Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Adware Lawsuit Between Lenovo And FTC Settled

Adware Lawsuit Between Lenovo And FTC Settled

About two and a half years ago, Lenovo was brought under fire for manufacturing products that had adware preinstalled on them. This malware, a variant called Superfish, was installed on up to 750,000 Lenovo devices, and the company--eager to put this incident behind them--still refuses to admit fault, despite paying reparations and other fees as a result. Superfish allowed access to sensitive information and a root certificate, which could be used to access encrypted data on the same network. All in all, it was a rather embarrassing and dangerous scenario for Lenovo, and it comes with its fair share of consequences.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Passwords Backup Quick Tips Saving Money Communication Cybersecurity Productivity Data Backup Smartphone Managed Service Android Upgrade VoIP Business Management Smartphones AI communications Data Recovery Mobile Devices Disaster Recovery Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Remote Tech Term Internet of Things Automation Facebook Information Artificial Intelligence Training Covid-19 Miscellaneous Gadgets Cloud Computing Holiday Remote Work Server Managed Service Provider Compliance Outsourced IT Employee/Employer Relationship Encryption IT Support Spam Office Windows 10 Data Management Government Business Continuity Business Technology Windows 10 Wi-Fi Blockchain Virtualization Bandwidth Mobile Office Two-factor Authentication Data Security Vendor Apps Apple Tip of the week App Mobile Device Management Gmail Managed Services Voice over Internet Protocol Networking Employer-Employee Relationship Chrome BYOD Budget Hacker Access Control Avoiding Downtime Conferencing Marketing Computing Information Technology How To WiFi BDR Office 365 HIPAA Applications Computers Bring Your Own Device Help Desk Health Website Retail Operating System Risk Management Managed IT Services Healthcare Big Data 2FA Analytics Office Tips Router Augmented Reality Storage Virtual Private Network Password Monitoring Solutions Printer Paperless Office Infrastructure Going Green Document Management Telephone Firewall Cybercrime Scam Cooperation Data loss Remote Workers The Internet of Things Social Patch Management Windows 11 Save Money Free Resource Remote Monitoring Vulnerability End of Support Project Management Windows 7 Vendor Management Excel Microsoft 365 Physical Security Customer Service Display Presentation Mouse Computer Repair Smart Technology Employees Administration Wireless Technology Integration Saving Time Data Privacy Managed IT Service Machine Learning Holidays Word Downloads Settings Data Storage Wireless Licensing Printing Content Filtering Video Conferencing Maintenance Antivirus Entertainment Managed Services Provider Virtual Machines Professional Services YouTube Cryptocurrency Safety Telephone System Cost Management iPhone Virtual Desktop LiFi Data storage Robot Vulnerabilities Outlook Supply Chain Money Images 101 Customer Relationship Management User Tip Modem Humor IT Management Mobility VPN Mobile Security Meetings Processor Multi-Factor Authentication Sports Hacking Electronic Health Records Mirgation Technology Care Education Videos Network Management Business Communications Tech Support User Wasting Time Nanotechnology Addiction Security Cameras Language Scams Mobile Computing Monitors Trend Micro Search Software as a Service Management Chatbots Hybrid Work Distributed Denial of Service Human Resources Best Practice Websites IP Address Managing Costs Screen Reader eCommerce Service Level Agreement SSID Computing Infrastructure Cables Buisness IT solutions Electronic Medical Records Surveillance Virtual Assistant SharePoint Identity Legal Google Apps Business Growth Bookmark Recovery Virtual Machine Smart Tech Hard Drives Download Medical IT Lenovo Alerts IT Maintenance Reviews Writing Virtual Reality Domains Cortana Development Transportation Business Intelligence Server Management Break Fix Shortcuts Alt Codes Private Cloud Browsers Hypervisor Connectivity Refrigeration Optimization Upload PowerPoint Superfish Ransmoware Identity Theft Downtime Shopping Hosted Solution Twitter Public Speaking Social Network Employer/Employee Relationships Vendors Multi-Factor Security Navigation Dark Web Be Proactive Typing Error Lithium-ion battery PCI DSS IoT Trends Entrepreneur Workforce Gig Economy Social Engineering Remote Computing Knowledge Internet Service Provider Customer Resource management Teamwork Regulations Threats Google Drive Google Calendar Evernote Microsoft Excel Workplace Strategies Regulations Compliance Data Analysis Star Wars Undo 5G Memes Gamification Staff Meta Tablet Unified Communications Alert Experience Net Neutrality SQL Server Social Networking Amazon Google Docs Legislation Managed IT Bitcoin File Sharing Running Cable Financial Data Dark Data Fileless Malware History IT Content Wearable Technology Outsource IT Google Wallet Smartwatch How To Media Notifications Procurement Health IT Azure Motherboard Environment Comparison Assessment Tech Permissions Windows 8 Travel Laptop Telework Directions Application Cyber security Communitications Techology Small Businesses Drones Google Maps CES Specifications IBM Supply Chain Management Displays Internet Exlporer Term Fraud Unified Threat Management Halloween FinTech Microchip IT Assessment Username Unified Threat Management Outsourcing Black Friday Flexibility Value Database Workplace Hacks Scary Stories Organization Network Congestion Competition Fun Smart Devices User Error IT Technicians Hiring/Firing Digital Security Cameras Cyber Monday Paperless Deep Learning Remote Working Proxy Server Memory Cookies Tactics Google Play Hotspot Co-managed IT Point of Sale Data Breach

Blog Archive