Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Adware Lawsuit Between Lenovo And FTC Settled

Adware Lawsuit Between Lenovo And FTC Settled

About two and a half years ago, Lenovo was brought under fire for manufacturing products that had adware preinstalled on them. This malware, a variant called Superfish, was installed on up to 750,000 Lenovo devices, and the company--eager to put this incident behind them--still refuses to admit fault, despite paying reparations and other fees as a result. Superfish allowed access to sensitive information and a root certificate, which could be used to access encrypted data on the same network. All in all, it was a rather embarrassing and dangerous scenario for Lenovo, and it comes with its fair share of consequences.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Workplace Tips Computer Phishing Email IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Quick Tips Passwords Backup Cybersecurity Productivity Saving Money Communication Managed Service Data Backup Smartphone Android Upgrade Business Management Smartphones AI VoIP Mobile Devices communications Data Recovery Windows Disaster Recovery Social Media Browser Managed IT Services Microsoft Office Network Current Events Tech Term Remote Internet of Things Automation Artificial Intelligence Information Facebook Holiday Miscellaneous Training Gadgets Covid-19 Cloud Computing Remote Work Server Managed Service Provider Compliance Outsourced IT Encryption Spam Employee/Employer Relationship IT Support Windows 10 Office Business Continuity Data Management Government Virtualization Wi-Fi Business Technology Blockchain Bandwidth Windows 10 Apps Two-factor Authentication Mobile Office Data Security Vendor App Employer-Employee Relationship Tip of the week Chrome Networking Mobile Device Management Budget Managed Services Gmail Voice over Internet Protocol Apple BYOD Access Control Computing Conferencing Information Technology Hacker Avoiding Downtime Office 365 Marketing How To BDR HIPAA Applications WiFi Big Data Virtual Private Network Help Desk Operating System Health Risk Management 2FA Computers Retail Office Tips Website Analytics Augmented Reality Managed IT Services Storage Password Bring Your Own Device Router Healthcare Physical Security Free Resource Going Green Social Display Project Management Monitoring Printer Windows 7 Paperless Office Infrastructure Cybercrime Microsoft 365 Customer Service Windows 11 Solutions Document Management Telephone Excel Cooperation Scam Data loss Firewall Patch Management Save Money Remote Workers Remote Monitoring Vulnerability End of Support Vendor Management The Internet of Things Mobile Security VPN Processor Meetings Vulnerabilities Settings Computer Repair Images 101 Printing Wireless Smart Technology Multi-Factor Authentication Mobility Content Filtering Customer Relationship Management Saving Time YouTube Cryptocurrency Hacking Machine Learning Managed IT Service Employees Presentation Downloads Supply Chain Integration Virtual Desktop Licensing Wireless Technology Data storage LiFi Maintenance Antivirus Entertainment Holidays Outlook Money Data Storage Humor Word Telephone System Video Conferencing Managed Services Provider Cost Management Virtual Machines Professional Services Sports Data Privacy Mouse Robot Safety Administration iPhone IT Management User Tip Modem Network Congestion Telework Vendors Cyber security Legal Tech IT solutions Database CES IT Technicians Communitications User Error Be Proactive Business Growth Workforce Application Proxy Server Cookies Supply Chain Management Cyber Monday FinTech Hotspot Threats Term Point of Sale Tactics Cortana Mirgation IT Assessment IBM Workplace Strategies Alt Codes Meta Value Network Management Downtime Tech Support Nanotechnology Flexibility Monitors Organization Language Amazon Hosted Solution Addiction Typing Management Digital Security Cameras Chatbots Smart Devices Outsource IT Memory Websites Screen Reader Remote Working Distributed Denial of Service Knowledge Computing Infrastructure Environment Data Breach Competition Google Drive Media Google Play Service Level Agreement Electronic Medical Records Videos Identity Electronic Health Records SharePoint Small Businesses Wasting Time Bookmark Smart Tech 5G Experience Writing Alerts Displays Trend Micro Google Docs Lenovo Security Cameras Unified Communications Download User Bitcoin Running Cable Virtual Reality Software as a Service Outsourcing Managing Costs Google Wallet Server Management Browsers Private Cloud Connectivity Break Fix eCommerce Superfish SSID Identity Theft Upload Windows 8 Social Network Laptop Twitter Surveillance Multi-Factor Security IP Address Workplace Virtual Assistant Hiring/Firing Virtual Machine Drones Error IoT Dark Web Trends Social Engineering Reviews Paperless Medical IT Recovery Customer Resource management Halloween Remote Computing Regulations Development Google Calendar Co-managed IT Transportation Microsoft Excel Technology Care Hypervisor Hard Drives Data Analysis Star Wars Gamification Shopping Staff Optimization Domains Business Communications PowerPoint Tablet Hacks Scary Stories Alert Social Networking Legislation Scams Employer/Employee Relationships PCI DSS Hybrid Work Refrigeration Managed IT Navigation Fileless Malware File Sharing Fun Dark Data Content How To Gig Economy Wearable Technology Public Speaking Human Resources Deep Learning Teamwork Health IT Notifications Motherboard Internet Service Provider Comparison Lithium-ion battery Cables Regulations Compliance Permissions Evernote Directions Entrepreneur Education Travel Assessment Memes Techology Google Apps Google Maps IT Maintenance SQL Server Mobile Computing Net Neutrality Specifications Financial Data Fraud Business Intelligence History Undo Microchip Unified Threat Management Internet Exlporer Search Username Smartwatch IT Unified Threat Management Shortcuts Best Practice Ransmoware Azure Buisness Procurement Black Friday

Blog Archive