Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Adware Lawsuit Between Lenovo And FTC Settled

Adware Lawsuit Between Lenovo And FTC Settled

About two and a half years ago, Lenovo was brought under fire for manufacturing products that had adware preinstalled on them. This malware, a variant called Superfish, was installed on up to 750,000 Lenovo devices, and the company--eager to put this incident behind them--still refuses to admit fault, despite paying reparations and other fees as a result. Superfish allowed access to sensitive information and a root certificate, which could be used to access encrypted data on the same network. All in all, it was a rather embarrassing and dangerous scenario for Lenovo, and it comes with its fair share of consequences.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Workplace Strategy Users Ransomware Mobile Device Microsoft Backup Productivity Small Business Quick Tips Passwords Managed Service Saving Money Cybersecurity Communication Data Backup Smartphone Android Upgrade AI Disaster Recovery Data Recovery Business Management VoIP Smartphones Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Information Holiday Artificial Intelligence Automation Facebook Miscellaneous Cloud Computing Training Covid-19 Gadgets Server Managed Service Provider Remote Work Compliance IT Support Outsourced IT Employee/Employer Relationship Encryption Spam Office Windows 10 Government Data Management Business Continuity Wi-Fi Blockchain Windows 10 Business Technology Bandwidth Virtualization Data Security Vendor Two-factor Authentication Mobile Office Apps Managed Services Voice over Internet Protocol BYOD Mobile Device Management Chrome Gmail Budget Tip of the week WiFi Apple App Employer-Employee Relationship Networking How To BDR Computing Hacker Information Technology Avoiding Downtime HIPAA Marketing Applications Office 365 Access Control Conferencing Operating System Healthcare Computers Risk Management Website Router Virtual Private Network Office Tips Analytics Augmented Reality Health Help Desk Storage Password Bring Your Own Device Big Data Retail 2FA Managed IT Services Cooperation Remote Workers Customer Service Cybercrime Patch Management Save Money Remote Monitoring Vulnerability End of Support Vendor Management Free Resource Project Management Windows 7 Physical Security Microsoft 365 Display Printer Firewall Solutions Paperless Office Infrastructure Monitoring The Internet of Things Document Management Windows 11 Social Telephone Scam Data loss Excel Going Green Settings Printing Wireless Content Filtering Hacking Presentation Telephone System YouTube iPhone Robot Cost Management Cryptocurrency Wireless Technology Vulnerabilities Data Privacy IT Management Images 101 VPN Virtual Desktop Meetings Data storage LiFi Multi-Factor Authentication Mobility User Tip Word Modem Computer Repair Mobile Security Outlook Processor Money Humor Employees Integration Smart Technology Safety Sports Machine Learning Mouse Saving Time Holidays Administration Managed IT Service Maintenance Data Storage Antivirus Supply Chain Downloads Video Conferencing Managed Services Provider Licensing Virtual Machines Professional Services Customer Relationship Management Entertainment Alt Codes Trends Evernote Paperless Alert Regulations Compliance Competition Memes Managed IT Customer Resource management Downtime Co-managed IT File Sharing Regulations Dark Data Google Calendar How To Microsoft Excel Net Neutrality Data Analysis Hosted Solution SQL Server Technology Care Star Wars Typing History Gamification Business Communications Notifications Staff Financial Data Smartwatch IT Scams Travel Social Networking Legislation Knowledge Google Drive Procurement Techology Fileless Malware User Azure Hybrid Work Google Maps Cyber security Content Tech Human Resources Wearable Technology Telework CES Communitications Health IT Cables Unified Threat Management Motherboard 5G Comparison Experience Permissions IP Address Google Docs Supply Chain Management Unified Threat Management Directions Unified Communications Assessment Bitcoin Running Cable Term Google Apps FinTech Google Wallet IT Assessment IT Maintenance Network Congestion Specifications Fraud Flexibility User Error Microchip Recovery Value Business Intelligence Internet Exlporer Hard Drives Windows 8 Username Laptop Shortcuts Organization Digital Security Cameras Domains Drones Smart Devices Ransmoware Point of Sale Black Friday Remote Working Memory Vendors Database Refrigeration Data Breach Network Management Halloween Google Play Be Proactive Tech Support IT Technicians Videos Public Speaking Electronic Health Records Proxy Server Workforce Cookies Monitors Cyber Monday Hotspot Lithium-ion battery Wasting Time Threats Tactics Hacks Trend Micro Entrepreneur Scary Stories Security Cameras Workplace Strategies Websites Mirgation Software as a Service Meta Nanotechnology Fun Electronic Medical Records Language SharePoint Deep Learning Managing Costs Amazon Addiction Undo eCommerce Management SSID Chatbots Surveillance Lenovo Education Virtual Assistant Outsource IT Screen Reader Writing Distributed Denial of Service Media Virtual Reality Computing Infrastructure Virtual Machine Environment Service Level Agreement Mobile Computing Server Management Medical IT Private Cloud Identity Reviews Development Superfish Bookmark Transportation Small Businesses Identity Theft Smart Tech Search Download Twitter Alerts Application Best Practice Hypervisor Displays Shopping Optimization Buisness PowerPoint Error Social Engineering Break Fix IBM Legal Browsers IT solutions Employer/Employee Relationships Outsourcing Connectivity Upload Navigation Remote Computing PCI DSS Business Growth Gig Economy Social Network Workplace Multi-Factor Security Dark Web Internet Service Provider Teamwork Hiring/Firing Tablet IoT Cortana

Blog Archive