Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Adware Lawsuit Between Lenovo And FTC Settled

Adware Lawsuit Between Lenovo And FTC Settled

About two and a half years ago, Lenovo was brought under fire for manufacturing products that had adware preinstalled on them. This malware, a variant called Superfish, was installed on up to 750,000 Lenovo devices, and the company--eager to put this incident behind them--still refuses to admit fault, despite paying reparations and other fees as a result. Superfish allowed access to sensitive information and a root certificate, which could be used to access encrypted data on the same network. All in all, it was a rather embarrassing and dangerous scenario for Lenovo, and it comes with its fair share of consequences.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Email Workplace Tips Phishing Privacy Google Computer Workplace Strategy Collaboration Small Business Hosted Solutions Backup Users Ransomware Managed Service Mobile Device Productivity Microsoft Saving Money AI Quick Tips Passwords Communication Cybersecurity Smartphone Data Backup Data Recovery Disaster Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Internet of Things Remote Information Facebook Artificial Intelligence Miscellaneous Holiday Automation Gadgets Cloud Computing Compliance Covid-19 Training Outsourced IT Remote Work Server Managed Service Provider IT Support Spam Encryption Employee/Employer Relationship Office Windows 10 Data Management Business Continuity Government Windows 10 Virtualization Bandwidth Blockchain Business Technology Wi-Fi Two-factor Authentication Managed Services Data Security Apps Mobile Office Vendor Gmail Voice over Internet Protocol Networking Chrome WiFi Budget Employer-Employee Relationship BYOD Apple App Tip of the week Mobile Device Management Office 365 Managed IT Services How To BDR Conferencing Password Physical Security Hacker Access Control Avoiding Downtime Computing HIPAA Marketing Information Technology Applications Analytics Office Tips Healthcare Help Desk Augmented Reality Big Data Storage Bring Your Own Device Virtual Private Network Computers Health Operating System 2FA Website Router Risk Management Retail Firewall Scam Remote Workers Data loss Monitoring The Internet of Things Patch Management Free Resource Social Save Money Managed IT Service Project Management Remote Monitoring Windows 7 Telephone Vulnerability End of Support Vendor Management Microsoft 365 Customer Service Cooperation Solutions Display Going Green Printer Paperless Office Infrastructure Windows 11 Cybercrime Document Management Excel Mobile Security Virtual Machines Professional Services Processor Virtual Desktop Maintenance LiFi Antivirus Data storage Safety Outlook Smart Technology iPhone Money Humor Saving Time Data Privacy Vulnerabilities Robot Sports Mouse Images 101 Downloads Mobility Multi-Factor Authentication Administration IT Management Customer Relationship Management Licensing VPN Meetings Entertainment Hacking Computer Repair Employees Presentation Integration Telephone System Settings Wireless Printing Cost Management Wireless Technology Content Filtering Holidays YouTube Supply Chain Machine Learning Cryptocurrency Data Storage Word Video Conferencing User Tip Modem Managed Services Provider Public Speaking Paperless Twitter Google Wallet Database Gig Economy Lithium-ion battery IT Technicians Internet Service Provider Co-managed IT Error Teamwork Entrepreneur Evernote Proxy Server Windows 8 Cookies Regulations Compliance Technology Care Laptop Cyber Monday Social Engineering Hotspot Memes Business Communications Remote Computing Drones Tactics Mirgation Net Neutrality Scams SQL Server Nanotechnology Financial Data Hybrid Work Halloween Tablet Undo History Language IT Human Resources Alert Addiction Smartwatch Management Managed IT Chatbots Procurement Cables File Sharing Azure Dark Data How To Tech Hacks Screen Reader Telework Scary Stories Distributed Denial of Service Cyber security Computing Infrastructure Communitications Google Apps Fun Notifications Service Level Agreement CES Deep Learning Identity Supply Chain Management IT Maintenance Travel Application Term Bookmark Techology Smart Tech FinTech Business Intelligence Google Maps Education IBM Alerts IT Assessment Shortcuts Download Flexibility Ransmoware Unified Threat Management Value Browsers Mobile Computing Unified Threat Management Connectivity Organization Vendors Break Fix Smart Devices Be Proactive Search Upload Digital Security Cameras Social Network Best Practice Remote Working Workforce Multi-Factor Security Memory Network Congestion Google Play User Error IoT Threats Buisness Competition Dark Web Data Breach Videos IT solutions Electronic Health Records Workplace Strategies Legal Trends Customer Resource management Business Growth Regulations Meta Point of Sale Google Calendar Wasting Time Trend Micro Security Cameras Data Analysis Star Wars Amazon Microsoft Excel Gamification Network Management Staff Software as a Service Cortana Tech Support User Alt Codes Social Networking Outsource IT Legislation Managing Costs Monitors eCommerce Media SSID Fileless Malware Environment Downtime Content Hosted Solution IP Address Wearable Technology Surveillance Websites Virtual Assistant Health IT Typing Motherboard Small Businesses Comparison Virtual Machine Permissions Electronic Medical Records Medical IT Directions SharePoint Assessment Reviews Displays Development Knowledge Recovery Transportation Google Drive Lenovo Outsourcing Hard Drives Specifications Hypervisor Writing Fraud Optimization 5G Virtual Reality PowerPoint Microchip Internet Exlporer Shopping Domains Username Unified Communications Server Management Workplace Experience Private Cloud Employer/Employee Relationships Google Docs Navigation Bitcoin Superfish PCI DSS Hiring/Firing Running Cable Identity Theft Refrigeration Black Friday

Blog Archive