Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Adware Lawsuit Between Lenovo And FTC Settled

Adware Lawsuit Between Lenovo And FTC Settled

About two and a half years ago, Lenovo was brought under fire for manufacturing products that had adware preinstalled on them. This malware, a variant called Superfish, was installed on up to 750,000 Lenovo devices, and the company--eager to put this incident behind them--still refuses to admit fault, despite paying reparations and other fees as a result. Superfish allowed access to sensitive information and a root certificate, which could be used to access encrypted data on the same network. All in all, it was a rather embarrassing and dangerous scenario for Lenovo, and it comes with its fair share of consequences.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Hackers Cloud Network Security Hardware User Tips Efficiency Internet Malware IT Support Privacy Google Phishing Workplace Tips Computer Email Collaboration IT Services Users Hosted Solutions Workplace Strategy Ransomware Mobile Device Microsoft Small Business Quick Tips Passwords Backup Cybersecurity Saving Money Communication Data Backup Managed Service Smartphone Productivity Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Data Recovery Disaster Recovery Social Media Windows Browser Microsoft Office AI Managed IT Services Current Events Network Remote Tech Term Internet of Things Information Artificial Intelligence Automation Facebook Cloud Computing Holiday Covid-19 Miscellaneous Gadgets Training Server Managed Service Provider Remote Work Outsourced IT Spam Employee/Employer Relationship Compliance Encryption Office IT Support Windows 10 Government Business Continuity Data Management Wi-Fi Business Technology Bandwidth Windows 10 Virtualization Blockchain Apps Vendor Two-factor Authentication Mobile Office Data Security Employer-Employee Relationship BYOD Chrome Mobile Device Management Budget Tip of the week Gmail Apple Networking App Managed Services Voice over Internet Protocol Computing HIPAA Information Technology Applications Hacker Avoiding Downtime Office 365 Marketing Access Control Conferencing WiFi How To BDR Operating System Healthcare Router Risk Management Computers Virtual Private Network Website Analytics Office Tips Help Desk Health Augmented Reality Storage Password Bring Your Own Device Retail 2FA Big Data Managed IT Services Patch Management Save Money Cybercrime Remote Monitoring Vulnerability End of Support Customer Service Vendor Management Free Resource Project Management Physical Security Windows 7 Display Printer Microsoft 365 Paperless Office Monitoring Infrastructure Solutions Document Management Firewall Windows 11 Telephone Scam The Internet of Things Excel Data loss Cooperation Social Going Green Remote Workers Robot Content Filtering Customer Relationship Management YouTube iPhone Data Privacy Cryptocurrency Hacking Vulnerabilities IT Management VPN Meetings Presentation User Tip Modem Virtual Desktop Processor Mobile Security Images 101 Data storage Wireless Technology LiFi Mobility Multi-Factor Authentication Computer Repair Outlook Smart Technology Money Humor Word Saving Time Employees Machine Learning Integration Sports Managed IT Service Mouse Downloads Maintenance Safety Holidays Administration Licensing Supply Chain Antivirus Data Storage Entertainment Video Conferencing Managed Services Provider Professional Services Virtual Machines Settings Telephone System Wireless Cost Management Printing Scams Net Neutrality Travel Hosted Solution SQL Server Content Wearable Technology Motherboard Hybrid Work Techology Comparison Financial Data Google Maps Typing History Health IT IT Directions Assessment Permissions Smartwatch Human Resources Cables Google Drive Procurement Unified Threat Management Competition Azure Knowledge Tech Unified Threat Management Specifications Telework Cyber security Communitications Microchip 5G Internet Exlporer Fraud CES Google Apps IT Maintenance Google Docs Supply Chain Management Unified Communications Network Congestion Experience Username Term Business Intelligence User Error Black Friday FinTech Bitcoin User Running Cable IT Assessment Database Shortcuts Google Wallet IT Technicians Ransmoware Flexibility Point of Sale Value Proxy Server Cookies Vendors Cyber Monday Organization IP Address Windows 8 Laptop Smart Devices Tech Support Tactics Hotspot Digital Security Cameras Be Proactive Network Management Drones Mirgation Workforce Remote Working Memory Monitors Google Play Nanotechnology Threats Data Breach Recovery Halloween Electronic Health Records Websites Hard Drives Addiction Language Videos Workplace Strategies Chatbots Meta Domains Wasting Time Management Security Cameras Screen Reader Amazon SharePoint Distributed Denial of Service Hacks Trend Micro Electronic Medical Records Scary Stories Software as a Service Refrigeration Fun Service Level Agreement Computing Infrastructure Identity Outsource IT Lenovo Public Speaking Deep Learning Managing Costs Writing Bookmark SSID Smart Tech Environment Media Lithium-ion battery eCommerce Virtual Reality Surveillance Private Cloud Education Virtual Assistant Entrepreneur Download Alerts Server Management Small Businesses Superfish Identity Theft Virtual Machine Browsers Medical IT Connectivity Displays Break Fix Reviews Mobile Computing Twitter Development Error Undo Transportation Search Upload Outsourcing Multi-Factor Security Best Practice Hypervisor Social Engineering Social Network Buisness PowerPoint IoT Dark Web Shopping Optimization Remote Computing Legal IT solutions Employer/Employee Relationships Trends Workplace Regulations Hiring/Firing Google Calendar PCI DSS Tablet Business Growth Customer Resource management Navigation Alert Application Data Analysis Star Wars Microsoft Excel Gig Economy Paperless Managed IT Internet Service Provider File Sharing Teamwork Dark Data Cortana Gamification Staff Co-managed IT Social Networking Technology Care Legislation Regulations Compliance IBM Alt Codes How To Evernote Notifications Downtime Fileless Malware Business Communications Memes

Blog Archive