Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Adware Lawsuit Between Lenovo And FTC Settled

Adware Lawsuit Between Lenovo And FTC Settled

About two and a half years ago, Lenovo was brought under fire for manufacturing products that had adware preinstalled on them. This malware, a variant called Superfish, was installed on up to 750,000 Lenovo devices, and the company--eager to put this incident behind them--still refuses to admit fault, despite paying reparations and other fees as a result. Superfish allowed access to sensitive information and a root certificate, which could be used to access encrypted data on the same network. All in all, it was a rather embarrassing and dangerous scenario for Lenovo, and it comes with its fair share of consequences.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Backup Productivity Quick Tips Passwords Saving Money Communication Cybersecurity Smartphone Managed Service Data Backup Android Upgrade AI Business Management VoIP Smartphones Data Recovery Mobile Devices communications Disaster Recovery Windows Browser Social Media Managed IT Services Microsoft Office Tech Term Current Events Network Internet of Things Remote Artificial Intelligence Facebook Information Automation Covid-19 Miscellaneous Gadgets Cloud Computing Holiday Training Remote Work Server Managed Service Provider Outsourced IT Compliance Encryption Employee/Employer Relationship Spam IT Support Office Windows 10 Data Management Business Continuity Government Windows 10 Bandwidth Virtualization Blockchain Wi-Fi Business Technology Data Security Apps Vendor Two-factor Authentication Mobile Office Chrome Gmail Budget Apple Networking App Employer-Employee Relationship BYOD Managed Services Voice over Internet Protocol Mobile Device Management Tip of the week Conferencing WiFi How To BDR HIPAA Computing Hacker Applications Information Technology Avoiding Downtime Access Control Marketing Office 365 Augmented Reality Retail Storage Password Bring Your Own Device Big Data Managed IT Services Operating System 2FA Computers Router Virtual Private Network Risk Management Website Health Healthcare Help Desk Analytics Office Tips Firewall Document Management Free Resource Project Management Windows 7 Microsoft 365 Telephone The Internet of Things Scam Data loss Solutions Social Cooperation Going Green Patch Management Save Money Windows 11 Remote Monitoring Vulnerability End of Support Customer Service Vendor Management Cybercrime Physical Security Excel Display Printer Remote Workers Paperless Office Infrastructure Monitoring Money Saving Time Data Privacy Humor Images 101 Managed IT Service Safety Maintenance Multi-Factor Authentication Mobility Sports Downloads Antivirus Mouse Licensing Entertainment Administration Employees Integration Telephone System Robot Customer Relationship Management Cost Management Settings Holidays Printing Wireless Data Storage Content Filtering Supply Chain Hacking IT Management Presentation VPN Video Conferencing YouTube Meetings Managed Services Provider Professional Services Cryptocurrency Virtual Machines Wireless Technology User Tip Modem Processor Computer Repair Mobile Security Virtual Desktop Data storage LiFi iPhone Word Smart Technology Outlook Machine Learning Vulnerabilities Public Speaking Lenovo Supply Chain Management Screen Reader Writing Distributed Denial of Service Lithium-ion battery FinTech Service Level Agreement Virtual Reality Computing Infrastructure Term Google Apps Entrepreneur Scary Stories Private Cloud Identity IT Maintenance Hacks Server Management IT Assessment Superfish Bookmark Flexibility Identity Theft Smart Tech Value Business Intelligence Fun Organization Deep Learning Download Twitter Alerts Shortcuts Smart Devices Error Ransmoware Digital Security Cameras Undo Browsers Remote Working Education Connectivity Memory Vendors Social Engineering Break Fix Google Play Be Proactive Upload Data Breach Remote Computing Electronic Health Records Workforce Multi-Factor Security Videos Mobile Computing Social Network Tablet IoT Wasting Time Threats Search Dark Web Security Cameras Workplace Strategies Application Best Practice Trends Trend Micro Alert Software as a Service Buisness File Sharing Regulations Meta Dark Data Google Calendar Managed IT Customer Resource management IBM Legal Data Analysis IT solutions Star Wars Managing Costs Amazon How To Microsoft Excel SSID Business Growth Gamification eCommerce Notifications Staff Surveillance Travel Social Networking Virtual Assistant Outsource IT Legislation Techology Fileless Malware Google Maps Virtual Machine Environment Cortana Media Wearable Technology Medical IT Reviews Alt Codes Content Competition Health IT Development Downtime Unified Threat Management Motherboard Transportation Small Businesses Comparison Unified Threat Management Directions Hosted Solution Assessment Hypervisor Displays Permissions PowerPoint Shopping Typing Optimization Employer/Employee Relationships Outsourcing Network Congestion Specifications Google Drive User Error Microchip PCI DSS User Internet Exlporer Knowledge Fraud Navigation Workplace Gig Economy Username Internet Service Provider Point of Sale Teamwork Hiring/Firing 5G Black Friday IP Address Google Docs Regulations Compliance Unified Communications Database Experience Evernote Paperless Running Cable Tech Support IT Technicians Co-managed IT Bitcoin Network Management Memes Google Wallet Proxy Server Net Neutrality Cookies SQL Server Technology Care Monitors Cyber Monday Financial Data Recovery Tactics History Hotspot Business Communications Laptop Websites Mirgation Scams Smartwatch Hard Drives Windows 8 IT Domains Drones Procurement Nanotechnology Azure Hybrid Work SharePoint Telework Addiction Cyber security Electronic Medical Records Language Tech Human Resources Halloween Chatbots Cables CES Refrigeration Management Communitications

Blog Archive