Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Adware Lawsuit Between Lenovo And FTC Settled

Adware Lawsuit Between Lenovo And FTC Settled

About two and a half years ago, Lenovo was brought under fire for manufacturing products that had adware preinstalled on them. This malware, a variant called Superfish, was installed on up to 750,000 Lenovo devices, and the company--eager to put this incident behind them--still refuses to admit fault, despite paying reparations and other fees as a result. Superfish allowed access to sensitive information and a root certificate, which could be used to access encrypted data on the same network. All in all, it was a rather embarrassing and dangerous scenario for Lenovo, and it comes with its fair share of consequences.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Passwords Quick Tips Backup Cybersecurity Saving Money Communication Productivity Data Backup Smartphone Managed Service Android Upgrade Business Management Smartphones AI VoIP Data Recovery communications Mobile Devices Windows Disaster Recovery Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Facebook Information Artificial Intelligence Automation Miscellaneous Gadgets Cloud Computing Holiday Training Covid-19 Server Managed Service Provider Remote Work Outsourced IT Compliance Encryption Spam IT Support Employee/Employer Relationship Office Windows 10 Government Business Continuity Data Management Virtualization Blockchain Wi-Fi Bandwidth Business Technology Windows 10 Apps Vendor Data Security Two-factor Authentication Mobile Office App Managed Services Voice over Internet Protocol Networking Employer-Employee Relationship BYOD Chrome Budget Mobile Device Management Gmail Tip of the week Apple WiFi Computing How To HIPAA BDR Information Technology Applications Hacker Office 365 Avoiding Downtime Marketing Conferencing Access Control Retail Big Data Operating System Managed IT Services Healthcare Router Risk Management Computers Analytics Office Tips Help Desk Website Augmented Reality Virtual Private Network Storage Password Health Bring Your Own Device 2FA Cooperation The Internet of Things Excel Going Green Social Scam Data loss Remote Workers Cybercrime Patch Management Customer Service Save Money Free Resource Remote Monitoring Vulnerability End of Support Project Management Windows 7 Vendor Management Monitoring Microsoft 365 Physical Security Display Solutions Printer Paperless Office Infrastructure Firewall Telephone Windows 11 Document Management Data Storage Video Conferencing Maintenance Antivirus Managed Services Provider Professional Services Telephone System Settings Virtual Machines Wireless Cost Management Printing Content Filtering YouTube Customer Relationship Management iPhone Cryptocurrency Robot Data Privacy Vulnerabilities User Tip Modem Hacking Mobile Security Virtual Desktop Presentation Processor Data storage LiFi Images 101 Wireless Technology IT Management Mobility Outlook VPN Meetings Multi-Factor Authentication Smart Technology Money Humor Saving Time Computer Repair Word Employees Integration Managed IT Service Sports Mouse Downloads Licensing Administration Machine Learning Safety Holidays Supply Chain Entertainment Server Management IT solutions Private Cloud Outsourcing Hypervisor Trends Legal PowerPoint Customer Resource management Superfish Regulations Business Growth Identity Theft Shopping Google Calendar Optimization Twitter Workplace Employer/Employee Relationships Data Analysis Star Wars Microsoft Excel Staff Error PCI DSS Cortana Hiring/Firing Navigation Gamification Paperless Social Networking Alt Codes Gig Economy Legislation Application Social Engineering Remote Computing Internet Service Provider Co-managed IT Teamwork Fileless Malware Downtime Wearable Technology Hosted Solution IBM Regulations Compliance Technology Care Evernote Content Business Communications Health IT Motherboard Typing Tablet Comparison Memes Alert Net Neutrality Scams SQL Server Directions Assessment Permissions Google Drive Managed IT File Sharing Financial Data Knowledge Dark Data Hybrid Work History Human Resources Smartwatch Specifications How To IT Fraud Competition Notifications Procurement 5G Cables Azure Microchip Internet Exlporer Username Google Docs Unified Communications Travel Telework Experience Cyber security Tech Google Apps Techology Bitcoin Google Maps CES Black Friday Running Cable Communitications Supply Chain Management IT Maintenance Database Google Wallet IT Technicians Unified Threat Management FinTech User Business Intelligence Term IT Assessment Shortcuts Proxy Server Unified Threat Management Cookies Windows 8 Cyber Monday Laptop Hotspot Flexibility Ransmoware Value Tactics Drones Mirgation IP Address Organization Network Congestion Vendors Smart Devices Be Proactive User Error Nanotechnology Digital Security Cameras Halloween Language Remote Working Workforce Memory Addiction Google Play Management Chatbots Point of Sale Recovery Threats Data Breach Electronic Health Records Workplace Strategies Screen Reader Hacks Videos Distributed Denial of Service Scary Stories Hard Drives Computing Infrastructure Domains Tech Support Fun Meta Wasting Time Service Level Agreement Network Management Security Cameras Identity Deep Learning Monitors Amazon Trend Micro Software as a Service Bookmark Smart Tech Refrigeration Alerts Education Public Speaking Websites Outsource IT Managing Costs Download Media SSID Lithium-ion battery Environment eCommerce Surveillance Entrepreneur Virtual Assistant Browsers SharePoint Connectivity Mobile Computing Break Fix Electronic Medical Records Search Small Businesses Virtual Machine Upload Medical IT Social Network Lenovo Best Practice Reviews Multi-Factor Security Writing Displays Virtual Reality Development Transportation IoT Dark Web Buisness Undo

Blog Archive