Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Adware Lawsuit Between Lenovo And FTC Settled

Adware Lawsuit Between Lenovo And FTC Settled

About two and a half years ago, Lenovo was brought under fire for manufacturing products that had adware preinstalled on them. This malware, a variant called Superfish, was installed on up to 750,000 Lenovo devices, and the company--eager to put this incident behind them--still refuses to admit fault, despite paying reparations and other fees as a result. Superfish allowed access to sensitive information and a root certificate, which could be used to access encrypted data on the same network. All in all, it was a rather embarrassing and dangerous scenario for Lenovo, and it comes with its fair share of consequences.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Productivity Passwords Quick Tips Backup Communication Cybersecurity Saving Money Smartphone Managed Service Data Backup Android Upgrade AI Business Management VoIP Smartphones Data Recovery Mobile Devices communications Disaster Recovery Windows Browser Social Media Managed IT Services Microsoft Office Current Events Network Internet of Things Remote Tech Term Information Facebook Artificial Intelligence Automation Covid-19 Miscellaneous Gadgets Cloud Computing Holiday Training Remote Work Server Managed Service Provider Outsourced IT Compliance Encryption Employee/Employer Relationship Spam IT Support Office Windows 10 Business Continuity Data Management Government Virtualization Wi-Fi Windows 10 Business Technology Blockchain Bandwidth Vendor Apps Data Security Two-factor Authentication Mobile Office Gmail Tip of the week Apple App Networking Employer-Employee Relationship Managed Services BYOD Voice over Internet Protocol Mobile Device Management Chrome Budget HIPAA WiFi Applications How To BDR Computing Conferencing Hacker Information Technology Avoiding Downtime Marketing Office 365 Access Control Storage Password Bring Your Own Device Router Retail Big Data Managed IT Services 2FA Help Desk Operating System Computers Risk Management Healthcare Website Virtual Private Network Analytics Office Tips Augmented Reality Health Microsoft 365 Document Management The Internet of Things Solutions Scam Social Data loss Going Green Windows 11 Monitoring Cybercrime Excel Customer Service Patch Management Save Money Remote Monitoring Vulnerability End of Support Vendor Management Remote Workers Telephone Physical Security Display Printer Cooperation Free Resource Paperless Office Infrastructure Project Management Firewall Windows 7 Multi-Factor Authentication Mobility Machine Learning Sports Safety Mouse Administration Maintenance Employees User Tip Modem Antivirus Integration Processor Mobile Security Settings Holidays Customer Relationship Management Printing Smart Technology Supply Chain Wireless Content Filtering Data Storage Saving Time YouTube Video Conferencing Robot Managed Services Provider Hacking Cryptocurrency Virtual Machines Professional Services Presentation Managed IT Service IT Management Downloads Wireless Technology VPN Meetings Virtual Desktop Data storage Licensing LiFi iPhone Entertainment Data Privacy Computer Repair Outlook Word Vulnerabilities Money Humor Images 101 Telephone System Cost Management Deep Learning Organization Vendors Electronic Medical Records Content SharePoint Wearable Technology Entrepreneur Motherboard Digital Security Cameras Comparison Smart Devices Be Proactive Health IT Writing Memory Directions Assessment Lenovo Permissions Education Remote Working Workforce Threats Virtual Reality Data Breach Google Play Undo Server Management Mobile Computing Videos Specifications Private Cloud Electronic Health Records Workplace Strategies Search Wasting Time Microchip Internet Exlporer Superfish Fraud Identity Theft Meta Best Practice Amazon Twitter Trend Micro Security Cameras Username Black Friday Error Buisness Software as a Service Outsource IT Social Engineering Managing Costs Database Application Legal IT solutions IT Technicians Business Growth Environment Remote Computing eCommerce Media SSID Proxy Server IBM Cookies Cyber Monday Surveillance Virtual Assistant Small Businesses Cortana Virtual Machine Tactics Hotspot Tablet Mirgation Alt Codes Reviews Displays Alert Medical IT Nanotechnology Managed IT File Sharing Downtime Development Dark Data Transportation Outsourcing How To Hypervisor Addiction Language Hosted Solution Chatbots Typing Shopping Notifications Optimization PowerPoint Management Competition Screen Reader Distributed Denial of Service Travel Workplace Employer/Employee Relationships Hiring/Firing Knowledge Navigation Service Level Agreement Techology Google Drive Computing Infrastructure Google Maps PCI DSS Identity Gig Economy Paperless Bookmark Smart Tech User Unified Threat Management Internet Service Provider Co-managed IT 5G Teamwork Technology Care Experience Evernote Download Unified Threat Management Google Docs Alerts Unified Communications Regulations Compliance Bitcoin Running Cable Memes Business Communications Browsers IP Address Connectivity Google Wallet Break Fix Net Neutrality Scams Network Congestion SQL Server Financial Data Hybrid Work History Upload User Error Windows 8 Smartwatch Multi-Factor Security Laptop IT Human Resources Social Network Azure IoT Recovery Drones Dark Web Point of Sale Procurement Cables Telework Cyber security Tech Trends Hard Drives Regulations Network Management CES Google Calendar Tech Support Halloween Communitications Google Apps Customer Resource management Domains Monitors Data Analysis Star Wars Microsoft Excel Supply Chain Management IT Maintenance FinTech Business Intelligence Term Gamification Refrigeration Staff Social Networking Hacks Legislation Websites Scary Stories IT Assessment Shortcuts Public Speaking Fun Value Fileless Malware Lithium-ion battery Flexibility Ransmoware

Blog Archive