Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Adware Lawsuit Between Lenovo And FTC Settled

Adware Lawsuit Between Lenovo And FTC Settled

About two and a half years ago, Lenovo was brought under fire for manufacturing products that had adware preinstalled on them. This malware, a variant called Superfish, was installed on up to 750,000 Lenovo devices, and the company--eager to put this incident behind them--still refuses to admit fault, despite paying reparations and other fees as a result. Superfish allowed access to sensitive information and a root certificate, which could be used to access encrypted data on the same network. All in all, it was a rather embarrassing and dangerous scenario for Lenovo, and it comes with its fair share of consequences.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Passwords Backup Quick Tips Saving Money Cybersecurity Communication Productivity Smartphone Data Backup Managed Service Android Upgrade VoIP AI Business Management Smartphones Data Recovery communications Mobile Devices Disaster Recovery Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Internet of Things Tech Term Remote Facebook Information Automation Artificial Intelligence Cloud Computing Holiday Training Covid-19 Miscellaneous Gadgets Server Managed Service Provider Remote Work Outsourced IT Compliance Encryption IT Support Employee/Employer Relationship Spam Office Windows 10 Government Data Management Business Continuity Windows 10 Wi-Fi Blockchain Virtualization Business Technology Bandwidth Data Security Mobile Office Two-factor Authentication Vendor Apps Managed Services Apple Networking Voice over Internet Protocol App Mobile Device Management BYOD Gmail Tip of the week Chrome Employer-Employee Relationship Budget Hacker How To Avoiding Downtime BDR Conferencing Marketing Computing Information Technology WiFi Access Control HIPAA Office 365 Applications 2FA Computers Help Desk Bring Your Own Device Managed IT Services Healthcare Website Operating System Risk Management Virtual Private Network Health Big Data Router Analytics Office Tips Augmented Reality Retail Storage Password Scam Monitoring Data loss Remote Workers Excel Patch Management Going Green Save Money Telephone Remote Monitoring Free Resource Vulnerability Project Management End of Support Vendor Management Windows 7 Firewall Cybercrime Cooperation Physical Security Microsoft 365 Display Printer The Internet of Things Solutions Paperless Office Infrastructure Social Document Management Windows 11 Customer Service Mouse Virtual Machines Presentation Professional Services Supply Chain Smart Technology Administration Wireless Technology Saving Time iPhone Managed IT Service Robot Downloads Vulnerabilities Word Settings Wireless Printing Licensing Images 101 Content Filtering IT Management Entertainment YouTube VPN Multi-Factor Authentication Data Privacy Meetings Mobility Safety Cryptocurrency Telephone System Computer Repair Cost Management Employees Virtual Desktop Data storage LiFi Integration Outlook Machine Learning Money Holidays User Tip Humor Modem Customer Relationship Management Processor Mobile Security Data Storage Video Conferencing Maintenance Sports Antivirus Managed Services Provider Hacking Mirgation Gig Economy Education Displays Social Engineering Teamwork User Remote Computing Nanotechnology Internet Service Provider Regulations Compliance Outsourcing Evernote Addiction Mobile Computing Language Chatbots Memes Search Tablet Management SQL Server Workplace Alert Screen Reader Best Practice Distributed Denial of Service Net Neutrality IP Address Financial Data Buisness Managed IT History Hiring/Firing File Sharing Service Level Agreement Dark Data Computing Infrastructure How To Legal Identity Smartwatch IT solutions IT Paperless Azure Co-managed IT Recovery Bookmark Notifications Smart Tech Business Growth Procurement Telework Cyber security Technology Care Hard Drives Travel Tech Download Alerts CES Techology Communitications Cortana Domains Google Maps Business Communications Scams Browsers Connectivity Alt Codes Break Fix Supply Chain Management FinTech Downtime Hybrid Work Refrigeration Unified Threat Management Term Upload Social Network Hosted Solution Multi-Factor Security Unified Threat Management IT Assessment Public Speaking Human Resources Value Cables IoT Typing Dark Web Flexibility Lithium-ion battery Organization Entrepreneur Trends Network Congestion Customer Resource management Google Drive Regulations Digital Security Cameras Google Calendar User Error Smart Devices Knowledge Google Apps Memory IT Maintenance Data Analysis Star Wars Microsoft Excel Remote Working Staff Data Breach Business Intelligence 5G Undo Point of Sale Google Play Gamification Google Docs Social Networking Videos Unified Communications Legislation Electronic Health Records Experience Shortcuts Running Cable Network Management Wasting Time Ransmoware Fileless Malware Tech Support Bitcoin Google Wallet Wearable Technology Trend Micro Vendors Security Cameras Content Monitors Be Proactive Health IT Motherboard Comparison Software as a Service Laptop Managing Costs Workforce Application Directions Websites Assessment Windows 8 Permissions Drones eCommerce Threats SSID Workplace Strategies Electronic Medical Records Specifications SharePoint Surveillance IBM Virtual Assistant Halloween Virtual Machine Meta Microchip Internet Exlporer Fraud Reviews Lenovo Amazon Medical IT Username Writing Virtual Reality Black Friday Development Transportation Scary Stories Server Management Hypervisor Outsource IT Private Cloud Database Hacks IT Technicians Shopping Superfish Optimization Environment Fun Competition Identity Theft PowerPoint Media Proxy Server Twitter Cookies Deep Learning Cyber Monday Employer/Employee Relationships PCI DSS Small Businesses Error Navigation Tactics Hotspot

Blog Archive