Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Adware Lawsuit Between Lenovo And FTC Settled

Adware Lawsuit Between Lenovo And FTC Settled

About two and a half years ago, Lenovo was brought under fire for manufacturing products that had adware preinstalled on them. This malware, a variant called Superfish, was installed on up to 750,000 Lenovo devices, and the company--eager to put this incident behind them--still refuses to admit fault, despite paying reparations and other fees as a result. Superfish allowed access to sensitive information and a root certificate, which could be used to access encrypted data on the same network. All in all, it was a rather embarrassing and dangerous scenario for Lenovo, and it comes with its fair share of consequences.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support Privacy IT Services Google Email Workplace Tips Computer Phishing Collaboration Hosted Solutions Workplace Strategy Users Ransomware Small Business Mobile Device Productivity Microsoft Backup Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone AI Android Data Recovery Upgrade Disaster Recovery VoIP Business Management Smartphones Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Holiday Automation Artificial Intelligence Facebook Miscellaneous Information Training Covid-19 Gadgets Cloud Computing Server Managed Service Provider Compliance Remote Work IT Support Outsourced IT Employee/Employer Relationship Encryption Spam Office Windows 10 Business Continuity Data Management Government Wi-Fi Business Technology Bandwidth Windows 10 Virtualization Blockchain Vendor Two-factor Authentication Mobile Office Data Security Apps Managed Services Voice over Internet Protocol Tip of the week Chrome Mobile Device Management Budget Gmail Apple Networking WiFi App Employer-Employee Relationship BYOD Computing Applications Information Technology Hacker Access Control Avoiding Downtime Office 365 Marketing Conferencing How To BDR HIPAA Router Virtual Private Network Risk Management Computers Healthcare Health Help Desk Analytics Website Office Tips Augmented Reality Retail Storage Password Bring Your Own Device Managed IT Services Big Data 2FA Operating System Physical Security Customer Service Display Remote Workers Printer Paperless Office Infrastructure Monitoring Free Resource Project Management Document Management Windows 7 Microsoft 365 Firewall Telephone Solutions Scam Data loss The Internet of Things Cooperation Social Going Green Patch Management Windows 11 Save Money Remote Monitoring End of Support Vulnerability Vendor Management Cybercrime Excel VPN Virtual Machines YouTube Meetings Professional Services Cryptocurrency User Tip Modem Hacking Presentation Computer Repair Mobile Security Processor Virtual Desktop iPhone LiFi Wireless Technology Data storage Smart Technology Vulnerabilities Data Privacy Outlook Machine Learning Images 101 Money Saving Time Word Humor Multi-Factor Authentication Mobility Managed IT Service Maintenance Antivirus Sports Downloads Mouse Licensing Employees Safety Administration Integration Entertainment Robot Telephone System Holidays Cost Management Data Storage Settings Wireless Printing Supply Chain Content Filtering Video Conferencing IT Management Managed Services Provider Customer Relationship Management Network Congestion Specifications Gig Economy Workplace Internet Exlporer Teamwork Hiring/Firing Competition Knowledge Fraud Google Drive User Error Microchip Internet Service Provider Regulations Compliance Username Evernote Paperless 5G Black Friday Memes Point of Sale Co-managed IT Unified Communications Database SQL Server Technology Care Experience Google Docs Net Neutrality Financial Data Bitcoin Network Management History Running Cable Tech Support IT Technicians Business Communications User Monitors Cyber Monday Smartwatch Google Wallet Proxy Server IT Cookies Scams Tactics Azure Hybrid Work Hotspot Procurement Telework Windows 8 Cyber security IP Address Laptop Websites Mirgation Tech Human Resources CES Drones Communitications Nanotechnology Cables Addiction Electronic Medical Records Language SharePoint Supply Chain Management FinTech Management Halloween Chatbots Term Google Apps Recovery Hard Drives Writing Distributed Denial of Service Lenovo IT Assessment Screen Reader IT Maintenance Service Level Agreement Value Business Intelligence Domains Virtual Reality Computing Infrastructure Flexibility Organization Hacks Server Management Scary Stories Private Cloud Identity Shortcuts Refrigeration Fun Digital Security Cameras Superfish Bookmark Smart Devices Identity Theft Smart Tech Ransmoware Remote Working Deep Learning Download Memory Vendors Public Speaking Twitter Alerts Data Breach Lithium-ion battery Error Google Play Be Proactive Workforce Social Engineering Break Fix Entrepreneur Videos Browsers Electronic Health Records Education Connectivity Upload Wasting Time Threats Remote Computing Mobile Computing Social Network Trend Micro Security Cameras Workplace Strategies Multi-Factor Security Tablet IoT Meta Undo Search Dark Web Software as a Service Best Practice Trends Managing Costs Amazon Alert Dark Data Google Calendar Managed IT Customer Resource management eCommerce Buisness File Sharing Regulations SSID IT solutions Star Wars Virtual Assistant Outsource IT How To Microsoft Excel Legal Data Analysis Surveillance Business Growth Gamification Virtual Machine Environment Notifications Staff Media Legislation Reviews Travel Social Networking Medical IT Application Google Maps Transportation Small Businesses Cortana Techology Fileless Malware Development Alt Codes Content Hypervisor Displays IBM Wearable Technology Comparison Shopping Health IT Optimization Downtime Unified Threat Management Motherboard PowerPoint Hosted Solution Assessment Employer/Employee Relationships Outsourcing Permissions Unified Threat Management Directions PCI DSS Typing Navigation

Blog Archive