Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Adware Lawsuit Between Lenovo And FTC Settled

Adware Lawsuit Between Lenovo And FTC Settled

About two and a half years ago, Lenovo was brought under fire for manufacturing products that had adware preinstalled on them. This malware, a variant called Superfish, was installed on up to 750,000 Lenovo devices, and the company--eager to put this incident behind them--still refuses to admit fault, despite paying reparations and other fees as a result. Superfish allowed access to sensitive information and a root certificate, which could be used to access encrypted data on the same network. All in all, it was a rather embarrassing and dangerous scenario for Lenovo, and it comes with its fair share of consequences.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet IT Services Malware Phishing IT Support Google Privacy Email Workplace Tips Computer Workplace Strategy Collaboration Small Business Hosted Solutions Backup Users Ransomware Managed Service AI Mobile Device Productivity Microsoft Passwords Saving Money Quick Tips Communication Cybersecurity Smartphone Data Backup Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones communications Mobile Devices Windows Browser Social Media Managed IT Services Microsoft Office Current Events Network Tech Term Internet of Things Remote Information Miscellaneous Artificial Intelligence Facebook Holiday Automation Compliance Covid-19 Cloud Computing Gadgets Training Server Managed Service Provider Outsourced IT Remote Work IT Support Encryption Employee/Employer Relationship Spam Windows 10 Office Business Continuity Data Management Government Bandwidth Windows 10 Blockchain Virtualization Wi-Fi Business Technology Mobile Office Data Security Vendor Apps Two-factor Authentication Managed Services Chrome Budget Mobile Device Management Apple Networking Gmail App WiFi BYOD Employer-Employee Relationship Voice over Internet Protocol Tip of the week Avoiding Downtime Marketing Password Managed IT Services How To BDR HIPAA Applications Computing Physical Security Information Technology Access Control Conferencing Office 365 Hacker Augmented Reality Website Retail Storage Bring Your Own Device Router Big Data Operating System 2FA Virtual Private Network Risk Management Help Desk Health Computers Analytics Office Tips Healthcare Document Management Cooperation Free Resource Project Management Windows 7 Scam Data loss Firewall Microsoft 365 Solutions Going Green Patch Management The Internet of Things Save Money Remote Monitoring End of Support Vulnerability Vendor Management Social Cybercrime Windows 11 Monitoring Display Printer Excel Paperless Office Customer Service Infrastructure Remote Workers Managed IT Service Telephone iPhone Money Licensing Humor Entertainment Vulnerabilities Maintenance Data Privacy Word Antivirus Sports Images 101 Mouse Multi-Factor Authentication Mobility Telephone System Administration Cost Management Safety Robot Employees Integration Settings Wireless Modem Printing User Tip Processor Content Filtering Mobile Security IT Management Holidays VPN YouTube Meetings Cryptocurrency Data Storage Smart Technology Supply Chain Customer Relationship Management Computer Repair Video Conferencing Managed Services Provider Saving Time Virtual Machines Professional Services Virtual Desktop LiFi Hacking Data storage Presentation Outlook Downloads Machine Learning Wireless Technology Browsers Smartwatch Writing Connectivity IT Break Fix Scams Lenovo IP Address Virtual Reality Upload Procurement Azure Hybrid Work Cyber security Multi-Factor Security Tech Human Resources Hacks Server Management Scary Stories Private Cloud Social Network Telework CES Fun Recovery IoT Communitications Dark Web Cables Superfish Identity Theft Deep Learning Twitter Hard Drives Trends Supply Chain Management Regulations Google Calendar Term Google Apps Error Domains Customer Resource management FinTech Education Data Analysis Social Engineering Star Wars IT Assessment Microsoft Excel IT Maintenance Remote Computing Refrigeration Gamification Flexibility Staff Value Business Intelligence Social Networking Legislation Shortcuts Mobile Computing Public Speaking Organization Tablet Lithium-ion battery Fileless Malware Digital Security Cameras Search Smart Devices Ransmoware Best Practice Alert Content Remote Working Entrepreneur Wearable Technology Memory Vendors Dark Data Motherboard Data Breach Comparison Google Play Be Proactive Managed IT Buisness File Sharing Health IT IT solutions Directions Videos How To Assessment Electronic Health Records Permissions Workforce Legal Business Growth Notifications Undo Wasting Time Threats Trend Micro Specifications Security Cameras Workplace Strategies Travel Google Maps Microchip Cortana Internet Exlporer Software as a Service Fraud Meta Techology Alt Codes Username Managing Costs Amazon eCommerce Black Friday SSID Downtime Unified Threat Management Hosted Solution Application Database Surveillance Virtual Assistant Outsource IT Unified Threat Management Media Typing IT Technicians Virtual Machine Environment Network Congestion Cookies Cyber Monday Medical IT IBM Proxy Server Reviews Knowledge Tactics Development Hotspot Transportation Small Businesses Google Drive User Error Mirgation Hypervisor Displays 5G Nanotechnology Optimization PowerPoint Point of Sale Shopping Unified Communications Experience Addiction Language Employer/Employee Relationships Outsourcing Google Docs Navigation Bitcoin Network Management Running Cable Tech Support Competition Management PCI DSS Chatbots Gig Economy Monitors Screen Reader Distributed Denial of Service Workplace Google Wallet Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Identity Evernote Paperless Windows 8 Laptop Websites Regulations Compliance Bookmark User Smart Tech Memes Co-managed IT Drones Electronic Medical Records Download Net Neutrality Alerts SQL Server Technology Care SharePoint History Business Communications Halloween Financial Data

Blog Archive