Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Adware Lawsuit Between Lenovo And FTC Settled

Adware Lawsuit Between Lenovo And FTC Settled

About two and a half years ago, Lenovo was brought under fire for manufacturing products that had adware preinstalled on them. This malware, a variant called Superfish, was installed on up to 750,000 Lenovo devices, and the company--eager to put this incident behind them--still refuses to admit fault, despite paying reparations and other fees as a result. Superfish allowed access to sensitive information and a root certificate, which could be used to access encrypted data on the same network. All in all, it was a rather embarrassing and dangerous scenario for Lenovo, and it comes with its fair share of consequences.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Passwords Quick Tips Backup Cybersecurity Saving Money Communication Productivity Smartphone Data Backup Managed Service Android Upgrade Business Management Smartphones VoIP Mobile Devices Data Recovery AI communications Disaster Recovery Windows Browser Social Media Managed IT Services Microsoft Office Current Events Network Tech Term Remote Internet of Things Facebook Automation Information Artificial Intelligence Miscellaneous Gadgets Covid-19 Cloud Computing Holiday Training Remote Work Server Managed Service Provider Outsourced IT Spam Encryption Compliance Employee/Employer Relationship IT Support Windows 10 Office Business Continuity Government Data Management Bandwidth Business Technology Virtualization Wi-Fi Blockchain Windows 10 Apps Data Security Mobile Office Vendor Two-factor Authentication Budget Tip of the week Apple Employer-Employee Relationship App Networking BYOD Mobile Device Management Gmail Chrome Managed Services Voice over Internet Protocol WiFi Conferencing How To Hacker BDR Avoiding Downtime Computing Marketing Information Technology HIPAA Applications Office 365 Access Control Help Desk Healthcare Storage Big Data Password Bring Your Own Device 2FA Retail Managed IT Services Computers Operating System Website Risk Management Router Virtual Private Network Analytics Office Tips Augmented Reality Health Monitoring The Internet of Things Social Document Management Windows 11 Free Resource Project Management Windows 7 Telephone Excel Scam Microsoft 365 Data loss Customer Service Going Green Solutions Cooperation Cybercrime Patch Management Save Money Remote Monitoring End of Support Vulnerability Vendor Management Physical Security Firewall Display Printer Paperless Office Infrastructure Remote Workers Smart Technology iPhone Sports Machine Learning Mouse Saving Time Vulnerabilities Supply Chain Administration Managed IT Service Maintenance Images 101 Customer Relationship Management Downloads Antivirus Multi-Factor Authentication Mobility Licensing Entertainment Hacking Presentation Settings Wireless Printing Employees Content Filtering Integration Wireless Technology YouTube Telephone System Robot Cost Management Data Privacy Cryptocurrency Holidays Word IT Management Meetings Data Storage Virtual Desktop VPN Data storage LiFi Video Conferencing User Tip Managed Services Provider Modem Outlook Processor Computer Repair Virtual Machines Professional Services Mobile Security Money Safety Humor Scary Stories SQL Server Mirgation Amazon Hacks Websites Net Neutrality Financial Data History Fun Nanotechnology Language SharePoint Outsource IT Smartwatch Deep Learning Electronic Medical Records IT Addiction Management Azure Chatbots Environment Media Procurement Telework Education Writing Cyber security Screen Reader Tech Application Distributed Denial of Service Lenovo Computing Infrastructure Small Businesses CES Virtual Reality Communitications Service Level Agreement IBM Identity Server Management Displays Mobile Computing Private Cloud Supply Chain Management Identity Theft FinTech Bookmark Search Smart Tech Term Superfish Alerts Outsourcing Best Practice Twitter IT Assessment Download Flexibility Buisness Value Error Legal Workplace Organization IT solutions Browsers Social Engineering Connectivity Break Fix Competition Hiring/Firing Digital Security Cameras Business Growth Remote Computing Smart Devices Upload Remote Working Social Network Memory Multi-Factor Security Paperless Tablet Co-managed IT Data Breach Cortana IoT Google Play Dark Web Technology Care Videos Alt Codes Alert Electronic Health Records Trends Downtime Customer Resource management Dark Data Wasting Time Regulations User Google Calendar Managed IT File Sharing Business Communications Scams Hosted Solution Data Analysis How To Trend Micro Star Wars Security Cameras Microsoft Excel Staff Hybrid Work Typing Notifications Software as a Service Gamification Human Resources Managing Costs IP Address Social Networking Legislation Travel Google Drive Google Maps Cables Fileless Malware eCommerce Knowledge SSID Techology Virtual Assistant Wearable Technology Surveillance Content Google Apps Health IT Virtual Machine 5G Motherboard Recovery Comparison Unified Threat Management Unified Threat Management Google Docs IT Maintenance Reviews Unified Communications Directions Experience Assessment Medical IT Hard Drives Permissions Transportation Domains Business Intelligence Bitcoin Development Running Cable Shortcuts Network Congestion Hypervisor Specifications Google Wallet User Error Ransmoware Shopping Microchip Optimization Internet Exlporer PowerPoint Refrigeration Fraud Employer/Employee Relationships Public Speaking Vendors Windows 8 Laptop Username Point of Sale Be Proactive PCI DSS Lithium-ion battery Navigation Black Friday Drones Entrepreneur Workforce Gig Economy Database Teamwork IT Technicians Network Management Threats Tech Support Internet Service Provider Halloween Workplace Strategies Regulations Compliance Proxy Server Monitors Cookies Evernote Cyber Monday Hotspot Meta Memes Tactics Undo

Blog Archive