Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Adware Lawsuit Between Lenovo And FTC Settled

Adware Lawsuit Between Lenovo And FTC Settled

About two and a half years ago, Lenovo was brought under fire for manufacturing products that had adware preinstalled on them. This malware, a variant called Superfish, was installed on up to 750,000 Lenovo devices, and the company--eager to put this incident behind them--still refuses to admit fault, despite paying reparations and other fees as a result. Superfish allowed access to sensitive information and a root certificate, which could be used to access encrypted data on the same network. All in all, it was a rather embarrassing and dangerous scenario for Lenovo, and it comes with its fair share of consequences.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Privacy Workplace Tips Phishing Google Email Computer Workplace Strategy Collaboration Small Business Hosted Solutions Backup Users Ransomware Managed Service Mobile Device Productivity Microsoft Quick Tips AI Passwords Saving Money Communication Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Current Events Network Tech Term Remote Internet of Things Information Holiday Automation Artificial Intelligence Facebook Miscellaneous Compliance Cloud Computing Training Covid-19 Gadgets Server Remote Work Managed Service Provider Outsourced IT IT Support Spam Employee/Employer Relationship Encryption Office Windows 10 Government Business Continuity Data Management Wi-Fi Blockchain Business Technology Bandwidth Windows 10 Virtualization Apps Two-factor Authentication Vendor Mobile Office Managed Services Data Security Employer-Employee Relationship BYOD Tip of the week Chrome Mobile Device Management Budget Gmail WiFi Apple Networking Voice over Internet Protocol App Computing Physical Security Information Technology Hacker Avoiding Downtime Access Control HIPAA Marketing Office 365 Applications Password Managed IT Services Conferencing How To BDR Operating System Computers Virtual Private Network Risk Management Health Website Router Analytics Office Tips Augmented Reality Retail Storage 2FA Help Desk Bring Your Own Device Big Data Healthcare Remote Monitoring End of Support Vulnerability Cooperation Free Resource Vendor Management Project Management Cybercrime Windows 7 Customer Service Microsoft 365 Display Printer Solutions Paperless Office Infrastructure Document Management Firewall Windows 11 Monitoring Scam Data loss Excel The Internet of Things Remote Workers Managed IT Service Social Telephone Going Green Patch Management Save Money Settings Vulnerabilities Wireless Entertainment Customer Relationship Management Printing Data Privacy Content Filtering IT Management VPN YouTube Meetings Images 101 Hacking Telephone System Presentation Multi-Factor Authentication Cryptocurrency Mobility Cost Management Computer Repair Wireless Technology Virtual Desktop Data storage LiFi Employees Integration Outlook Machine Learning User Tip Modem Word Money Mobile Security Processor Humor Holidays Data Storage Maintenance Sports Antivirus Smart Technology Supply Chain Mouse Safety Video Conferencing Managed Services Provider Saving Time Virtual Machines Professional Services Administration Downloads Robot iPhone Licensing Social Network Telework Cyber security Alt Codes Multi-Factor Security Tech Human Resources Dark Web Cables Downtime Unified Threat Management CES IoT Communitications Trends Supply Chain Management Unified Threat Management Hosted Solution Customer Resource management FinTech Competition Regulations Typing Google Calendar Term Google Apps Microsoft Excel IT Maintenance Network Congestion Data Analysis Star Wars IT Assessment Gamification Flexibility Google Drive User Error Staff Value Business Intelligence Knowledge Organization Social Networking Legislation Shortcuts Ransmoware Point of Sale 5G Fileless Malware Digital Security Cameras Smart Devices User Content Remote Working Google Docs Wearable Technology Memory Vendors Unified Communications Experience Running Cable Tech Support Health IT Motherboard Data Breach Bitcoin Network Management Comparison Google Play Be Proactive Google Wallet Permissions Workforce Monitors Directions Videos IP Address Assessment Electronic Health Records Wasting Time Threats Laptop Websites Trend Micro Windows 8 Specifications Security Cameras Workplace Strategies Drones Fraud Meta Microchip Internet Exlporer Software as a Service Recovery Username Hard Drives SharePoint Managing Costs Amazon Electronic Medical Records Halloween Domains eCommerce Black Friday SSID Lenovo Virtual Assistant Outsource IT Writing Database Surveillance Refrigeration IT Technicians Virtual Machine Environment Media Virtual Reality Scary Stories Private Cloud Proxy Server Reviews Public Speaking Cookies Hacks Server Management Cyber Monday Medical IT Superfish Hotspot Transportation Small Businesses Identity Theft Fun Lithium-ion battery Tactics Development Mirgation Hypervisor Displays Entrepreneur Deep Learning Twitter Error Shopping Nanotechnology Optimization PowerPoint Language Employer/Employee Relationships Outsourcing Education Social Engineering Addiction Management PCI DSS Undo Chatbots Navigation Remote Computing Gig Economy Screen Reader Mobile Computing Distributed Denial of Service Workplace Computing Infrastructure Teamwork Hiring/Firing Tablet Search Service Level Agreement Internet Service Provider Regulations Compliance Identity Best Practice Evernote Paperless Alert Buisness File Sharing Dark Data Bookmark Smart Tech Memes Managed IT Co-managed IT Application Legal Alerts SQL Server Technology Care IT solutions How To Download Net Neutrality Financial Data History Business Growth Business Communications Notifications Travel Browsers Smartwatch IBM Connectivity IT Break Fix Scams Upload Procurement Techology Azure Hybrid Work Google Maps Cortana

Blog Archive