Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Adware Lawsuit Between Lenovo And FTC Settled

Adware Lawsuit Between Lenovo And FTC Settled

About two and a half years ago, Lenovo was brought under fire for manufacturing products that had adware preinstalled on them. This malware, a variant called Superfish, was installed on up to 750,000 Lenovo devices, and the company--eager to put this incident behind them--still refuses to admit fault, despite paying reparations and other fees as a result. Superfish allowed access to sensitive information and a root certificate, which could be used to access encrypted data on the same network. All in all, it was a rather embarrassing and dangerous scenario for Lenovo, and it comes with its fair share of consequences.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Productivity Passwords Quick Tips Backup Cybersecurity Saving Money Communication Managed Service Data Backup Smartphone Android Upgrade Business Management Smartphones VoIP AI Mobile Devices Data Recovery communications Disaster Recovery Windows Browser Social Media Managed IT Services Microsoft Office Current Events Tech Term Network Internet of Things Remote Facebook Automation Information Artificial Intelligence Miscellaneous Gadgets Cloud Computing Covid-19 Holiday Training Server Managed Service Provider Remote Work Outsourced IT Compliance Spam Encryption IT Support Employee/Employer Relationship Windows 10 Office Business Continuity Government Data Management Business Technology Bandwidth Virtualization Wi-Fi Blockchain Windows 10 Apps Data Security Mobile Office Vendor Two-factor Authentication Budget Tip of the week Managed Services Apple Voice over Internet Protocol Employer-Employee Relationship App Networking BYOD Mobile Device Management Gmail Chrome WiFi Conferencing How To Hacker BDR Computing Avoiding Downtime Information Technology Marketing HIPAA Applications Office 365 Access Control 2FA Help Desk Storage Big Data Password Bring Your Own Device Retail Healthcare Managed IT Services Computers Operating System Website Risk Management Router Virtual Private Network Office Tips Analytics Augmented Reality Health The Internet of Things Monitoring Excel Document Management Social Remote Workers Telephone Scam Data loss Customer Service Going Green Cooperation Free Resource Project Management Windows 7 Cybercrime Patch Management Save Money Microsoft 365 Remote Monitoring Vulnerability End of Support Vendor Management Solutions Physical Security Firewall Display Printer Paperless Office Windows 11 Infrastructure Data Storage Smart Technology Supply Chain Video Conferencing Sports Machine Learning Managed Services Provider Mouse Saving Time Virtual Machines Professional Services Administration Managed IT Service Maintenance Customer Relationship Management Antivirus Downloads iPhone Licensing Entertainment Hacking Vulnerabilities Settings Data Privacy Presentation Printing Wireless Images 101 Content Filtering Wireless Technology Telephone System YouTube Multi-Factor Authentication Robot Mobility Cost Management Cryptocurrency IT Management Word VPN Employees Virtual Desktop Meetings Integration Data storage LiFi User Tip Modem Computer Repair Mobile Security Outlook Processor Safety Money Holidays Humor Hacks Scary Stories Websites Mirgation Hypervisor Displays Shopping Nanotechnology Optimization Fun PowerPoint Electronic Medical Records Language Employer/Employee Relationships Outsourcing SharePoint Deep Learning Addiction Management PCI DSS Chatbots Navigation Lenovo Gig Economy Application Education Screen Reader Writing Distributed Denial of Service Workplace Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Service Level Agreement Internet Service Provider IBM Mobile Computing Server Management Regulations Compliance Private Cloud Identity Evernote Paperless Superfish Bookmark Identity Theft Smart Tech Memes Search Co-managed IT Twitter Alerts SQL Server Technology Care Best Practice Download Net Neutrality Financial Data Buisness Error History Business Communications Legal Browsers Smartwatch IT solutions Connectivity IT Social Engineering Break Fix Scams Remote Computing Azure Hybrid Work Competition Business Growth Upload Procurement Social Network Telework Cyber security Multi-Factor Security Tech Human Resources CES Tablet IoT Communitications Cortana Dark Web Cables Alert Alt Codes Trends Supply Chain Management Managed IT Customer Resource management FinTech User Downtime File Sharing Regulations Dark Data Google Calendar Term Google Apps Data Analysis Hosted Solution Star Wars IT Assessment How To Microsoft Excel IT Maintenance Gamification Flexibility Notifications Staff Value Business Intelligence Typing IP Address Organization Travel Social Networking Legislation Shortcuts Ransmoware Google Drive Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Knowledge Content Remote Working Wearable Technology Memory Vendors Health IT Recovery Unified Threat Management Motherboard Data Breach 5G Comparison Google Play Be Proactive Experience Permissions Workforce Google Docs Unified Threat Management Directions Videos Hard Drives Unified Communications Assessment Electronic Health Records Bitcoin Running Cable Wasting Time Threats Domains Google Wallet Trend Micro Network Congestion Specifications Security Cameras Workplace Strategies Fraud Meta User Error Microchip Refrigeration Internet Exlporer Software as a Service Windows 8 Username Laptop Managing Costs Amazon Public Speaking Lithium-ion battery Drones Point of Sale eCommerce Black Friday SSID Virtual Assistant Outsource IT Database Surveillance Entrepreneur Network Management Halloween Tech Support IT Technicians Virtual Machine Environment Media Proxy Server Reviews Cookies Monitors Cyber Monday Medical IT Hotspot Transportation Small Businesses Undo Tactics Development

Blog Archive