Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Adware Lawsuit Between Lenovo And FTC Settled

Adware Lawsuit Between Lenovo And FTC Settled

About two and a half years ago, Lenovo was brought under fire for manufacturing products that had adware preinstalled on them. This malware, a variant called Superfish, was installed on up to 750,000 Lenovo devices, and the company--eager to put this incident behind them--still refuses to admit fault, despite paying reparations and other fees as a result. Superfish allowed access to sensitive information and a root certificate, which could be used to access encrypted data on the same network. All in all, it was a rather embarrassing and dangerous scenario for Lenovo, and it comes with its fair share of consequences.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Passwords Backup Quick Tips Saving Money Communication Cybersecurity Productivity Smartphone Data Backup Managed Service Android Upgrade Business Management VoIP Smartphones AI communications Data Recovery Mobile Devices Windows Disaster Recovery Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Remote Internet of Things Artificial Intelligence Facebook Information Automation Cloud Computing Holiday Miscellaneous Training Gadgets Covid-19 Server Managed Service Provider Remote Work Outsourced IT Compliance IT Support Spam Encryption Employee/Employer Relationship Office Windows 10 Data Management Government Business Continuity Wi-Fi Windows 10 Bandwidth Virtualization Blockchain Business Technology Mobile Office Two-factor Authentication Data Security Apps Vendor Networking Managed Services Mobile Device Management Voice over Internet Protocol Gmail Chrome Budget BYOD Apple Employer-Employee Relationship App Tip of the week Computing Avoiding Downtime Information Technology Marketing Conferencing How To Office 365 BDR WiFi Access Control HIPAA Applications Hacker Retail Risk Management Help Desk Website Managed IT Services Analytics Office Tips Healthcare Augmented Reality Storage Password Big Data Bring Your Own Device 2FA Virtual Private Network Health Router Operating System Computers Monitoring Scam Data loss Remote Workers Firewall Telephone Patch Management Save Money Remote Monitoring Vulnerability End of Support Free Resource The Internet of Things Cooperation Vendor Management Project Management Windows 7 Windows 11 Physical Security Social Microsoft 365 Display Printer Excel Solutions Paperless Office Infrastructure Going Green Customer Service Document Management Cybercrime YouTube Holidays Wireless Technology Data Storage Cryptocurrency Data Privacy Maintenance Antivirus Smart Technology Video Conferencing Managed Services Provider Virtual Desktop Virtual Machines Saving Time Professional Services Data storage LiFi Word Managed IT Service Outlook Downloads Robot Money iPhone Humor Licensing Safety Entertainment Vulnerabilities Sports IT Management VPN Meetings Images 101 Mouse Multi-Factor Authentication Telephone System Mobility Cost Management Administration Supply Chain Computer Repair Customer Relationship Management Employees Integration Settings Wireless Machine Learning User Tip Printing Modem Hacking Presentation Mobile Security Content Filtering Processor Server Management Human Resources Cyber Monday Private Cloud Reviews Proxy Server Medical IT Cookies Google Drive Transportation Tactics Superfish Cables Hotspot Knowledge Identity Theft Development Twitter Hypervisor IP Address Mirgation Google Apps 5G Error Shopping Optimization PowerPoint Nanotechnology Google Docs Employer/Employee Relationships Addiction Unified Communications IT Maintenance Language Experience Social Engineering Remote Computing PCI DSS Management Bitcoin Navigation Business Intelligence Chatbots Recovery Running Cable Hard Drives Shortcuts Distributed Denial of Service Gig Economy Google Wallet Screen Reader Teamwork Service Level Agreement Domains Ransmoware Computing Infrastructure Tablet Internet Service Provider Alert Regulations Compliance Windows 8 Evernote Vendors Identity Laptop Refrigeration Managed IT Be Proactive File Sharing Dark Data Memes Bookmark Drones Smart Tech SQL Server Download Public Speaking Workforce Alerts How To Net Neutrality Notifications Financial Data History Lithium-ion battery Threats Halloween Connectivity Workplace Strategies Break Fix Entrepreneur Travel Smartwatch IT Browsers Azure Upload Techology Meta Google Maps Procurement Multi-Factor Security Telework Cyber security Social Network Hacks Tech Amazon Scary Stories IoT Undo Dark Web Fun Unified Threat Management CES Communitications Supply Chain Management Trends Deep Learning Unified Threat Management Outsource IT Media Google Calendar FinTech Customer Resource management Term Environment Regulations Star Wars Education Microsoft Excel Network Congestion IT Assessment Data Analysis Flexibility Value Gamification User Error Small Businesses Staff Legislation Organization Mobile Computing Displays Social Networking Application Search Point of Sale Digital Security Cameras Smart Devices Fileless Malware Remote Working Memory Content IBM Best Practice Outsourcing Wearable Technology Network Management Comparison Tech Support Data Breach Health IT Google Play Motherboard Buisness Legal Assessment IT solutions Workplace Permissions Videos Monitors Electronic Health Records Directions Wasting Time Business Growth Hiring/Firing Paperless Specifications Websites Trend Micro Security Cameras Internet Exlporer Competition Co-managed IT Fraud Cortana Software as a Service Microchip Electronic Medical Records Managing Costs Username Alt Codes SharePoint Technology Care Downtime Business Communications Black Friday eCommerce SSID Virtual Assistant Database Hosted Solution Lenovo Scams Writing Surveillance Virtual Reality Virtual Machine Typing Hybrid Work IT Technicians User

Blog Archive