Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Adware Lawsuit Between Lenovo And FTC Settled

Adware Lawsuit Between Lenovo And FTC Settled

About two and a half years ago, Lenovo was brought under fire for manufacturing products that had adware preinstalled on them. This malware, a variant called Superfish, was installed on up to 750,000 Lenovo devices, and the company--eager to put this incident behind them--still refuses to admit fault, despite paying reparations and other fees as a result. Superfish allowed access to sensitive information and a root certificate, which could be used to access encrypted data on the same network. All in all, it was a rather embarrassing and dangerous scenario for Lenovo, and it comes with its fair share of consequences.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet IT Services Malware IT Support Phishing Privacy Email Workplace Tips Computer Google Workplace Strategy Collaboration Small Business Hosted Solutions Backup Users Managed Service Ransomware Mobile Device Microsoft AI Productivity Passwords Saving Money Quick Tips Communication Cybersecurity Smartphone Data Backup Data Recovery Disaster Recovery Android Upgrade VoIP Business Management Smartphones communications Mobile Devices Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Remote Internet of Things Information Miscellaneous Facebook Artificial Intelligence Holiday Automation Covid-19 Cloud Computing Gadgets Training Compliance Server Managed Service Provider Outsourced IT IT Support Remote Work Encryption Employee/Employer Relationship Spam Office Windows 10 Data Management Government Business Continuity Blockchain Wi-Fi Windows 10 Virtualization Bandwidth Business Technology Managed Services Mobile Office Vendor Data Security Two-factor Authentication Apps App Tip of the week Voice over Internet Protocol Mobile Device Management Networking Gmail WiFi Chrome BYOD Budget Employer-Employee Relationship Apple Avoiding Downtime Marketing HIPAA Computing Applications Managed IT Services Information Technology How To BDR Office 365 Conferencing Physical Security Password Access Control Hacker Healthcare Website Retail Operating System Router Risk Management Help Desk Analytics Office Tips Big Data 2FA Augmented Reality Storage Virtual Private Network Bring Your Own Device Health Computers Remote Workers Document Management Going Green Cybercrime Scam Free Resource Project Management Data loss Firewall Windows 7 Microsoft 365 The Internet of Things Monitoring Patch Management Solutions Save Money Windows 11 Remote Monitoring End of Support Vulnerability Social Vendor Management Excel Managed IT Service Display Telephone Printer Paperless Office Customer Service Infrastructure Cooperation Wireless Technology Machine Learning Telephone System Data Privacy Cost Management Settings iPhone Wireless Printing Content Filtering Maintenance Word Antivirus Vulnerabilities YouTube Images 101 Cryptocurrency User Tip Modem Multi-Factor Authentication Mobile Security Mobility Processor Safety Virtual Desktop LiFi Data storage Robot Smart Technology Employees Outlook Integration Saving Time Money Supply Chain IT Management Humor Meetings VPN Holidays Customer Relationship Management Sports Downloads Computer Repair Mouse Data Storage Licensing Video Conferencing Managed Services Provider Entertainment Hacking Administration Presentation Virtual Machines Professional Services SharePoint Human Resources Microsoft Excel Evernote Electronic Medical Records Data Analysis Legal Regulations Compliance Star Wars IT solutions Gamification Business Growth Memes Cables Staff Writing IP Address Net Neutrality Social Networking Lenovo SQL Server Legislation History Google Apps Cortana Virtual Reality Fileless Malware Financial Data Smartwatch Content Alt Codes IT IT Maintenance Wearable Technology Server Management Private Cloud Identity Theft Health IT Recovery Procurement Business Intelligence Motherboard Downtime Superfish Azure Comparison Hosted Solution Cyber security Shortcuts Permissions Tech Twitter Directions Hard Drives Telework Assessment Domains CES Typing Communitications Ransmoware Error Social Engineering Supply Chain Management Vendors Specifications Internet Exlporer Be Proactive Fraud Knowledge Term Remote Computing Microchip Google Drive Refrigeration FinTech Public Speaking Username IT Assessment Workforce Black Friday 5G Tablet Lithium-ion battery Flexibility Threats Value Organization Database Unified Communications Entrepreneur Workplace Strategies Experience Alert Google Docs Dark Data Digital Security Cameras Bitcoin Smart Devices Meta IT Technicians Running Cable Managed IT File Sharing Memory Cyber Monday How To Proxy Server Google Wallet Remote Working Amazon Cookies Tactics Data Breach Hotspot Google Play Notifications Undo Travel Videos Windows 8 Electronic Health Records Outsource IT Mirgation Laptop Techology Wasting Time Media Google Maps Drones Environment Nanotechnology Addiction Trend Micro Language Security Cameras Unified Threat Management Management Software as a Service Small Businesses Chatbots Halloween Unified Threat Management Managing Costs Distributed Denial of Service Application Displays Screen Reader Service Level Agreement eCommerce Computing Infrastructure SSID Network Congestion IBM Hacks Surveillance Outsourcing Identity Scary Stories Virtual Assistant User Error Virtual Machine Fun Bookmark Smart Tech Reviews Download Deep Learning Workplace Alerts Medical IT Point of Sale Development Hiring/Firing Transportation Hypervisor Paperless Break Fix Browsers Connectivity Education Competition Shopping Upload Optimization Co-managed IT Network Management PowerPoint Tech Support Monitors Social Network Mobile Computing Technology Care Employer/Employee Relationships Multi-Factor Security Business Communications Dark Web Search Navigation PCI DSS IoT Gig Economy Trends Best Practice Scams Websites Customer Resource management User Internet Service Provider Hybrid Work Regulations Buisness Teamwork Google Calendar

Blog Archive