Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Adware Lawsuit Between Lenovo And FTC Settled

Adware Lawsuit Between Lenovo And FTC Settled

About two and a half years ago, Lenovo was brought under fire for manufacturing products that had adware preinstalled on them. This malware, a variant called Superfish, was installed on up to 750,000 Lenovo devices, and the company--eager to put this incident behind them--still refuses to admit fault, despite paying reparations and other fees as a result. Superfish allowed access to sensitive information and a root certificate, which could be used to access encrypted data on the same network. All in all, it was a rather embarrassing and dangerous scenario for Lenovo, and it comes with its fair share of consequences.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support Privacy IT Services Google Email Workplace Tips Computer Phishing Collaboration Workplace Strategy Hosted Solutions Users Ransomware Small Business Mobile Device Productivity Microsoft Backup Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Smartphone Data Backup AI Android Data Recovery Upgrade Disaster Recovery VoIP Business Management Smartphones communications Mobile Devices Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Artificial Intelligence Information Holiday Facebook Miscellaneous Automation Cloud Computing Covid-19 Training Gadgets Compliance Server Managed Service Provider Remote Work Outsourced IT IT Support Employee/Employer Relationship Encryption Spam Office Windows 10 Government Data Management Business Continuity Wi-Fi Blockchain Windows 10 Bandwidth Virtualization Business Technology Two-factor Authentication Mobile Office Data Security Vendor Apps Managed Services Voice over Internet Protocol Networking Mobile Device Management Chrome Gmail BYOD Budget WiFi Apple App Employer-Employee Relationship Tip of the week Conferencing Computing Hacker Information Technology Avoiding Downtime How To Marketing BDR Office 365 HIPAA Applications Access Control Operating System Retail Computers Healthcare Risk Management Managed IT Services Website Office Tips Analytics Augmented Reality 2FA Router Storage Password Virtual Private Network Bring Your Own Device Big Data Health Help Desk Customer Service Cybercrime Remote Workers Telephone Scam Data loss Cooperation Free Resource Project Management Windows 7 Patch Management Save Money Microsoft 365 Remote Monitoring Firewall Windows 11 Vulnerability End of Support Vendor Management Solutions Physical Security Excel The Internet of Things Display Printer Social Paperless Office Infrastructure Monitoring Going Green Document Management Content Filtering Hacking Managed IT Service Maintenance Presentation YouTube Antivirus Downloads iPhone Cryptocurrency Licensing Wireless Technology Vulnerabilities Entertainment Virtual Desktop Data storage LiFi Images 101 Word Telephone System Multi-Factor Authentication Outlook Robot Mobility Cost Management Money Humor IT Management Supply Chain VPN Employees Meetings Safety Integration Sports Mouse User Tip Modem Computer Repair Mobile Security Processor Administration Holidays Data Storage Smart Technology Video Conferencing Machine Learning Managed Services Provider Customer Relationship Management Settings Data Privacy Saving Time Virtual Machines Professional Services Printing Wireless IT Maintenance Server Management Regulations Compliance Private Cloud Identity Evernote Hosted Solution Typing Business Intelligence Superfish Bookmark Identity Theft Smart Tech Memes Download Net Neutrality Twitter Alerts SQL Server Shortcuts Knowledge Ransmoware Financial Data Error History Google Drive User Social Engineering Break Fix Vendors Browsers Smartwatch Connectivity IT Upload Procurement Remote Computing Azure 5G Be Proactive Experience Workforce Social Network Telework Cyber security IP Address Google Docs Multi-Factor Security Tech Unified Communications Dark Web Bitcoin Running Cable Threats CES Tablet IoT Communitications Trends Supply Chain Management Alert Google Wallet Workplace Strategies Meta Managed IT Customer Resource management FinTech File Sharing Regulations Dark Data Google Calendar Term Recovery How To Microsoft Excel Hard Drives Windows 8 Laptop Amazon Data Analysis Star Wars IT Assessment Gamification Flexibility Notifications Staff Value Domains Drones Outsource IT Organization Travel Social Networking Legislation Refrigeration Halloween Environment Techology Fileless Malware Digital Security Cameras Media Google Maps Smart Devices Content Remote Working Wearable Technology Memory Public Speaking Small Businesses Health IT Unified Threat Management Motherboard Data Breach Lithium-ion battery Comparison Google Play Permissions Hacks Entrepreneur Scary Stories Displays Unified Threat Management Directions Videos Assessment Electronic Health Records Wasting Time Fun Outsourcing Trend Micro Network Congestion Specifications Security Cameras Deep Learning Fraud Undo User Error Microchip Internet Exlporer Software as a Service Username Managing Costs Education Workplace Hiring/Firing Point of Sale eCommerce Black Friday SSID Virtual Assistant Mobile Computing Paperless Database Surveillance Co-managed IT Network Management Tech Support IT Technicians Virtual Machine Search Technology Care Proxy Server Reviews Cookies Monitors Cyber Monday Medical IT Application Best Practice Hotspot Transportation Buisness Business Communications Tactics Development Scams Websites Mirgation Hypervisor IBM Legal IT solutions Hybrid Work Shopping Nanotechnology Optimization PowerPoint Business Growth Electronic Medical Records Language Employer/Employee Relationships SharePoint Human Resources Addiction Cables Management PCI DSS Chatbots Navigation Cortana Alt Codes Lenovo Gig Economy Screen Reader Writing Distributed Denial of Service Virtual Reality Computing Infrastructure Teamwork Competition Downtime Google Apps Service Level Agreement Internet Service Provider

Blog Archive