Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Adware Lawsuit Between Lenovo And FTC Settled

Adware Lawsuit Between Lenovo And FTC Settled

About two and a half years ago, Lenovo was brought under fire for manufacturing products that had adware preinstalled on them. This malware, a variant called Superfish, was installed on up to 750,000 Lenovo devices, and the company--eager to put this incident behind them--still refuses to admit fault, despite paying reparations and other fees as a result. Superfish allowed access to sensitive information and a root certificate, which could be used to access encrypted data on the same network. All in all, it was a rather embarrassing and dangerous scenario for Lenovo, and it comes with its fair share of consequences.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Email Workplace Tips Computer Google Phishing Collaboration Hosted Solutions Workplace Strategy Users Small Business Ransomware Backup Mobile Device Productivity Microsoft Managed Service Quick Tips Saving Money Communication Passwords Cybersecurity Smartphone Data Backup Data Recovery AI Android Disaster Recovery VoIP Upgrade Business Management Smartphones communications Mobile Devices Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Remote Internet of Things Holiday Facebook Automation Miscellaneous Artificial Intelligence Information Covid-19 Training Gadgets Cloud Computing Remote Work Compliance Server Managed Service Provider Outsourced IT IT Support Encryption Employee/Employer Relationship Spam Windows 10 Office Data Management Business Continuity Government Windows 10 Wi-Fi Virtualization Business Technology Bandwidth Blockchain Two-factor Authentication Apps Data Security Mobile Office Vendor App Gmail WiFi Tip of the week Employer-Employee Relationship Managed Services Voice over Internet Protocol Chrome Networking Budget Apple Mobile Device Management BYOD Applications Access Control Computing Information Technology Conferencing Office 365 Hacker How To BDR Avoiding Downtime Marketing HIPAA 2FA Virtual Private Network Operating System Help Desk Health Big Data Risk Management Retail Office Tips Analytics Healthcare Computers Augmented Reality Managed IT Services Storage Password Website Bring Your Own Device Router Firewall Windows 11 Solutions Physical Security Going Green Display Printer Excel The Internet of Things Monitoring Paperless Office Infrastructure Cybercrime Social Document Management Telephone Remote Workers Customer Service Scam Data loss Cooperation Free Resource Project Management Patch Management Windows 7 Save Money Remote Monitoring End of Support Vulnerability Microsoft 365 Vendor Management VPN Meetings User Tip Modem Employees Processor Mobile Security Supply Chain Integration Settings Safety Computer Repair Printing Wireless Content Filtering Smart Technology Holidays YouTube Cryptocurrency Saving Time Data Storage Machine Learning Video Conferencing Managed Services Provider Managed IT Service Virtual Machines Professional Services Virtual Desktop Customer Relationship Management Downloads Data storage LiFi Maintenance Data Privacy Antivirus Licensing Outlook Entertainment Hacking Money iPhone Presentation Humor Vulnerabilities Wireless Technology Telephone System Sports Cost Management Robot Images 101 Mouse Multi-Factor Authentication Mobility Word Administration IT Management Network Congestion Videos Electronic Health Records Legal IT solutions Username Public Speaking Lithium-ion battery Black Friday Small Businesses User Error Wasting Time Business Growth Displays Trend Micro Security Cameras Database Entrepreneur IT Technicians Software as a Service Point of Sale Cortana Managing Costs Alt Codes Proxy Server Cookies Cyber Monday Outsourcing eCommerce Network Management SSID Downtime Tactics Tech Support Undo Hotspot Mirgation Monitors Surveillance Workplace Virtual Assistant Hosted Solution Virtual Machine Typing Nanotechnology Hiring/Firing Reviews Paperless Medical IT Addiction Websites Language Knowledge Chatbots Development Google Drive Co-managed IT Transportation Management SharePoint Hypervisor Screen Reader Electronic Medical Records Application Distributed Denial of Service Technology Care Shopping Optimization Business Communications PowerPoint Service Level Agreement 5G Computing Infrastructure Experience IBM Identity Writing Google Docs Scams Lenovo Employer/Employee Relationships Unified Communications Bitcoin Bookmark Navigation Running Cable Smart Tech Virtual Reality PCI DSS Hybrid Work Gig Economy Google Wallet Human Resources Server Management Download Private Cloud Alerts Identity Theft Internet Service Provider Cables Superfish Teamwork Windows 8 Browsers Evernote Laptop Connectivity Twitter Break Fix Regulations Compliance Memes Drones Google Apps Upload Error Competition Social Engineering Multi-Factor Security Net Neutrality IT Maintenance SQL Server Social Network History Halloween IoT Remote Computing Dark Web Financial Data Business Intelligence Smartwatch IT Shortcuts Trends Customer Resource management Tablet Regulations User Google Calendar Procurement Ransmoware Azure Vendors Cyber security Hacks Data Analysis Tech Scary Stories Star Wars Alert Microsoft Excel Telework Staff Dark Data CES Communitications Be Proactive Managed IT Gamification File Sharing Fun IP Address Social Networking How To Legislation Supply Chain Management Workforce Deep Learning Threats Fileless Malware Term Notifications FinTech Wearable Technology IT Assessment Workplace Strategies Education Content Travel Health IT Google Maps Motherboard Recovery Comparison Flexibility Meta Techology Value Amazon Mobile Computing Directions Assessment Hard Drives Permissions Organization Digital Security Cameras Smart Devices Unified Threat Management Search Domains Specifications Remote Working Outsource IT Unified Threat Management Memory Best Practice Environment Data Breach Media Microchip Google Play Buisness Internet Exlporer Refrigeration Fraud

Blog Archive