Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Adware Lawsuit Between Lenovo And FTC Settled

Adware Lawsuit Between Lenovo And FTC Settled

About two and a half years ago, Lenovo was brought under fire for manufacturing products that had adware preinstalled on them. This malware, a variant called Superfish, was installed on up to 750,000 Lenovo devices, and the company--eager to put this incident behind them--still refuses to admit fault, despite paying reparations and other fees as a result. Superfish allowed access to sensitive information and a root certificate, which could be used to access encrypted data on the same network. All in all, it was a rather embarrassing and dangerous scenario for Lenovo, and it comes with its fair share of consequences.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Workplace Tips Computer Phishing Email IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Passwords Backup Quick Tips Saving Money Cybersecurity Communication Productivity Managed Service Data Backup Smartphone Android Upgrade Business Management Smartphones AI VoIP communications Mobile Devices Data Recovery Windows Disaster Recovery Social Media Browser Managed IT Services Microsoft Office Network Current Events Tech Term Remote Internet of Things Automation Artificial Intelligence Information Facebook Training Miscellaneous Gadgets Cloud Computing Covid-19 Holiday Server Managed Service Provider Remote Work Outsourced IT Compliance Encryption Employee/Employer Relationship Spam IT Support Windows 10 Office Business Continuity Government Data Management Virtualization Business Technology Wi-Fi Bandwidth Blockchain Windows 10 Apps Two-factor Authentication Mobile Office Data Security Vendor Employer-Employee Relationship Tip of the week Managed Services Voice over Internet Protocol Networking Chrome Budget Mobile Device Management Gmail BYOD Apple App Access Control Computing Information Technology Conferencing Hacker Office 365 Avoiding Downtime How To Marketing BDR HIPAA Applications WiFi Big Data Health Operating System 2FA Help Desk Risk Management Retail Computers Healthcare Analytics Office Tips Managed IT Services Website Augmented Reality Storage Password Bring Your Own Device Router Virtual Private Network Printer Going Green Paperless Office Social Windows 11 Infrastructure Monitoring Cybercrime Excel Document Management Customer Service Remote Workers Telephone Scam Data loss Cooperation Free Resource Project Management Windows 7 Patch Management Save Money Microsoft 365 Remote Monitoring Firewall End of Support Vulnerability Vendor Management Solutions Physical Security The Internet of Things Display Processor Computer Repair Mobile Security Holidays Settings Wireless Printing Content Filtering Data Storage Smart Technology Supply Chain YouTube Video Conferencing Managed Services Provider Customer Relationship Management Machine Learning Saving Time Virtual Machines Cryptocurrency Professional Services Managed IT Service Hacking Virtual Desktop Presentation Maintenance Data storage LiFi Downloads Antivirus iPhone Licensing Wireless Technology Outlook Entertainment Vulnerabilities Data Privacy Money Humor Images 101 Word Telephone System Robot Multi-Factor Authentication Mobility Cost Management Sports Mouse Administration IT Management Meetings Employees Safety VPN Integration User Tip Modem Database Surveillance Virtual Assistant Outsource IT IT Technicians Virtual Machine Environment Media Cortana Network Management Tech Support Proxy Server Reviews Monitors Cookies Alt Codes Cyber Monday Medical IT Application Downtime Tactics Development Hotspot Transportation Small Businesses Mirgation Hypervisor Displays Hosted Solution IBM Websites Shopping Nanotechnology Optimization Typing PowerPoint SharePoint Electronic Medical Records Addiction Language Employer/Employee Relationships Outsourcing Management PCI DSS Google Drive Chatbots Navigation Knowledge Gig Economy Writing Screen Reader Distributed Denial of Service Workplace Lenovo Computing Infrastructure Teamwork Hiring/Firing Competition 5G Virtual Reality Service Level Agreement Internet Service Provider Regulations Compliance Google Docs Identity Unified Communications Evernote Paperless Experience Server Management Private Cloud Identity Theft Bookmark Smart Tech Memes Bitcoin Co-managed IT Running Cable Superfish Alerts SQL Server Technology Care Twitter Download Net Neutrality Google Wallet Financial Data History Business Communications User Error Browsers Smartwatch Social Engineering Connectivity IT Windows 8 Break Fix Scams Laptop Azure Hybrid Work Remote Computing Upload Procurement Drones Social Network Telework Cyber security IP Address Multi-Factor Security Tech Human Resources Tablet CES IoT Communitications Dark Web Cables Halloween Alert Trends Supply Chain Management File Sharing Customer Resource management FinTech Dark Data Regulations Google Calendar Term Google Apps Managed IT Recovery Hard Drives Data Analysis How To Star Wars IT Assessment Hacks Microsoft Excel IT Maintenance Scary Stories Staff Value Business Intelligence Domains Fun Notifications Gamification Flexibility Travel Organization Social Networking Deep Learning Legislation Shortcuts Techology Refrigeration Google Maps Fileless Malware Digital Security Cameras Smart Devices Ransmoware Wearable Technology Memory Vendors Education Public Speaking Content Remote Working Unified Threat Management Health IT Motherboard Data Breach Lithium-ion battery Comparison Google Play Be Proactive Unified Threat Management Entrepreneur Directions Videos Assessment Electronic Health Records Mobile Computing Permissions Workforce Wasting Time Threats Search Network Congestion Trend Micro Best Practice Specifications Security Cameras Workplace Strategies User Error Undo Microchip Internet Exlporer Software as a Service Fraud Meta Buisness Managing Costs Amazon IT solutions Username Legal Point of Sale eCommerce Business Growth Black Friday SSID

Blog Archive