Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Adware Lawsuit Between Lenovo And FTC Settled

Adware Lawsuit Between Lenovo And FTC Settled

About two and a half years ago, Lenovo was brought under fire for manufacturing products that had adware preinstalled on them. This malware, a variant called Superfish, was installed on up to 750,000 Lenovo devices, and the company--eager to put this incident behind them--still refuses to admit fault, despite paying reparations and other fees as a result. Superfish allowed access to sensitive information and a root certificate, which could be used to access encrypted data on the same network. All in all, it was a rather embarrassing and dangerous scenario for Lenovo, and it comes with its fair share of consequences.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Email Workplace Tips Computer Google Phishing Hosted Solutions Collaboration Workplace Strategy Users Small Business Ransomware Mobile Device Backup Productivity Microsoft Managed Service Quick Tips Communication Passwords Saving Money Cybersecurity Smartphone Data Backup AI Data Recovery Disaster Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Remote Internet of Things Automation Facebook Miscellaneous Artificial Intelligence Holiday Information Covid-19 Gadgets Cloud Computing Training Remote Work Compliance Server Managed Service Provider IT Support Outsourced IT Employee/Employer Relationship Spam Encryption Windows 10 Office Business Continuity Government Data Management Business Technology Virtualization Bandwidth Blockchain Wi-Fi Windows 10 Two-factor Authentication Apps Data Security Mobile Office Vendor Tip of the week WiFi Chrome Employer-Employee Relationship Budget Networking Apple Managed Services Voice over Internet Protocol App BYOD Mobile Device Management Gmail Office 365 Conferencing How To BDR Hacker Avoiding Downtime Marketing HIPAA Computing Applications Information Technology Access Control Help Desk Big Data Analytics Office Tips Retail Augmented Reality Storage Managed IT Services Password Bring Your Own Device Computers Healthcare Website 2FA Operating System Virtual Private Network Router Health Risk Management Solutions The Internet of Things Document Management Monitoring Social Scam Data loss Telephone Customer Service Patch Management Cooperation Save Money Remote Workers Remote Monitoring Vulnerability End of Support Vendor Management Going Green Windows 11 Physical Security Free Resource Cybercrime Project Management Display Windows 7 Firewall Printer Excel Paperless Office Infrastructure Microsoft 365 Processor Safety Mobile Security Virtual Desktop Data storage LiFi Machine Learning Employees Integration Smart Technology Outlook Maintenance Saving Time Data Privacy Money Humor Antivirus Holidays Customer Relationship Management Managed IT Service Data Storage Downloads Sports Video Conferencing Mouse Hacking Managed Services Provider Licensing Professional Services Presentation Virtual Machines Administration Entertainment Robot Wireless Technology iPhone Telephone System IT Management Cost Management VPN Settings Meetings Wireless Vulnerabilities Word Printing Content Filtering Supply Chain Computer Repair Images 101 YouTube Mobility Cryptocurrency Multi-Factor Authentication User Tip Modem Paperless Unified Communications Remote Working Experience Websites Database Memory Google Docs IT Technicians Google Play Undo Co-managed IT Bitcoin Running Cable Data Breach Proxy Server Electronic Health Records Electronic Medical Records Cookies Cyber Monday Technology Care Google Wallet SharePoint Videos Business Communications Tactics Wasting Time Hotspot Writing Mirgation Security Cameras Scams Windows 8 Lenovo Laptop Trend Micro Software as a Service Virtual Reality Nanotechnology Hybrid Work Drones Human Resources Server Management Private Cloud Addiction Managing Costs Language Application Chatbots SSID Cables Superfish Halloween Identity Theft Management eCommerce Surveillance Twitter Screen Reader Virtual Assistant IBM Distributed Denial of Service Google Apps Error Service Level Agreement Virtual Machine Computing Infrastructure Social Engineering Identity Medical IT IT Maintenance Hacks Reviews Scary Stories Bookmark Development Fun Remote Computing Smart Tech Transportation Business Intelligence Shortcuts Deep Learning Download Hypervisor Alerts PowerPoint Competition Ransmoware Shopping Tablet Optimization Education Browsers Alert Connectivity Employer/Employee Relationships Break Fix Vendors Be Proactive Managed IT PCI DSS File Sharing Upload Dark Data Navigation How To Multi-Factor Security Workforce Mobile Computing Gig Economy Social Network Internet Service Provider Search Notifications IoT Teamwork Dark Web Threats User Workplace Strategies Best Practice Regulations Compliance Travel Trends Evernote Memes Regulations Google Calendar Meta Techology Buisness Google Maps Customer Resource management IT solutions Data Analysis Net Neutrality Star Wars SQL Server IP Address Microsoft Excel Amazon Legal Business Growth Financial Data Unified Threat Management Gamification History Staff IT Social Networking Legislation Outsource IT Unified Threat Management Smartwatch Media Fileless Malware Procurement Cortana Azure Environment Recovery Tech Hard Drives Alt Codes Telework Content Cyber security Network Congestion Wearable Technology Health IT Communitications Motherboard Domains Comparison Small Businesses User Error CES Downtime Hosted Solution Directions Supply Chain Management Assessment Permissions Displays Term Refrigeration Typing FinTech Point of Sale IT Assessment Public Speaking Specifications Outsourcing Network Management Microchip Flexibility Knowledge Tech Support Internet Exlporer Value Lithium-ion battery Fraud Google Drive Monitors Workplace Entrepreneur Organization Username Smart Devices 5G Black Friday Hiring/Firing Digital Security Cameras

Blog Archive