Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Adware Lawsuit Between Lenovo And FTC Settled

Adware Lawsuit Between Lenovo And FTC Settled

About two and a half years ago, Lenovo was brought under fire for manufacturing products that had adware preinstalled on them. This malware, a variant called Superfish, was installed on up to 750,000 Lenovo devices, and the company--eager to put this incident behind them--still refuses to admit fault, despite paying reparations and other fees as a result. Superfish allowed access to sensitive information and a root certificate, which could be used to access encrypted data on the same network. All in all, it was a rather embarrassing and dangerous scenario for Lenovo, and it comes with its fair share of consequences.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Email Workplace Tips Computer Google Phishing Collaboration Hosted Solutions Workplace Strategy Users Small Business Ransomware Backup Mobile Device Productivity Microsoft Managed Service Quick Tips Saving Money Communication Passwords Cybersecurity Smartphone Data Backup AI Data Recovery Android Disaster Recovery VoIP Upgrade Business Management Smartphones communications Mobile Devices Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Remote Internet of Things Facebook Holiday Miscellaneous Information Automation Artificial Intelligence Cloud Computing Training Gadgets Covid-19 Compliance Remote Work Server Managed Service Provider IT Support Outsourced IT Encryption Spam Employee/Employer Relationship Windows 10 Office Government Data Management Business Continuity Windows 10 Blockchain Wi-Fi Virtualization Business Technology Bandwidth Vendor Two-factor Authentication Apps Mobile Office Data Security Managed Services App Voice over Internet Protocol Gmail BYOD WiFi Employer-Employee Relationship Tip of the week Chrome Budget Networking Apple Mobile Device Management Computing HIPAA Information Technology Access Control Applications Office 365 Hacker Avoiding Downtime Conferencing Marketing How To BDR Healthcare Operating System Big Data Virtual Private Network Risk Management Router Health Office Tips Analytics Computers Augmented Reality Help Desk Retail 2FA Storage Password Website Managed IT Services Bring Your Own Device Firewall Patch Management Save Money Remote Workers Cooperation Going Green Remote Monitoring End of Support Vulnerability Vendor Management The Internet of Things Cybercrime Physical Security Free Resource Project Management Display Printer Windows 7 Social Paperless Office Infrastructure Microsoft 365 Solutions Customer Service Document Management Monitoring Windows 11 Scam Data loss Excel Telephone Robot Entertainment Settings Safety iPhone Printing IT Management Wireless Content Filtering Data Privacy Meetings Telephone System VPN Vulnerabilities Cost Management YouTube Images 101 Cryptocurrency Computer Repair Multi-Factor Authentication Mobility Virtual Desktop Customer Relationship Management User Tip Modem Data storage LiFi Mobile Security Processor Machine Learning Outlook Employees Integration Hacking Money Presentation Humor Smart Technology Maintenance Antivirus Wireless Technology Holidays Saving Time Sports Supply Chain Mouse Data Storage Managed IT Service Video Conferencing Word Downloads Administration Managed Services Provider Virtual Machines Professional Services Licensing Travel Evernote Social Network Legal Regulations Compliance Multi-Factor Security IT solutions Public Speaking Technology Care Techology Memes Lithium-ion battery Google Maps Business Communications IoT Dark Web Business Growth Net Neutrality SQL Server Scams Entrepreneur Trends Hybrid Work Unified Threat Management Customer Resource management Regulations Financial Data Google Calendar History Cortana Alt Codes Unified Threat Management IT Human Resources Data Analysis Star Wars Smartwatch Microsoft Excel Gamification Staff Procurement Downtime Azure Undo Cables Tech Network Congestion Social Networking Telework Legislation Hosted Solution Cyber security CES Typing User Error Communitications Google Apps Fileless Malware Content Wearable Technology Supply Chain Management IT Maintenance Knowledge Business Intelligence Point of Sale Term Health IT Motherboard Google Drive FinTech Comparison Permissions IT Assessment Application Shortcuts Directions Assessment Flexibility Network Management Value 5G Ransmoware Tech Support Experience IBM Vendors Monitors Google Docs Organization Specifications Unified Communications Digital Security Cameras Fraud Bitcoin Smart Devices Running Cable Be Proactive Microchip Internet Exlporer Username Google Wallet Remote Working Memory Workforce Websites Data Breach Threats Google Play Black Friday Videos Windows 8 SharePoint Electronic Health Records Laptop Workplace Strategies Electronic Medical Records Database IT Technicians Drones Wasting Time Competition Meta Lenovo Trend Micro Amazon Security Cameras Proxy Server Writing Cookies Cyber Monday Hotspot Software as a Service Halloween Virtual Reality Tactics Private Cloud Mirgation Server Management Managing Costs Outsource IT Superfish eCommerce Environment Identity Theft SSID User Media Nanotechnology Language Hacks Surveillance Scary Stories Virtual Assistant Twitter Addiction Error Management Chatbots Virtual Machine Fun Small Businesses IP Address Displays Medical IT Social Engineering Screen Reader Reviews Distributed Denial of Service Deep Learning Computing Infrastructure Development Transportation Remote Computing Service Level Agreement Identity Education Hypervisor Outsourcing Optimization Tablet PowerPoint Recovery Bookmark Smart Tech Shopping Alerts Mobile Computing Employer/Employee Relationships Hard Drives Workplace Alert Download File Sharing Navigation Dark Data PCI DSS Managed IT Search Domains Hiring/Firing Paperless Browsers How To Connectivity Gig Economy Break Fix Best Practice Internet Service Provider Buisness Teamwork Refrigeration Co-managed IT Notifications Upload

Blog Archive