Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Adware Lawsuit Between Lenovo And FTC Settled

Adware Lawsuit Between Lenovo And FTC Settled

About two and a half years ago, Lenovo was brought under fire for manufacturing products that had adware preinstalled on them. This malware, a variant called Superfish, was installed on up to 750,000 Lenovo devices, and the company--eager to put this incident behind them--still refuses to admit fault, despite paying reparations and other fees as a result. Superfish allowed access to sensitive information and a root certificate, which could be used to access encrypted data on the same network. All in all, it was a rather embarrassing and dangerous scenario for Lenovo, and it comes with its fair share of consequences.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet IT Services Malware IT Support Privacy Workplace Tips Phishing Google Email Computer Workplace Strategy Collaboration Hosted Solutions Small Business Backup Users Managed Service Ransomware Mobile Device Productivity Microsoft Passwords Saving Money Quick Tips AI Communication Cybersecurity Smartphone Data Backup Disaster Recovery Data Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Current Events Network Tech Term Remote Internet of Things Information Holiday Facebook Miscellaneous Automation Artificial Intelligence Cloud Computing Compliance Training Gadgets Covid-19 Remote Work Outsourced IT Server Managed Service Provider IT Support Employee/Employer Relationship Encryption Spam Office Windows 10 Business Continuity Government Data Management Bandwidth Windows 10 Wi-Fi Virtualization Business Technology Blockchain Vendor Data Security Mobile Office Managed Services Two-factor Authentication Apps Budget Apple Networking App Mobile Device Management Voice over Internet Protocol BYOD Gmail WiFi Tip of the week Employer-Employee Relationship Chrome Applications Password Hacker Managed IT Services Avoiding Downtime How To BDR Marketing Conferencing Computing Physical Security Information Technology Access Control Office 365 HIPAA Router Retail Storage Computers Bring Your Own Device 2FA Help Desk Website Operating System Healthcare Virtual Private Network Risk Management Big Data Health Analytics Office Tips Augmented Reality Customer Service Scam Data loss Windows 11 Monitoring Excel Going Green Patch Management Save Money Remote Monitoring Vulnerability Managed IT Service End of Support Remote Workers Firewall Vendor Management Cybercrime Telephone Display Printer Cooperation Free Resource The Internet of Things Project Management Windows 7 Paperless Office Infrastructure Social Microsoft 365 Solutions Document Management Employees Integration Maintenance Sports User Tip Hacking Modem Antivirus Mouse Mobile Security Processor Presentation Holidays Administration Wireless Technology Data Storage Smart Technology Supply Chain Video Conferencing Managed Services Provider Professional Services Robot Saving Time Virtual Machines Word Settings Printing Wireless Content Filtering IT Management Downloads VPN iPhone YouTube Meetings Licensing Safety Cryptocurrency Vulnerabilities Entertainment Data Privacy Computer Repair Virtual Desktop Images 101 Data storage LiFi Telephone System Multi-Factor Authentication Mobility Cost Management Outlook Machine Learning Money Customer Relationship Management Humor Specifications Security Cameras Workplace Strategies Scary Stories Private Cloud Trend Micro Hacks Server Management Internet Exlporer Software as a Service Superfish Fraud Meta Identity Theft Fun Microchip Competition Username Managing Costs Amazon Deep Learning Twitter Black Friday SSID Error eCommerce Database Surveillance Virtual Assistant Outsource IT Education Social Engineering User IT Technicians Virtual Machine Environment Media Remote Computing Cyber Monday Medical IT Proxy Server Reviews Cookies Mobile Computing Tactics Development Hotspot Transportation Small Businesses Tablet Search IP Address Mirgation Hypervisor Displays Best Practice Alert PowerPoint Buisness File Sharing Dark Data Shopping Nanotechnology Optimization Managed IT Addiction Legal Language Employer/Employee Relationships Outsourcing IT solutions How To Management PCI DSS Recovery Chatbots Business Growth Navigation Notifications Distributed Denial of Service Workplace Travel Gig Economy Hard Drives Screen Reader Service Level Agreement Internet Service Provider Techology Computing Infrastructure Teamwork Hiring/Firing Google Maps Cortana Domains Regulations Compliance Identity Alt Codes Evernote Paperless Co-managed IT Downtime Unified Threat Management Bookmark Refrigeration Smart Tech Memes Download Net Neutrality Unified Threat Management Alerts SQL Server Technology Care Hosted Solution Public Speaking Lithium-ion battery Financial Data History Typing Business Communications Break Fix Scams Network Congestion Browsers Smartwatch Connectivity IT Entrepreneur Upload Procurement Google Drive User Error Azure Hybrid Work Knowledge Social Network Telework Cyber security Multi-Factor Security Tech Human Resources Dark Web Cables Point of Sale 5G CES Undo IoT Communitications Trends Supply Chain Management Google Docs Unified Communications Experience Running Cable Tech Support Customer Resource management FinTech Regulations Bitcoin Network Management Google Calendar Term Google Apps Google Wallet Microsoft Excel IT Maintenance Monitors Data Analysis Star Wars IT Assessment Gamification Flexibility Staff Value Business Intelligence Laptop Websites Organization Application Social Networking Windows 8 Legislation Shortcuts Drones Ransmoware Fileless Malware Digital Security Cameras Smart Devices IBM Content Remote Working SharePoint Wearable Technology Memory Vendors Electronic Medical Records Halloween Health IT Motherboard Data Breach Comparison Google Play Be Proactive Assessment Electronic Health Records Lenovo Permissions Workforce Writing Directions Videos Wasting Time Threats Virtual Reality

Blog Archive