Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Adware Lawsuit Between Lenovo And FTC Settled

Adware Lawsuit Between Lenovo And FTC Settled

About two and a half years ago, Lenovo was brought under fire for manufacturing products that had adware preinstalled on them. This malware, a variant called Superfish, was installed on up to 750,000 Lenovo devices, and the company--eager to put this incident behind them--still refuses to admit fault, despite paying reparations and other fees as a result. Superfish allowed access to sensitive information and a root certificate, which could be used to access encrypted data on the same network. All in all, it was a rather embarrassing and dangerous scenario for Lenovo, and it comes with its fair share of consequences.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Quick Tips Passwords Backup Cybersecurity Saving Money Communication Productivity Data Backup Smartphone Managed Service Android Upgrade VoIP Business Management AI Smartphones communications Data Recovery Mobile Devices Disaster Recovery Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Internet of Things Remote Tech Term Automation Information Facebook Artificial Intelligence Holiday Training Miscellaneous Gadgets Covid-19 Cloud Computing Server Managed Service Provider Remote Work Compliance Outsourced IT Encryption Spam Employee/Employer Relationship IT Support Office Windows 10 Business Continuity Data Management Government Bandwidth Blockchain Business Technology Windows 10 Virtualization Wi-Fi Mobile Office Vendor Apps Two-factor Authentication Data Security Budget Managed Services Apple Voice over Internet Protocol Mobile Device Management Tip of the week App Gmail Networking Employer-Employee Relationship Chrome BYOD Avoiding Downtime Marketing Access Control HIPAA Applications WiFi Computing Information Technology How To BDR Conferencing Office 365 Hacker Storage Virtual Private Network Password Website Bring Your Own Device Health Healthcare Router Retail Operating System Big Data 2FA Managed IT Services Risk Management Help Desk Analytics Office Tips Augmented Reality Computers Physical Security Cooperation Display Printer Paperless Office Remote Workers Infrastructure Firewall Document Management Going Green Free Resource Project Management Windows 7 The Internet of Things Cybercrime Scam Windows 11 Data loss Microsoft 365 Social Monitoring Solutions Excel Patch Management Save Money Remote Monitoring Customer Service Telephone Vulnerability End of Support Vendor Management VPN Data Storage Meetings Entertainment Wireless Technology Data Privacy Video Conferencing Managed Services Provider Sports Virtual Machines Computer Repair Professional Services Mouse Telephone System Administration Cost Management Word iPhone Machine Learning Vulnerabilities Safety Settings User Tip Wireless Modem Printing Processor Content Filtering Mobile Security Images 101 Maintenance Antivirus YouTube Mobility Multi-Factor Authentication Cryptocurrency Smart Technology Supply Chain Virtual Desktop Saving Time Employees Data storage LiFi Integration Customer Relationship Management Robot Managed IT Service Outlook Hacking Downloads Presentation Money Holidays Licensing IT Management Humor Social Network Multi-Factor Security Human Resources Hacks Hypervisor Network Congestion Scary Stories Optimization PowerPoint Fun IoT User Error Dark Web Shopping Cables Deep Learning Employer/Employee Relationships IP Address Trends Navigation Customer Resource management Regulations Google Calendar PCI DSS Point of Sale Google Apps Education Data Analysis Star Wars Microsoft Excel Gig Economy IT Maintenance Staff Network Management Business Intelligence Internet Service Provider Tech Support Teamwork Gamification Recovery Evernote Hard Drives Social Networking Legislation Regulations Compliance Shortcuts Mobile Computing Monitors Memes Fileless Malware Domains Search Ransmoware Wearable Technology Vendors Net Neutrality Websites Best Practice SQL Server Content Buisness Health IT Refrigeration Motherboard Comparison Financial Data Be Proactive History Legal IT Electronic Medical Records IT solutions Directions Public Speaking Assessment SharePoint Permissions Smartwatch Workforce Threats Procurement Business Growth Azure Lithium-ion battery Tech Lenovo Entrepreneur Specifications Telework Workplace Strategies Cyber security Writing Communitications Virtual Reality Microchip Cortana Internet Exlporer Fraud CES Meta Server Management Amazon Supply Chain Management Private Cloud Alt Codes Username Downtime Term Undo Superfish Black Friday FinTech Identity Theft Outsource IT IT Assessment Twitter Hosted Solution Database IT Technicians Environment Flexibility Error Media Typing Value Proxy Server Cookies Cyber Monday Organization Social Engineering Small Businesses Google Drive Smart Devices Remote Computing Knowledge Tactics Hotspot Digital Security Cameras Application Mirgation Displays Remote Working Memory Google Play 5G Nanotechnology Tablet Data Breach Outsourcing Google Docs Electronic Health Records Alert Unified Communications IBM Experience Addiction Language Videos Chatbots Managed IT File Sharing Bitcoin Wasting Time Dark Data Running Cable Management How To Security Cameras Screen Reader Distributed Denial of Service Workplace Google Wallet Trend Micro Hiring/Firing Software as a Service Notifications Service Level Agreement Computing Infrastructure Identity Travel Paperless Windows 8 Managing Costs Laptop SSID Bookmark Competition Smart Tech Techology Google Maps Co-managed IT Drones eCommerce Technology Care Surveillance Virtual Assistant Download Alerts Unified Threat Management Business Communications Virtual Machine Halloween Medical IT Browsers Connectivity Unified Threat Management Break Fix Reviews Scams Hybrid Work Development Transportation Upload User

Blog Archive