Typing File Sharing CES Dark Data Communitications Hybrid Work How To Proxy Server Supply Chain Management Cookies Human Resources Cyber Monday Notifications FinTech Knowledge Tactics Cables Hotspot Term Google Drive Mirgation Travel IT Assessment Flexibility 5G Nanotechnology Value Google Apps Competition Techology Google Maps Unified Communications Organization Experience Addiction IT Maintenance Language Google Docs Business Intelligence Chatbots Bitcoin Unified Threat Management Digital Security Cameras Running Cable Management Smart Devices Remote Working Screen Reader Memory Shortcuts Unified Threat Management Distributed Denial of Service Google Wallet User Service Level Agreement Data Breach Ransmoware Computing Infrastructure Google Play Vendors Identity Windows 8 Videos Laptop Network Congestion Electronic Health Records Bookmark Smart Tech Wasting Time Be Proactive User Error Drones Download Trend Micro Workforce IP Address Alerts Security Cameras Threats Point of Sale Halloween Software as a Service Browsers Connectivity Managing Costs Workplace Strategies Break Fix Recovery Network Management Tech Support Upload eCommerce Meta SSID Amazon Virtual Assistant Hard Drives Multi-Factor Security Hacks Scary Stories Monitors Social Network Surveillance Fun IoT Virtual Machine Domains Dark Web Deep Learning Websites Reviews Trends Outsource IT Medical IT Customer Resource management Development Environment Regulations Transportation Media Refrigeration Google Calendar Education Electronic Medical Records Data Analysis Star Wars Hypervisor Public Speaking SharePoint Microsoft Excel Staff PowerPoint Shopping Gamification Optimization Small Businesses Lithium-ion battery Displays Social Networking Employer/Employee Relationships Lenovo Legislation Mobile Computing Entrepreneur Writing Virtual Reality Fileless Malware PCI DSS Search Navigation Wearable Technology Server Management Best Practice Private Cloud Gig Economy Content Outsourcing Health IT Internet Service Provider Motherboard Teamwork Undo Superfish Comparison Identity Theft Buisness

Blog Archive