Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Adware Lawsuit Between Lenovo And FTC Settled

Adware Lawsuit Between Lenovo And FTC Settled

About two and a half years ago, Lenovo was brought under fire for manufacturing products that had adware preinstalled on them. This malware, a variant called Superfish, was installed on up to 750,000 Lenovo devices, and the company--eager to put this incident behind them--still refuses to admit fault, despite paying reparations and other fees as a result. Superfish allowed access to sensitive information and a root certificate, which could be used to access encrypted data on the same network. All in all, it was a rather embarrassing and dangerous scenario for Lenovo, and it comes with its fair share of consequences.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Services IT Support Workplace Tips Privacy Google Computer Phishing Email Workplace Strategy Hosted Solutions Collaboration Small Business Users Backup Ransomware Mobile Device Productivity Microsoft Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery AI Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Miscellaneous Information Holiday Automation Facebook Artificial Intelligence Gadgets Covid-19 Cloud Computing Training Compliance Server Remote Work Managed Service Provider Outsourced IT IT Support Spam Encryption Employee/Employer Relationship Office Windows 10 Business Continuity Government Data Management Virtualization Bandwidth Blockchain Wi-Fi Windows 10 Business Technology Apps Data Security Vendor Mobile Office Two-factor Authentication Budget Employer-Employee Relationship Apple Networking App BYOD Mobile Device Management Gmail Tip of the week Chrome Managed Services Voice over Internet Protocol WiFi Conferencing How To BDR Hacker Avoiding Downtime HIPAA Computing Marketing Applications Information Technology Access Control Office 365 Big Data Retail Healthcare Storage Password Bring Your Own Device Managed IT Services Computers Operating System Website Router Physical Security Virtual Private Network Risk Management 2FA Health Help Desk Analytics Office Tips Augmented Reality Social Telephone Scam Data loss Free Resource Project Management Windows 7 Cooperation Customer Service Microsoft 365 Going Green Patch Management Save Money Solutions Remote Monitoring Vulnerability End of Support Vendor Management Cybercrime Display Windows 11 Printer Firewall Paperless Office Infrastructure Monitoring Excel The Internet of Things Document Management Remote Workers Managed IT Service iPhone Maintenance Sports Downloads Antivirus Mouse Vulnerabilities Licensing Data Privacy Customer Relationship Management Entertainment Administration Images 101 Multi-Factor Authentication Mobility Hacking Presentation Telephone System Robot Cost Management Settings Wireless Technology Printing Wireless Employees Content Filtering Integration IT Management VPN YouTube Meetings Cryptocurrency User Tip Word Modem Processor Holidays Computer Repair Mobile Security Data Storage Virtual Desktop Supply Chain Data storage LiFi Video Conferencing Managed Services Provider Smart Technology Professional Services Safety Outlook Virtual Machines Machine Learning Money Saving Time Humor Net Neutrality Scary Stories Private Cloud Identity SQL Server Technology Care Hacks Server Management Superfish Bookmark Financial Data Identity Theft Smart Tech History Fun Business Communications Scams Smartwatch Application Deep Learning Download IT Twitter Alerts Procurement Error Azure Hybrid Work IBM Browsers Telework Education Connectivity Cyber security Social Engineering Break Fix Tech Human Resources Cables CES Upload Communitications Remote Computing Supply Chain Management Multi-Factor Security Mobile Computing Social Network FinTech Tablet IoT Search Dark Web Term Google Apps IT Maintenance Best Practice Trends IT Assessment Alert Managed IT Customer Resource management Flexibility Buisness File Sharing Regulations Value Business Intelligence Dark Data Google Calendar Competition Legal Data Analysis Organization IT solutions Star Wars How To Microsoft Excel Shortcuts Notifications Staff Ransmoware Digital Security Cameras Business Growth Gamification Smart Devices Remote Working Travel Social Networking Memory Vendors Legislation Techology Fileless Malware User Google Maps Data Breach Cortana Google Play Be Proactive Electronic Health Records Wearable Technology Workforce Videos Alt Codes Content Health IT Downtime Unified Threat Management Motherboard Wasting Time Threats Comparison Security Cameras Workplace Strategies IP Address Unified Threat Management Directions Hosted Solution Assessment Trend Micro Permissions Software as a Service Meta Typing Managing Costs Amazon Network Congestion Specifications SSID Google Drive User Error Microchip Recovery Internet Exlporer eCommerce Knowledge Fraud Surveillance Virtual Assistant Outsource IT Hard Drives Username Domains Point of Sale Virtual Machine Environment 5G Black Friday Media Medical IT Google Docs Reviews Unified Communications Database Experience Development Running Cable Tech Support IT Technicians Transportation Small Businesses Refrigeration Bitcoin Network Management Public Speaking Google Wallet Proxy Server Cookies Hypervisor Displays Monitors Cyber Monday PowerPoint Lithium-ion battery Shopping Tactics Optimization Hotspot Entrepreneur Laptop Websites Mirgation Employer/Employee Relationships Outsourcing Windows 8 Drones PCI DSS Nanotechnology Navigation Workplace SharePoint Gig Economy Addiction Electronic Medical Records Language Internet Service Provider Halloween Chatbots Teamwork Hiring/Firing Undo Management Lenovo Regulations Compliance Screen Reader Writing Distributed Denial of Service Evernote Paperless Co-managed IT Service Level Agreement Memes Virtual Reality Computing Infrastructure

Blog Archive