Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Adware Lawsuit Between Lenovo And FTC Settled

Adware Lawsuit Between Lenovo And FTC Settled

About two and a half years ago, Lenovo was brought under fire for manufacturing products that had adware preinstalled on them. This malware, a variant called Superfish, was installed on up to 750,000 Lenovo devices, and the company--eager to put this incident behind them--still refuses to admit fault, despite paying reparations and other fees as a result. Superfish allowed access to sensitive information and a root certificate, which could be used to access encrypted data on the same network. All in all, it was a rather embarrassing and dangerous scenario for Lenovo, and it comes with its fair share of consequences.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Backup Passwords Quick Tips Saving Money Communication Productivity Cybersecurity Data Backup Managed Service Smartphone Android Upgrade AI Business Management VoIP Smartphones Data Recovery Mobile Devices communications Windows Disaster Recovery Browser Social Media Microsoft Office Managed IT Services Current Events Network Remote Internet of Things Tech Term Information Automation Artificial Intelligence Facebook Training Covid-19 Miscellaneous Gadgets Cloud Computing Holiday Managed Service Provider Remote Work Server Outsourced IT Compliance IT Support Employee/Employer Relationship Encryption Spam Windows 10 Office Data Management Business Continuity Government Business Technology Windows 10 Bandwidth Virtualization Wi-Fi Blockchain Two-factor Authentication Mobile Office Vendor Apps Data Security Mobile Device Management Chrome Tip of the week Gmail Budget Apple Networking App Employer-Employee Relationship Managed Services Voice over Internet Protocol BYOD Marketing HIPAA Office 365 Access Control Applications WiFi Conferencing How To BDR Computing Hacker Information Technology Avoiding Downtime Website Router Health Analytics Office Tips Augmented Reality Storage Password Retail Help Desk 2FA Bring Your Own Device Big Data Managed IT Services Operating System Computers Healthcare Risk Management Virtual Private Network Free Resource Printer Project Management Windows 7 Paperless Office Infrastructure Microsoft 365 Firewall Solutions Document Management Monitoring Windows 11 The Internet of Things Scam Excel Data loss Social Telephone Going Green Patch Management Save Money Customer Service Cooperation Remote Monitoring Vulnerability Remote Workers End of Support Cybercrime Vendor Management Physical Security Display Virtual Desktop Computer Repair Data storage LiFi Images 101 Word Outlook Multi-Factor Authentication Mobility Modem User Tip Processor Mobile Security Money Humor Machine Learning Employees Safety Integration Smart Technology Sports Maintenance Mouse Antivirus Supply Chain Saving Time Administration Holidays Managed IT Service Data Storage Downloads Video Conferencing Customer Relationship Management Managed Services Provider Licensing Professional Services Robot Settings Virtual Machines Wireless Printing Entertainment Content Filtering Hacking Presentation YouTube Data Privacy IT Management iPhone VPN Meetings Cryptocurrency Telephone System Cost Management Wireless Technology Vulnerabilities Directions Vendors Supply Chain Management Assessment Permissions Google Wallet Network Management Tech Support FinTech Be Proactive Recovery Term Hard Drives Specifications Windows 8 Monitors Laptop Workforce IT Assessment Microchip Threats Flexibility Internet Exlporer Domains Value Fraud Drones Websites Organization Username Workplace Strategies Refrigeration Black Friday Digital Security Cameras Halloween Meta Smart Devices Electronic Medical Records Amazon Remote Working Database Public Speaking Memory SharePoint Lithium-ion battery Data Breach IT Technicians Google Play Cookies Cyber Monday Lenovo Entrepreneur Hacks Videos Writing Proxy Server Scary Stories Outsource IT Electronic Health Records Virtual Reality Environment Tactics Fun Media Wasting Time Hotspot Server Management Private Cloud Deep Learning Trend Micro Mirgation Security Cameras Nanotechnology Undo Superfish Identity Theft Small Businesses Software as a Service Twitter Education Displays Addiction Managing Costs Language Error Management eCommerce Chatbots SSID Surveillance Screen Reader Virtual Assistant Distributed Denial of Service Mobile Computing Social Engineering Outsourcing Remote Computing Service Level Agreement Search Virtual Machine Computing Infrastructure Medical IT Best Practice Reviews Workplace Identity Application Development Smart Tech Transportation Tablet Bookmark Buisness Hiring/Firing Alert IT solutions Download Paperless IBM Hypervisor Alerts Legal PowerPoint Managed IT File Sharing Business Growth Shopping Dark Data Co-managed IT Optimization Connectivity Employer/Employee Relationships Break Fix How To Browsers Technology Care Notifications PCI DSS Upload Cortana Business Communications Navigation Multi-Factor Security Travel Alt Codes Gig Economy Social Network Scams Internet Service Provider IoT Competition Teamwork Dark Web Techology Google Maps Downtime Hybrid Work Hosted Solution Regulations Compliance Trends Human Resources Evernote Google Calendar Unified Threat Management Typing Customer Resource management Cables Memes Regulations Net Neutrality Star Wars SQL Server Microsoft Excel Unified Threat Management Data Analysis Google Drive Financial Data Gamification Knowledge Google Apps History Staff User Legislation Smartwatch Network Congestion IT Maintenance IT Social Networking Business Intelligence Procurement 5G Azure User Error Fileless Malware Google Docs Unified Communications Telework Content Experience Shortcuts IP Address Cyber security Wearable Technology Tech Comparison Point of Sale Bitcoin CES Health IT Running Cable Ransmoware Communitications Motherboard

Blog Archive