Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Adware Lawsuit Between Lenovo And FTC Settled

Adware Lawsuit Between Lenovo And FTC Settled

About two and a half years ago, Lenovo was brought under fire for manufacturing products that had adware preinstalled on them. This malware, a variant called Superfish, was installed on up to 750,000 Lenovo devices, and the company--eager to put this incident behind them--still refuses to admit fault, despite paying reparations and other fees as a result. Superfish allowed access to sensitive information and a root certificate, which could be used to access encrypted data on the same network. All in all, it was a rather embarrassing and dangerous scenario for Lenovo, and it comes with its fair share of consequences.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support Workplace Tips IT Services Privacy Computer Google Email Phishing Workplace Strategy Hosted Solutions Collaboration Users Small Business Ransomware Backup Mobile Device Productivity Microsoft Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery AI Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Social Media Browser Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Miscellaneous Automation Artificial Intelligence Information Facebook Holiday Training Gadgets Covid-19 Cloud Computing Compliance Server Managed Service Provider Remote Work IT Support Outsourced IT Spam Encryption Employee/Employer Relationship Windows 10 Office Business Continuity Government Data Management Virtualization Business Technology Bandwidth Blockchain Windows 10 Wi-Fi Two-factor Authentication Apps Mobile Office Vendor Data Security Managed Services Voice over Internet Protocol Employer-Employee Relationship Tip of the week Chrome Budget Apple Networking App Mobile Device Management Gmail BYOD WiFi Conferencing Access Control Office 365 Hacker Avoiding Downtime How To HIPAA Marketing BDR Applications Computing Information Technology Big Data Health Healthcare Analytics Office Tips Augmented Reality Retail Storage Computers Password Bring Your Own Device Managed IT Services Website Router Operating System 2FA Help Desk Physical Security Risk Management Virtual Private Network Printer Paperless Office Social Remote Workers Infrastructure Telephone Document Management Customer Service Cooperation Free Resource Project Management Windows 7 Scam Data loss Microsoft 365 Solutions Going Green Patch Management Save Money Firewall Remote Monitoring End of Support Vulnerability Vendor Management Windows 11 Cybercrime Monitoring The Internet of Things Display Excel Saving Time Virtual Machines Computer Repair Professional Services Virtual Desktop Data storage LiFi Managed IT Service Downloads Outlook iPhone Machine Learning Customer Relationship Management Licensing Money Humor Entertainment Vulnerabilities Data Privacy Hacking Images 101 Maintenance Presentation Antivirus Sports Telephone System Multi-Factor Authentication Mobility Mouse Cost Management Wireless Technology Administration Employees Integration Word Robot User Tip Modem Processor Settings Mobile Security Wireless Printing Holidays Content Filtering IT Management Safety VPN Data Storage YouTube Meetings Smart Technology Supply Chain Cryptocurrency Video Conferencing Managed Services Provider Google Docs Gig Economy Unified Communications Screen Reader Experience Distributed Denial of Service Workplace Bitcoin Network Management Service Level Agreement Internet Service Provider Running Cable Tech Support Computing Infrastructure Teamwork Hiring/Firing Identity Monitors Application Evernote Paperless Google Wallet Regulations Compliance Bookmark Smart Tech Memes Co-managed IT Windows 8 Download Net Neutrality Laptop Websites IBM Alerts SQL Server Technology Care History Business Communications Drones Financial Data SharePoint Browsers Smartwatch Connectivity IT Electronic Medical Records Break Fix Scams Upload Procurement Halloween Azure Hybrid Work Cyber security Writing Multi-Factor Security Tech Human Resources Lenovo Social Network Telework CES IoT Communitications Virtual Reality Competition Dark Web Cables Hacks Server Management Trends Supply Chain Management Scary Stories Private Cloud Identity Theft Regulations Fun Google Calendar Term Google Apps Superfish Customer Resource management FinTech Data Analysis Deep Learning Star Wars IT Assessment Twitter Microsoft Excel IT Maintenance User Gamification Flexibility Error Staff Value Business Intelligence Organization Education Social Networking Social Engineering Legislation Shortcuts Fileless Malware Digital Security Cameras Smart Devices Remote Computing Ransmoware Wearable Technology Memory Vendors Mobile Computing Content Remote Working IP Address Health IT Tablet Motherboard Data Breach Search Comparison Google Play Be Proactive Directions Videos Best Practice Assessment Electronic Health Records Alert Permissions Workforce Wasting Time Threats Dark Data Recovery Managed IT Buisness File Sharing IT solutions Trend Micro How To Hard Drives Specifications Security Cameras Workplace Strategies Legal Microchip Business Growth Internet Exlporer Software as a Service Notifications Domains Fraud Meta Managing Costs Amazon Username Travel Google Maps eCommerce Cortana Refrigeration Black Friday SSID Techology Alt Codes Database Surveillance Public Speaking Virtual Assistant Outsource IT Lithium-ion battery IT Technicians Virtual Machine Environment Media Downtime Unified Threat Management Proxy Server Reviews Hosted Solution Cookies Cyber Monday Medical IT Entrepreneur Unified Threat Management Typing Tactics Development Hotspot Transportation Small Businesses Mirgation Hypervisor Displays Network Congestion Google Drive User Error Shopping Nanotechnology Optimization Knowledge Undo PowerPoint Addiction Language Employer/Employee Relationships Outsourcing Point of Sale Chatbots 5G Navigation Management PCI DSS

Blog Archive