Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Adware Lawsuit Between Lenovo And FTC Settled

Adware Lawsuit Between Lenovo And FTC Settled

About two and a half years ago, Lenovo was brought under fire for manufacturing products that had adware preinstalled on them. This malware, a variant called Superfish, was installed on up to 750,000 Lenovo devices, and the company--eager to put this incident behind them--still refuses to admit fault, despite paying reparations and other fees as a result. Superfish allowed access to sensitive information and a root certificate, which could be used to access encrypted data on the same network. All in all, it was a rather embarrassing and dangerous scenario for Lenovo, and it comes with its fair share of consequences.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Workplace Tips Computer Phishing Email IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Quick Tips Passwords Backup Cybersecurity Saving Money Communication Productivity Managed Service Data Backup Smartphone Android Upgrade Smartphones AI VoIP Business Management Mobile Devices communications Data Recovery Disaster Recovery Windows Social Media Browser Microsoft Office Managed IT Services Current Events Network Remote Tech Term Internet of Things Automation Facebook Artificial Intelligence Information Miscellaneous Gadgets Cloud Computing Covid-19 Holiday Training Remote Work Server Managed Service Provider Compliance Outsourced IT Spam Encryption Employee/Employer Relationship IT Support Office Windows 10 Business Continuity Government Data Management Bandwidth Business Technology Wi-Fi Windows 10 Blockchain Virtualization Data Security Vendor Apps Mobile Office Two-factor Authentication Budget Employer-Employee Relationship Apple BYOD App Tip of the week Mobile Device Management Managed Services Voice over Internet Protocol Gmail Networking Chrome BDR Applications Hacker Conferencing Avoiding Downtime Access Control Marketing Computing Information Technology Office 365 WiFi How To HIPAA Router Storage Password Bring Your Own Device Help Desk Computers 2FA Virtual Private Network Health Website Operating System Risk Management Retail Healthcare Analytics Office Tips Managed IT Services Augmented Reality Big Data Social Windows 7 Patch Management Save Money Microsoft 365 Remote Monitoring End of Support Vulnerability Vendor Management Solutions Monitoring Customer Service Windows 11 Physical Security Display Printer Going Green Excel Paperless Office Infrastructure Telephone Cybercrime Document Management Cooperation Firewall Remote Workers Scam Data loss The Internet of Things Free Resource Project Management Images 101 Multi-Factor Authentication Robot Mobility User Tip Modem Sports Mobile Security Processor Mouse Customer Relationship Management IT Management Administration Meetings VPN Employees Integration Smart Technology Hacking Presentation Supply Chain Saving Time Computer Repair Wireless Technology Holidays Settings Wireless Printing Managed IT Service Content Filtering Data Storage Downloads Video Conferencing YouTube Managed Services Provider Licensing Word Machine Learning Virtual Machines Cryptocurrency Professional Services Entertainment Data Privacy Maintenance Virtual Desktop LiFi Antivirus Data storage Telephone System iPhone Safety Cost Management Outlook Vulnerabilities Money Humor Workforce IT Assessment Hacks How To Scary Stories Specifications Application Fun Threats Microchip Flexibility Internet Exlporer Notifications Value Fraud Username Travel Deep Learning IBM Workplace Strategies Organization Meta Techology Digital Security Cameras Google Maps Smart Devices Black Friday Amazon Remote Working Database Memory Education Unified Threat Management Data Breach IT Technicians Google Play Outsource IT Unified Threat Management Videos Proxy Server Electronic Health Records Mobile Computing Cookies Cyber Monday Hotspot Search Competition Environment Media Tactics Wasting Time Trend Micro Best Practice Mirgation Network Congestion Security Cameras Small Businesses User Error Software as a Service Nanotechnology Buisness IT solutions Language Displays Legal Addiction Managing Costs Management Point of Sale eCommerce Business Growth Chatbots SSID User Outsourcing Surveillance Screen Reader Virtual Assistant Distributed Denial of Service Virtual Machine Computing Infrastructure Cortana Network Management Service Level Agreement Tech Support Reviews Alt Codes Identity Monitors Medical IT IP Address Workplace Hiring/Firing Bookmark Development Smart Tech Transportation Downtime Hypervisor Hosted Solution Alerts Paperless Download Websites Shopping Optimization Typing PowerPoint Recovery Co-managed IT Hard Drives Technology Care SharePoint Browsers Connectivity Electronic Medical Records Employer/Employee Relationships Break Fix Navigation Knowledge Domains Business Communications PCI DSS Google Drive Upload Gig Economy Social Network Writing Multi-Factor Security Scams Lenovo 5G Refrigeration Hybrid Work Internet Service Provider IoT Virtual Reality Teamwork Dark Web Unified Communications Evernote Experience Public Speaking Human Resources Server Management Regulations Compliance Google Docs Trends Private Cloud Superfish Customer Resource management Identity Theft Memes Bitcoin Regulations Running Cable Lithium-ion battery Google Calendar Cables Entrepreneur Data Analysis Net Neutrality Google Wallet Star Wars Twitter SQL Server Microsoft Excel Error History Staff Google Apps Financial Data Gamification Smartwatch IT Windows 8 Social Networking Social Engineering Laptop Legislation IT Maintenance Undo Business Intelligence Fileless Malware Procurement Drones Remote Computing Azure Cyber security Wearable Technology Tech Shortcuts Telework Content CES Health IT Tablet Communitications Motherboard Halloween Comparison Ransmoware Vendors Directions Supply Chain Management Assessment Alert Permissions File Sharing Dark Data Term Be Proactive Managed IT FinTech

Blog Archive