Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Adware Lawsuit Between Lenovo And FTC Settled

Adware Lawsuit Between Lenovo And FTC Settled

About two and a half years ago, Lenovo was brought under fire for manufacturing products that had adware preinstalled on them. This malware, a variant called Superfish, was installed on up to 750,000 Lenovo devices, and the company--eager to put this incident behind them--still refuses to admit fault, despite paying reparations and other fees as a result. Superfish allowed access to sensitive information and a root certificate, which could be used to access encrypted data on the same network. All in all, it was a rather embarrassing and dangerous scenario for Lenovo, and it comes with its fair share of consequences.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Quick Tips Passwords Backup Communication Cybersecurity Saving Money Productivity Smartphone Managed Service Data Backup Android Upgrade Business Management Smartphones VoIP AI Data Recovery Mobile Devices communications Windows Disaster Recovery Browser Social Media Microsoft Office Managed IT Services Current Events Network Remote Tech Term Internet of Things Facebook Artificial Intelligence Information Automation Miscellaneous Gadgets Cloud Computing Holiday Training Covid-19 Server Managed Service Provider Remote Work Compliance Outsourced IT IT Support Spam Encryption Employee/Employer Relationship Office Windows 10 Data Management Government Business Continuity Virtualization Blockchain Bandwidth Business Technology Wi-Fi Windows 10 Two-factor Authentication Data Security Vendor Apps Mobile Office Gmail Networking Managed Services Chrome Voice over Internet Protocol Budget Employer-Employee Relationship BYOD Apple App Tip of the week Mobile Device Management Office 365 How To WiFi BDR HIPAA Applications Hacker Access Control Avoiding Downtime Marketing Conferencing Computing Information Technology Managed IT Services Office Tips Analytics Augmented Reality Big Data Healthcare Storage Password Router Bring Your Own Device Virtual Private Network Computers Health Help Desk Website Operating System 2FA Risk Management Retail Scam Data loss Cooperation The Internet of Things Remote Workers Patch Management Social Save Money Remote Monitoring Vulnerability End of Support Vendor Management Free Resource Project Management Physical Security Customer Service Windows 7 Display Printer Microsoft 365 Monitoring Going Green Paperless Office Infrastructure Solutions Cybercrime Windows 11 Document Management Telephone Firewall Excel Virtual Desktop Data Storage Entertainment Data storage LiFi Video Conferencing Safety Managed Services Provider Virtual Machines Outlook Professional Services Telephone System Money Cost Management Humor Robot Data Privacy iPhone Sports Mouse Customer Relationship Management Vulnerabilities IT Management VPN Meetings User Tip Modem Administration Mobile Security Images 101 Processor Hacking Computer Repair Multi-Factor Authentication Presentation Mobility Wireless Technology Smart Technology Settings Printing Wireless Content Filtering Employees Saving Time Machine Learning Integration YouTube Word Managed IT Service Cryptocurrency Supply Chain Downloads Holidays Maintenance Antivirus Licensing Social Network Hypervisor Workplace Google Wallet Entrepreneur Multi-Factor Security Social Engineering Remote Computing Shopping Optimization Hiring/Firing IoT PowerPoint Dark Web Paperless Windows 8 Laptop Trends Employer/Employee Relationships Customer Resource management Co-managed IT Undo Regulations Drones Navigation Tablet Google Calendar PCI DSS Alert Gig Economy Data Analysis Technology Care Star Wars Microsoft Excel Business Communications Managed IT Staff File Sharing Halloween Dark Data Internet Service Provider Gamification Teamwork Regulations Compliance Scams Social Networking Evernote Legislation How To Notifications Fileless Malware Memes Hybrid Work SQL Server Human Resources Application Wearable Technology Hacks Travel Scary Stories Net Neutrality Content Financial Data Health IT History Cables Techology Motherboard Google Maps Comparison Fun Smartwatch Directions IT IBM Assessment Permissions Deep Learning Azure Google Apps Unified Threat Management Procurement Telework Cyber security IT Maintenance Unified Threat Management Tech Specifications Education CES Microchip Communitications Business Intelligence Internet Exlporer Fraud Username Shortcuts Mobile Computing Network Congestion Supply Chain Management Search FinTech Ransmoware Competition User Error Term Black Friday Best Practice IT Assessment Vendors Database Value Be Proactive IT Technicians Point of Sale Buisness Flexibility Organization Proxy Server Workforce Cookies Legal Cyber Monday IT solutions Network Management Hotspot Business Growth Tech Support Digital Security Cameras Smart Devices Threats Tactics User Memory Workplace Strategies Mirgation Monitors Remote Working Cortana Data Breach Meta Nanotechnology Google Play Language Alt Codes Websites Videos Electronic Health Records Amazon IP Address Addiction Management Wasting Time Chatbots Downtime Electronic Medical Records Trend Micro Outsource IT SharePoint Screen Reader Security Cameras Distributed Denial of Service Hosted Solution Media Recovery Computing Infrastructure Typing Software as a Service Environment Service Level Agreement Managing Costs Hard Drives Lenovo Identity Writing Virtual Reality Knowledge Bookmark eCommerce Small Businesses Domains Smart Tech Google Drive SSID Server Management Alerts Private Cloud Surveillance Displays Download Virtual Assistant Virtual Machine Refrigeration Superfish Identity Theft 5G Twitter Experience Reviews Browsers Outsourcing Public Speaking Connectivity Google Docs Medical IT Break Fix Unified Communications Bitcoin Error Running Cable Development Lithium-ion battery Upload Transportation

Blog Archive