Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Adware Lawsuit Between Lenovo And FTC Settled

Adware Lawsuit Between Lenovo And FTC Settled

About two and a half years ago, Lenovo was brought under fire for manufacturing products that had adware preinstalled on them. This malware, a variant called Superfish, was installed on up to 750,000 Lenovo devices, and the company--eager to put this incident behind them--still refuses to admit fault, despite paying reparations and other fees as a result. Superfish allowed access to sensitive information and a root certificate, which could be used to access encrypted data on the same network. All in all, it was a rather embarrassing and dangerous scenario for Lenovo, and it comes with its fair share of consequences.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support Privacy IT Services Google Email Workplace Tips Computer Phishing Collaboration Hosted Solutions Workplace Strategy Users Ransomware Mobile Device Microsoft Backup Small Business Productivity Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone Android Upgrade Disaster Recovery Data Recovery AI VoIP Business Management Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Automation Artificial Intelligence Facebook Miscellaneous Holiday Information Gadgets Cloud Computing Training Covid-19 Remote Work Server Managed Service Provider Compliance IT Support Outsourced IT Employee/Employer Relationship Encryption Spam Office Windows 10 Business Continuity Data Management Government Business Technology Bandwidth Windows 10 Virtualization Wi-Fi Blockchain Two-factor Authentication Vendor Mobile Office Data Security Apps Tip of the week Chrome Mobile Device Management Budget Gmail Managed Services Apple Networking Voice over Internet Protocol WiFi App Employer-Employee Relationship BYOD Access Control Applications Avoiding Downtime Office 365 Marketing Conferencing How To BDR Computing Information Technology HIPAA Hacker Router Health Analytics Website Office Tips Augmented Reality 2FA Retail Help Desk Storage Password Bring Your Own Device Managed IT Services Healthcare Big Data Operating System Virtual Private Network Risk Management Computers Paperless Office Infrastructure Windows 11 Document Management Monitoring Firewall Excel Scam Data loss Remote Workers The Internet of Things Telephone Social Going Green Patch Management Save Money Cooperation Free Resource Remote Monitoring Project Management Vulnerability End of Support Vendor Management Windows 7 Cybercrime Physical Security Microsoft 365 Customer Service Display Printer Solutions Employees Virtual Desktop LiFi Wireless Technology Data storage Integration User Tip Modem Processor Outlook Mobile Security Machine Learning Holidays Money Word Humor Data Storage Smart Technology Supply Chain Maintenance Video Conferencing Managed Services Provider Antivirus Sports Saving Time Virtual Machines Mouse Professional Services Safety Managed IT Service Administration Downloads iPhone Licensing Robot Entertainment Vulnerabilities Data Privacy Settings Printing Wireless Content Filtering Images 101 IT Management Customer Relationship Management Telephone System Multi-Factor Authentication VPN Mobility YouTube Meetings Cost Management Cryptocurrency Hacking Presentation Computer Repair Monitors Trend Micro Google Wallet Specifications Security Cameras Workplace Strategies Microchip Internet Exlporer Software as a Service Fraud Meta Managing Costs Amazon Windows 8 IP Address Laptop Websites Username eCommerce Drones Black Friday SSID Electronic Medical Records Database Surveillance SharePoint Virtual Assistant Outsource IT IT Technicians Virtual Machine Environment Media Halloween Recovery Writing Proxy Server Reviews Cookies Lenovo Cyber Monday Medical IT Hard Drives Domains Virtual Reality Tactics Development Hotspot Transportation Small Businesses Mirgation Hypervisor Displays Hacks Server Management Scary Stories Private Cloud Fun Shopping Nanotechnology Optimization Superfish PowerPoint Identity Theft Refrigeration Deep Learning Public Speaking Twitter Addiction Language Employer/Employee Relationships Outsourcing Chatbots Navigation Lithium-ion battery Error Management PCI DSS Social Engineering Gig Economy Entrepreneur Screen Reader Distributed Denial of Service Workplace Education Remote Computing Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Identity Mobile Computing Evernote Paperless Regulations Compliance Undo Search Bookmark Smart Tech Memes Co-managed IT Tablet Best Practice Alert Download Net Neutrality Alerts SQL Server Technology Care History Managed IT Business Communications Buisness File Sharing Dark Data Financial Data How To Browsers Smartwatch Connectivity IT Legal Break Fix Scams IT solutions Business Growth Notifications Upload Procurement Azure Hybrid Work Social Network Telework Cyber security Multi-Factor Security Tech Human Resources Travel Application Cortana CES IoT Communitications Techology Dark Web Cables Google Maps Alt Codes IBM Trends Supply Chain Management Customer Resource management FinTech Regulations Google Calendar Term Google Apps Downtime Unified Threat Management Hosted Solution Data Analysis Star Wars IT Assessment Unified Threat Management Microsoft Excel IT Maintenance Staff Value Business Intelligence Typing Gamification Flexibility Network Congestion Organization Social Networking Legislation Shortcuts Competition Knowledge Fileless Malware Digital Security Cameras Smart Devices Google Drive User Error Ransmoware Wearable Technology Memory Vendors Content Remote Working 5G Health IT Motherboard Data Breach Comparison Google Play Be Proactive Point of Sale Unified Communications Experience Directions Videos Assessment Electronic Health Records Google Docs Permissions Workforce Wasting Time Threats Bitcoin Network Management Running Cable Tech Support User

Blog Archive