Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Adware Lawsuit Between Lenovo And FTC Settled

Adware Lawsuit Between Lenovo And FTC Settled

About two and a half years ago, Lenovo was brought under fire for manufacturing products that had adware preinstalled on them. This malware, a variant called Superfish, was installed on up to 750,000 Lenovo devices, and the company--eager to put this incident behind them--still refuses to admit fault, despite paying reparations and other fees as a result. Superfish allowed access to sensitive information and a root certificate, which could be used to access encrypted data on the same network. All in all, it was a rather embarrassing and dangerous scenario for Lenovo, and it comes with its fair share of consequences.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Quick Tips Passwords Backup Communication Cybersecurity Productivity Saving Money Smartphone Managed Service Data Backup Android Upgrade Business Management Smartphones AI VoIP communications Data Recovery Mobile Devices Windows Disaster Recovery Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Remote Internet of Things Facebook Artificial Intelligence Automation Information Miscellaneous Gadgets Cloud Computing Covid-19 Holiday Training Remote Work Server Managed Service Provider Outsourced IT Compliance IT Support Spam Employee/Employer Relationship Encryption Office Windows 10 Data Management Government Business Continuity Wi-Fi Virtualization Bandwidth Business Technology Blockchain Windows 10 Data Security Two-factor Authentication Apps Mobile Office Vendor Gmail Networking Employer-Employee Relationship Chrome BYOD Budget Apple App Tip of the week Mobile Device Management Managed Services Voice over Internet Protocol Applications Computing Information Technology How To WiFi BDR Office 365 Conferencing Hacker Access Control Avoiding Downtime Marketing HIPAA Healthcare Managed IT Services Risk Management Help Desk Big Data Analytics Office Tips Augmented Reality Storage Virtual Private Network Password Computers Bring Your Own Device Health Website 2FA Retail Router Operating System Scam Data loss The Internet of Things Monitoring Free Resource Project Management Patch Management Windows 7 Social Save Money Remote Monitoring Vulnerability Microsoft 365 End of Support Vendor Management Solutions Telephone Physical Security Customer Service Display Printer Cooperation Paperless Office Infrastructure Document Management Going Green Windows 11 Firewall Cybercrime Remote Workers Excel YouTube User Tip Modem iPhone Mobile Security Cryptocurrency Processor Safety Vulnerabilities Virtual Desktop LiFi Data storage Smart Technology Robot Images 101 Data Privacy Saving Time Multi-Factor Authentication Outlook Mobility Money Customer Relationship Management IT Management Humor Managed IT Service VPN Meetings Downloads Employees Integration Licensing Hacking Sports Presentation Mouse Computer Repair Entertainment Wireless Technology Administration Holidays Data Storage Telephone System Machine Learning Cost Management Video Conferencing Managed Services Provider Word Professional Services Settings Virtual Machines Printing Supply Chain Wireless Content Filtering Maintenance Antivirus Net Neutrality Username SQL Server Entrepreneur Social Engineering Workplace Hiring/Firing Knowledge Financial Data History Google Drive Black Friday Remote Computing Smartwatch Paperless IT Database Procurement Azure IT Technicians Undo Tablet Co-managed IT 5G Technology Care Experience Telework Proxy Server Cyber security Cookies Google Docs Tech Cyber Monday Alert Unified Communications Hotspot File Sharing Bitcoin Dark Data Running Cable CES Business Communications Communitications Tactics Managed IT Supply Chain Management Mirgation Google Wallet How To Scams Hybrid Work FinTech Nanotechnology Term Notifications Language Application Travel Windows 8 Laptop Human Resources IT Assessment Addiction Flexibility Management Techology Value Chatbots Google Maps Drones Cables Organization Screen Reader IBM Distributed Denial of Service Computing Infrastructure Unified Threat Management Halloween Digital Security Cameras Google Apps Smart Devices Service Level Agreement Remote Working Unified Threat Management Memory Identity IT Maintenance Business Intelligence Bookmark Data Breach Smart Tech Google Play Alerts Hacks Network Congestion Scary Stories Videos Shortcuts Electronic Health Records Download Fun User Error Wasting Time Competition Ransmoware Deep Learning Vendors Browsers Trend Micro Connectivity Security Cameras Break Fix Point of Sale Be Proactive Software as a Service Upload Social Network Managing Costs Multi-Factor Security Education Workforce User Tech Support Threats eCommerce IoT Network Management SSID Dark Web Virtual Assistant Mobile Computing Monitors Workplace Strategies Surveillance Trends Search Customer Resource management Virtual Machine Regulations Google Calendar Meta Websites Best Practice Amazon Reviews Data Analysis Star Wars IP Address Medical IT Microsoft Excel Gamification Transportation Staff Buisness Development Outsource IT SharePoint Hypervisor Social Networking Legal Legislation Electronic Medical Records IT solutions Recovery Business Growth Environment Shopping Media Fileless Malware Optimization PowerPoint Content Lenovo Employer/Employee Relationships Wearable Technology Hard Drives Writing Small Businesses Cortana PCI DSS Health IT Motherboard Domains Navigation Comparison Virtual Reality Permissions Private Cloud Alt Codes Displays Gig Economy Directions Assessment Server Management Internet Service Provider Superfish Teamwork Refrigeration Identity Theft Downtime Outsourcing Regulations Compliance Public Speaking Evernote Specifications Twitter Hosted Solution Fraud Error Typing Microchip Memes Internet Exlporer Lithium-ion battery

Blog Archive