Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Adware Lawsuit Between Lenovo And FTC Settled

Adware Lawsuit Between Lenovo And FTC Settled

About two and a half years ago, Lenovo was brought under fire for manufacturing products that had adware preinstalled on them. This malware, a variant called Superfish, was installed on up to 750,000 Lenovo devices, and the company--eager to put this incident behind them--still refuses to admit fault, despite paying reparations and other fees as a result. Superfish allowed access to sensitive information and a root certificate, which could be used to access encrypted data on the same network. All in all, it was a rather embarrassing and dangerous scenario for Lenovo, and it comes with its fair share of consequences.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support Privacy IT Services Workplace Tips Computer Google Email Phishing Collaboration Hosted Solutions Workplace Strategy Users Ransomware Small Business Mobile Device Productivity Microsoft Backup Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone AI Android Data Recovery Upgrade Disaster Recovery VoIP Smartphones Business Management Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Miscellaneous Information Holiday Automation Artificial Intelligence Facebook Gadgets Cloud Computing Covid-19 Training Remote Work Server Managed Service Provider Compliance IT Support Outsourced IT Encryption Spam Employee/Employer Relationship Office Windows 10 Government Business Continuity Data Management Blockchain Wi-Fi Business Technology Bandwidth Windows 10 Virtualization Apps Vendor Two-factor Authentication Mobile Office Data Security Employer-Employee Relationship BYOD Tip of the week Chrome Managed Services Mobile Device Management Budget Voice over Internet Protocol Gmail Apple Networking WiFi App HIPAA Computing Applications Information Technology Hacker Access Control Avoiding Downtime Office 365 Marketing Conferencing How To BDR Operating System Router 2FA Virtual Private Network Risk Management Computers Health Help Desk Analytics Website Office Tips Augmented Reality Retail Storage Healthcare Password Bring Your Own Device Managed IT Services Big Data Social Going Green Patch Management Microsoft 365 Save Money Remote Monitoring End of Support Vulnerability Windows 11 Solutions Vendor Management Cybercrime Physical Security Customer Service Excel Display Printer Paperless Office Infrastructure Monitoring Document Management Remote Workers Firewall Telephone Scam Data loss The Internet of Things Free Resource Cooperation Project Management Windows 7 Multi-Factor Authentication Mobility Robot Telephone System Cost Management Settings Wireless Printing Content Filtering IT Management Customer Relationship Management Employees VPN YouTube Meetings Supply Chain Integration Cryptocurrency User Tip Modem Hacking Processor Presentation Computer Repair Mobile Security Holidays Virtual Desktop Data storage LiFi Wireless Technology Data Storage Smart Technology Outlook Video Conferencing Managed Services Provider Machine Learning Saving Time Money Virtual Machines Professional Services Humor Word Data Privacy Managed IT Service Maintenance Sports Downloads Antivirus Mouse iPhone Licensing Safety Entertainment Administration Vulnerabilities Images 101 Amazon Travel Social Networking Application Legislation Organization Fileless Malware Digital Security Cameras Techology Smart Devices Google Maps Cortana Remote Working Alt Codes Content IBM Outsource IT Memory Wearable Technology Environment Data Breach Downtime Unified Threat Management Motherboard Media Google Play Comparison Health IT Directions Videos Unified Threat Management Electronic Health Records Hosted Solution Assessment Permissions Typing Small Businesses Wasting Time Displays Trend Micro Security Cameras Network Congestion Specifications Microchip Google Drive User Error Software as a Service Internet Exlporer Competition Knowledge Fraud Managing Costs Username Outsourcing eCommerce Point of Sale SSID 5G Black Friday Google Docs Surveillance Unified Communications Database Workplace Virtual Assistant Experience Virtual Machine Running Cable Tech Support IT Technicians User Bitcoin Network Management Hiring/Firing Proxy Server Reviews Google Wallet Cookies Paperless Medical IT Monitors Cyber Monday Development Tactics Co-managed IT Transportation Hotspot Hypervisor Laptop Websites Mirgation Windows 8 IP Address Technology Care Shopping Drones Optimization Nanotechnology Business Communications PowerPoint SharePoint Addiction Scams Employer/Employee Relationships Electronic Medical Records Language Halloween Chatbots Recovery Navigation PCI DSS Management Hybrid Work Gig Economy Lenovo Screen Reader Hard Drives Human Resources Writing Distributed Denial of Service Internet Service Provider Service Level Agreement Domains Cables Teamwork Virtual Reality Computing Infrastructure Scary Stories Private Cloud Identity Evernote Regulations Compliance Hacks Server Management Bookmark Superfish Memes Identity Theft Smart Tech Refrigeration Google Apps Fun Net Neutrality Deep Learning Download Public Speaking IT Maintenance SQL Server Twitter Alerts History Error Financial Data Lithium-ion battery Business Intelligence Browsers Smartwatch IT Education Connectivity Shortcuts Social Engineering Break Fix Entrepreneur Procurement Upload Ransmoware Azure Remote Computing Vendors Cyber security Tech Multi-Factor Security Telework Mobile Computing Social Network CES Communitications Tablet IoT Undo Be Proactive Search Dark Web Supply Chain Management Best Practice Trends Workforce Alert Threats Buisness File Sharing Regulations Term Dark Data Google Calendar FinTech Managed IT Customer Resource management Data Analysis Legal IT Assessment IT solutions Star Wars Workplace Strategies How To Microsoft Excel Flexibility Business Growth Gamification Meta Value Notifications Staff

Blog Archive