Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Adware Lawsuit Between Lenovo And FTC Settled

Adware Lawsuit Between Lenovo And FTC Settled

About two and a half years ago, Lenovo was brought under fire for manufacturing products that had adware preinstalled on them. This malware, a variant called Superfish, was installed on up to 750,000 Lenovo devices, and the company--eager to put this incident behind them--still refuses to admit fault, despite paying reparations and other fees as a result. Superfish allowed access to sensitive information and a root certificate, which could be used to access encrypted data on the same network. All in all, it was a rather embarrassing and dangerous scenario for Lenovo, and it comes with its fair share of consequences.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Workplace Tips Computer Google Email IT Services Phishing Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Backup Small Business Productivity Quick Tips Managed Service Passwords Saving Money Cybersecurity Communication Data Backup Smartphone Android Upgrade AI Disaster Recovery Data Recovery Smartphones VoIP Business Management Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Miscellaneous Information Holiday Automation Artificial Intelligence Facebook Gadgets Cloud Computing Training Covid-19 Server Managed Service Provider Compliance Remote Work IT Support Outsourced IT Encryption Spam Employee/Employer Relationship Office Windows 10 Government Business Continuity Data Management Blockchain Wi-Fi Business Technology Bandwidth Windows 10 Virtualization Apps Vendor Two-factor Authentication Mobile Office Data Security Employer-Employee Relationship BYOD Managed Services Voice over Internet Protocol Tip of the week Chrome Mobile Device Management Budget Gmail Apple Networking WiFi App HIPAA Computing Applications Information Technology Hacker Access Control Avoiding Downtime Office 365 Marketing Conferencing How To BDR 2FA Operating System Router Virtual Private Network Risk Management Computers Healthcare Health Help Desk Analytics Website Office Tips Augmented Reality Retail Storage Password Bring Your Own Device Managed IT Services Big Data Social Windows 11 Going Green Patch Management Save Money Remote Monitoring End of Support Vulnerability Vendor Management Excel Cybercrime Physical Security Customer Service Remote Workers Display Printer Paperless Office Infrastructure Monitoring Free Resource Project Management Document Management Windows 7 Microsoft 365 Firewall Telephone Solutions Scam Data loss The Internet of Things Cooperation Robot Holidays Telephone System Cost Management Settings Data Storage Wireless Supply Chain Printing Content Filtering Video Conferencing IT Management Customer Relationship Management Managed Services Provider Virtual Machines Professional Services VPN YouTube Meetings Cryptocurrency Hacking User Tip Modem Presentation Computer Repair Mobile Security Processor iPhone Virtual Desktop Data storage LiFi Wireless Technology Smart Technology Vulnerabilities Outlook Data Privacy Machine Learning Images 101 Money Saving Time Humor Word Multi-Factor Authentication Mobility Managed IT Service Maintenance Downloads Antivirus Sports Mouse Licensing Safety Employees Administration Integration Entertainment Legislation Medical IT Travel Social Networking Reviews Application Google Maps Cortana Development Transportation Small Businesses Techology Fileless Malware Alt Codes Content IBM Wearable Technology Hypervisor Displays Comparison Optimization PowerPoint Health IT Downtime Unified Threat Management Motherboard Shopping Hosted Solution Assessment Permissions Employer/Employee Relationships Outsourcing Unified Threat Management Directions Navigation Typing PCI DSS Network Congestion Specifications Workplace Gig Economy Internet Exlporer Competition Knowledge Fraud Internet Service Provider Teamwork Hiring/Firing Google Drive User Error Microchip Evernote Paperless Username Regulations Compliance 5G Black Friday Memes Co-managed IT Point of Sale Unified Communications Database Experience Net Neutrality SQL Server Technology Care Google Docs History Business Communications Bitcoin Network Management Running Cable Tech Support IT Technicians Financial Data User Smartwatch Monitors Cyber Monday IT Scams Google Wallet Proxy Server Cookies Tactics Hotspot Procurement Azure Hybrid Work Cyber security Tech Human Resources Windows 8 IP Address Laptop Websites Mirgation Telework Nanotechnology CES Communitications Cables Drones SharePoint Addiction Electronic Medical Records Language Supply Chain Management Term Google Apps Management Halloween Chatbots FinTech Recovery Screen Reader Hard Drives Writing Distributed Denial of Service IT Assessment IT Maintenance Lenovo Service Level Agreement Domains Virtual Reality Computing Infrastructure Flexibility Value Business Intelligence Shortcuts Hacks Server Management Scary Stories Private Cloud Identity Organization Identity Theft Smart Tech Digital Security Cameras Refrigeration Fun Smart Devices Ransmoware Superfish Bookmark Deep Learning Download Public Speaking Twitter Alerts Remote Working Memory Vendors Data Breach Google Play Be Proactive Lithium-ion battery Error Education Connectivity Videos Social Engineering Break Fix Electronic Health Records Entrepreneur Workforce Browsers Upload Remote Computing Wasting Time Threats Multi-Factor Security Trend Micro Security Cameras Workplace Strategies Mobile Computing Social Network Tablet IoT Undo Search Dark Web Software as a Service Meta Best Practice Trends Alert Managing Costs Amazon Dark Data Google Calendar eCommerce SSID Managed IT Customer Resource management Buisness File Sharing Regulations IT solutions Star Wars How To Microsoft Excel Surveillance Virtual Assistant Outsource IT Legal Data Analysis Media Business Growth Gamification Notifications Staff Virtual Machine Environment

Blog Archive