Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Adware Lawsuit Between Lenovo And FTC Settled

Adware Lawsuit Between Lenovo And FTC Settled

About two and a half years ago, Lenovo was brought under fire for manufacturing products that had adware preinstalled on them. This malware, a variant called Superfish, was installed on up to 750,000 Lenovo devices, and the company--eager to put this incident behind them--still refuses to admit fault, despite paying reparations and other fees as a result. Superfish allowed access to sensitive information and a root certificate, which could be used to access encrypted data on the same network. All in all, it was a rather embarrassing and dangerous scenario for Lenovo, and it comes with its fair share of consequences.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Workplace Tips Privacy Computer Phishing Google Email Workplace Strategy Collaboration Hosted Solutions Small Business Users Backup Ransomware Managed Service Mobile Device Productivity Microsoft Quick Tips Passwords Saving Money Communication Cybersecurity AI Data Backup Smartphone Data Recovery Disaster Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Miscellaneous Holiday Automation Information Artificial Intelligence Facebook Gadgets Cloud Computing Compliance Training Covid-19 Server Managed Service Provider Remote Work Outsourced IT IT Support Encryption Spam Employee/Employer Relationship Office Windows 10 Government Data Management Business Continuity Virtualization Wi-Fi Blockchain Business Technology Windows 10 Bandwidth Managed Services Data Security Apps Two-factor Authentication Mobile Office Vendor Apple Networking Voice over Internet Protocol App Employer-Employee Relationship BYOD Mobile Device Management Tip of the week Chrome Gmail Budget WiFi Managed IT Services How To BDR Conferencing Computing Physical Security Hacker Information Technology Avoiding Downtime Marketing Access Control Office 365 HIPAA Applications Big Data Healthcare Operating System Computers Virtual Private Network Risk Management Website Health Analytics Office Tips Router Augmented Reality Retail Storage Password 2FA Bring Your Own Device Help Desk Excel Social Managed IT Service Remote Workers Going Green Patch Management Save Money Telephone Remote Monitoring End of Support Vulnerability Vendor Management Customer Service Cybercrime Cooperation Free Resource Project Management Windows 7 Display Printer Microsoft 365 Paperless Office Infrastructure Solutions Document Management Firewall Windows 11 Monitoring The Internet of Things Scam Data loss Video Conferencing Administration Managed Services Provider Professional Services Saving Time Virtual Machines Robot Customer Relationship Management Downloads iPhone Settings Wireless Licensing Printing Content Filtering Vulnerabilities Hacking IT Management Entertainment Data Privacy Presentation VPN YouTube Meetings Cryptocurrency Images 101 Wireless Technology Computer Repair Telephone System Multi-Factor Authentication Mobility Cost Management Virtual Desktop LiFi Data storage Word Outlook Employees Integration Machine Learning Money Humor User Tip Modem Mobile Security Processor Safety Maintenance Holidays Antivirus Sports Data Storage Mouse Smart Technology Supply Chain Addiction Language Employer/Employee Relationships Outsourcing Mobile Computing Tablet Search Management PCI DSS Chatbots Navigation Distributed Denial of Service Workplace Application Best Practice Alert Gig Economy Screen Reader Dark Data Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Managed IT Buisness File Sharing IT solutions How To Regulations Compliance Identity IBM Legal Evernote Paperless Co-managed IT Business Growth Notifications Bookmark Smart Tech Memes Download Net Neutrality Alerts SQL Server Technology Care Travel Google Maps Cortana Financial Data History Techology Business Communications Break Fix Scams Alt Codes Browsers Smartwatch Connectivity IT Upload Procurement Azure Hybrid Work Competition Downtime Unified Threat Management Hosted Solution Social Network Telework Cyber security Unified Threat Management Multi-Factor Security Tech Human Resources Dark Web Cables Typing CES IoT Communitications Network Congestion Trends Supply Chain Management User Knowledge Customer Resource management FinTech Regulations Google Drive User Error Google Calendar Term Google Apps Microsoft Excel IT Maintenance Data Analysis Star Wars IT Assessment 5G Gamification Flexibility Staff Value Business Intelligence Point of Sale Unified Communications Experience Organization Social Networking IP Address Google Docs Legislation Shortcuts Smart Devices Ransmoware Bitcoin Network Management Running Cable Tech Support Fileless Malware Digital Security Cameras Monitors Content Remote Working Wearable Technology Memory Vendors Google Wallet Comparison Google Play Be Proactive Recovery Health IT Motherboard Data Breach Assessment Electronic Health Records Permissions Workforce Hard Drives Windows 8 Laptop Websites Directions Videos Wasting Time Threats Domains Drones SharePoint Specifications Security Cameras Workplace Strategies Electronic Medical Records Trend Micro Internet Exlporer Software as a Service Fraud Meta Refrigeration Halloween Microchip Writing Username Managing Costs Amazon Public Speaking Lenovo Lithium-ion battery Black Friday SSID Virtual Reality eCommerce Database Surveillance Virtual Assistant Outsource IT Hacks Server Management Entrepreneur Scary Stories Private Cloud Identity Theft Fun IT Technicians Virtual Machine Environment Superfish Media Cyber Monday Medical IT Deep Learning Twitter Proxy Server Reviews Cookies Tactics Development Hotspot Transportation Small Businesses Undo Error Education Social Engineering Mirgation Hypervisor Displays PowerPoint Remote Computing Shopping Nanotechnology Optimization

Blog Archive