Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Adware Lawsuit Between Lenovo And FTC Settled

Adware Lawsuit Between Lenovo And FTC Settled

About two and a half years ago, Lenovo was brought under fire for manufacturing products that had adware preinstalled on them. This malware, a variant called Superfish, was installed on up to 750,000 Lenovo devices, and the company--eager to put this incident behind them--still refuses to admit fault, despite paying reparations and other fees as a result. Superfish allowed access to sensitive information and a root certificate, which could be used to access encrypted data on the same network. All in all, it was a rather embarrassing and dangerous scenario for Lenovo, and it comes with its fair share of consequences.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support Privacy Workplace Tips IT Services Google Email Computer Phishing Collaboration Hosted Solutions Workplace Strategy Users Ransomware Small Business Backup Mobile Device Microsoft Productivity Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Smartphone Data Backup Data Recovery AI Android Disaster Recovery Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Remote Internet of Things Artificial Intelligence Information Facebook Miscellaneous Holiday Automation Covid-19 Cloud Computing Gadgets Training Compliance Server Remote Work Managed Service Provider Outsourced IT IT Support Employee/Employer Relationship Encryption Spam Office Windows 10 Data Management Business Continuity Government Blockchain Windows 10 Bandwidth Virtualization Business Technology Wi-Fi Two-factor Authentication Mobile Office Data Security Vendor Apps Mobile Device Management Networking Chrome Gmail Budget Managed Services Voice over Internet Protocol WiFi BYOD Apple App Employer-Employee Relationship Tip of the week Information Technology Avoiding Downtime Marketing Office 365 How To BDR HIPAA Applications Access Control Conferencing Computing Hacker Risk Management Retail Website 2FA Analytics Office Tips Managed IT Services Augmented Reality Router Storage Password Bring Your Own Device Big Data Healthcare Physical Security Virtual Private Network Help Desk Health Operating System Computers Solutions Document Management Windows 11 Cooperation Scam Excel Data loss Firewall Patch Management Save Money The Internet of Things Remote Monitoring Vulnerability End of Support Remote Workers Vendor Management Social Monitoring Display Printer Free Resource Going Green Project Management Windows 7 Paperless Office Infrastructure Customer Service Microsoft 365 Cybercrime Telephone Cryptocurrency Wireless Technology Licensing Employees Entertainment Integration Maintenance Virtual Desktop LiFi Supply Chain Data storage Antivirus Word Telephone System Holidays Outlook Cost Management Data Storage Money Humor Video Conferencing Managed Services Provider Professional Services Robot Safety Virtual Machines Sports Mouse User Tip Modem Data Privacy Processor Mobile Security IT Management Administration VPN iPhone Meetings Vulnerabilities Smart Technology Computer Repair Customer Relationship Management Saving Time Settings Images 101 Printing Wireless Content Filtering Multi-Factor Authentication Mobility Managed IT Service Hacking Presentation YouTube Machine Learning Downloads Electronic Health Records Lenovo Browsers Connectivity Writing Break Fix Videos Outsource IT 5G Environment Media Wasting Time Upload Virtual Reality Security Cameras Unified Communications Private Cloud Experience Multi-Factor Security IP Address Trend Micro Google Docs Server Management Social Network Software as a Service Superfish Bitcoin Identity Theft IoT Running Cable Dark Web Small Businesses Displays Managing Costs Google Wallet Trends Twitter Customer Resource management SSID Error Regulations Google Calendar Recovery eCommerce Hard Drives Surveillance Data Analysis Virtual Assistant Windows 8 Star Wars Laptop Social Engineering Microsoft Excel Outsourcing Staff Domains Virtual Machine Drones Gamification Remote Computing Medical IT Social Networking Legislation Reviews Workplace Refrigeration Development Fileless Malware Transportation Tablet Halloween Hiring/Firing Wearable Technology Public Speaking Paperless Hypervisor Content Alert Health IT PowerPoint File Sharing Motherboard Dark Data Comparison Lithium-ion battery Shopping Co-managed IT Optimization Managed IT Technology Care Directions Entrepreneur Employer/Employee Relationships Hacks Assessment Scary Stories How To Permissions Fun PCI DSS Business Communications Navigation Notifications Deep Learning Travel Specifications Gig Economy Scams Hybrid Work Undo Internet Service Provider Techology Microchip Teamwork Google Maps Internet Exlporer Fraud Regulations Compliance Human Resources Username Evernote Education Unified Threat Management Black Friday Cables Memes Net Neutrality Unified Threat Management SQL Server Mobile Computing Database IT Technicians Search Financial Data Google Apps History Proxy Server Best Practice Cookies Network Congestion Cyber Monday Smartwatch IT Maintenance Application IT Business Intelligence Procurement User Error Azure Tactics Buisness Hotspot Mirgation IBM Telework Shortcuts Cyber security Legal Tech IT solutions Business Growth Point of Sale Nanotechnology CES Ransmoware Communitications Vendors Supply Chain Management Addiction Language Tech Support Chatbots Cortana FinTech Be Proactive Network Management Management Term Alt Codes Screen Reader Monitors Distributed Denial of Service Workforce IT Assessment Threats Competition Flexibility Value Service Level Agreement Downtime Computing Infrastructure Hosted Solution Websites Identity Organization Workplace Strategies Smart Devices Bookmark Typing Smart Tech Digital Security Cameras Meta Amazon Remote Working SharePoint Memory Download Electronic Medical Records Alerts Google Play Knowledge User Data Breach Google Drive

Blog Archive