Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Adware Lawsuit Between Lenovo And FTC Settled

Adware Lawsuit Between Lenovo And FTC Settled

About two and a half years ago, Lenovo was brought under fire for manufacturing products that had adware preinstalled on them. This malware, a variant called Superfish, was installed on up to 750,000 Lenovo devices, and the company--eager to put this incident behind them--still refuses to admit fault, despite paying reparations and other fees as a result. Superfish allowed access to sensitive information and a root certificate, which could be used to access encrypted data on the same network. All in all, it was a rather embarrassing and dangerous scenario for Lenovo, and it comes with its fair share of consequences.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Workplace Tips Google Email Computer Phishing Workplace Strategy Collaboration Hosted Solutions Users Small Business Ransomware Backup Mobile Device Productivity Microsoft Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone AI Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Holiday Information Automation Artificial Intelligence Facebook Miscellaneous Cloud Computing Training Covid-19 Gadgets Server Remote Work Managed Service Provider Compliance IT Support Outsourced IT Employee/Employer Relationship Encryption Spam Office Windows 10 Business Continuity Data Management Government Wi-Fi Blockchain Business Technology Windows 10 Bandwidth Virtualization Two-factor Authentication Vendor Mobile Office Data Security Apps BYOD Tip of the week Mobile Device Management Chrome Budget Gmail Managed Services Apple Networking Voice over Internet Protocol WiFi App Employer-Employee Relationship Computing Hacker Information Technology HIPAA Avoiding Downtime Access Control Applications Marketing Office 365 Conferencing How To BDR Operating System Physical Security Computers Virtual Private Network Risk Management Router Health Website Analytics Office Tips Augmented Reality 2FA Retail Help Desk Storage Password Bring Your Own Device Managed IT Services Healthcare Big Data Windows 7 Vendor Management Cybercrime Customer Service Microsoft 365 Display Printer Solutions Paperless Office Infrastructure Windows 11 Document Management Firewall Monitoring Excel Scam Data loss The Internet of Things Remote Workers Telephone Social Going Green Patch Management Save Money Cooperation Free Resource Remote Monitoring Vulnerability End of Support Project Management Content Filtering Images 101 IT Management VPN Mobility YouTube Meetings Telephone System Multi-Factor Authentication Cost Management Hacking Presentation Cryptocurrency Computer Repair Wireless Technology Virtual Desktop Employees Data storage Integration LiFi Modem User Tip Processor Outlook Mobile Security Word Machine Learning Holidays Money Humor Data Storage Smart Technology Supply Chain Video Conferencing Maintenance Sports Managed Services Provider Antivirus Virtual Machines Safety Mouse Professional Services Saving Time Managed IT Service Administration Downloads iPhone Licensing Robot Vulnerabilities Entertainment Settings Data Privacy Printing Wireless Customer Relationship Management Star Wars IT Assessment Unified Threat Management Microsoft Excel IT Maintenance Hosted Solution Data Analysis Gamification Flexibility Staff Value Business Intelligence Competition Typing Legislation Shortcuts Network Congestion Organization Social Networking Fileless Malware Digital Security Cameras Smart Devices Google Drive User Error Ransmoware Knowledge Content Remote Working Wearable Technology Memory Vendors Motherboard Data Breach Comparison Google Play Be Proactive User Point of Sale 5G Health IT Directions Videos Assessment Electronic Health Records Google Docs Permissions Workforce Unified Communications Experience Running Cable Tech Support Wasting Time Threats Bitcoin Network Management Trend Micro IP Address Google Wallet Specifications Security Cameras Workplace Strategies Monitors Microchip Internet Exlporer Software as a Service Fraud Meta Laptop Websites Username Managing Costs Amazon Windows 8 eCommerce Drones Black Friday SSID Recovery Database Surveillance SharePoint Virtual Assistant Outsource IT Hard Drives Electronic Medical Records Media Halloween IT Technicians Virtual Machine Environment Domains Cookies Lenovo Cyber Monday Medical IT Writing Proxy Server Reviews Tactics Development Hotspot Transportation Small Businesses Refrigeration Virtual Reality Scary Stories Private Cloud Mirgation Hypervisor Displays Public Speaking Hacks Server Management Nanotechnology Optimization Lithium-ion battery Superfish PowerPoint Identity Theft Fun Shopping Addiction Language Employer/Employee Relationships Outsourcing Deep Learning Entrepreneur Twitter Navigation Error Management PCI DSS Chatbots Screen Reader Distributed Denial of Service Workplace Education Social Engineering Gig Economy Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Undo Remote Computing Evernote Paperless Regulations Compliance Identity Mobile Computing Smart Tech Memes Co-managed IT Tablet Search Bookmark Download Net Neutrality Alerts SQL Server Technology Care Best Practice Alert Business Communications Buisness File Sharing Dark Data Financial Data History Managed IT Connectivity IT Legal Break Fix Scams Application IT solutions How To Browsers Smartwatch Upload Procurement Azure Hybrid Work Business Growth Notifications Multi-Factor Security Tech Human Resources Travel Social Network Telework Cyber security IBM IoT Communitications Techology Dark Web Cables Google Maps Cortana CES Trends Supply Chain Management Alt Codes Google Calendar Term Google Apps Downtime Unified Threat Management Customer Resource management FinTech Regulations

Blog Archive