Error
  • Error loading component: com_advancedmodules, 1

Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Adware Lawsuit Between Lenovo And FTC Settled

Adware Lawsuit Between Lenovo And FTC Settled

About two and a half years ago, Lenovo was brought under fire for manufacturing products that had adware preinstalled on them. This malware, a variant called Superfish, was installed on up to 750,000 Lenovo devices, and the company--eager to put this incident behind them--still refuses to admit fault, despite paying reparations and other fees as a result. Superfish allowed access to sensitive information and a root certificate, which could be used to access encrypted data on the same network. All in all, it was a rather embarrassing and dangerous scenario for Lenovo, and it comes with its fair share of consequences.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Quick Tips Backup Passwords Saving Money Communication Productivity Cybersecurity Data Backup Managed Service Smartphone Android Upgrade AI Business Management VoIP Smartphones Data Recovery Mobile Devices communications Windows Disaster Recovery Browser Social Media Microsoft Office Managed IT Services Current Events Network Remote Internet of Things Tech Term Information Automation Artificial Intelligence Facebook Holiday Training Covid-19 Miscellaneous Gadgets Cloud Computing Managed Service Provider Remote Work Server Outsourced IT Compliance IT Support Employee/Employer Relationship Spam Encryption Windows 10 Office Data Management Business Continuity Government Windows 10 Business Technology Bandwidth Virtualization Wi-Fi Blockchain Mobile Office Vendor Two-factor Authentication Apps Data Security Mobile Device Management Chrome Gmail Tip of the week Budget Apple Networking Employer-Employee Relationship App Managed Services Voice over Internet Protocol BYOD HIPAA Marketing Applications Access Control Office 365 WiFi Conferencing How To BDR Hacker Computing Avoiding Downtime Information Technology Website Virtual Private Network Router Health Office Tips Analytics Augmented Reality Help Desk Storage Password Retail Bring Your Own Device Big Data Managed IT Services Computers Operating System 2FA Healthcare Risk Management Display Printer Free Resource Project Management Paperless Office Windows 7 Infrastructure Firewall Microsoft 365 Document Management Solutions Monitoring The Internet of Things Scam Social Data loss Telephone Going Green Customer Service Cooperation Patch Management Save Money Windows 11 Remote Monitoring End of Support Cybercrime Vulnerability Remote Workers Vendor Management Excel Physical Security Vulnerabilities Computer Repair Virtual Desktop Word Data storage LiFi Images 101 User Tip Modem Mobility Mobile Security Outlook Multi-Factor Authentication Processor Money Humor Machine Learning Safety Data Privacy Smart Technology Employees Integration Sports Maintenance Mouse Saving Time Antivirus Managed IT Service Administration Holidays Downloads Data Storage Customer Relationship Management Licensing Video Conferencing Managed Services Provider Entertainment Robot Professional Services Settings Virtual Machines Printing Hacking Wireless Content Filtering Presentation Telephone System YouTube Cost Management Wireless Technology Supply Chain IT Management Cryptocurrency iPhone VPN Meetings Assessment Experience Permissions Workplace Telework Google Docs Cyber security Directions Unified Communications Tech Bitcoin Running Cable Recovery Hiring/Firing CES Point of Sale Communitications Specifications Paperless Supply Chain Management Google Wallet Hard Drives Internet Exlporer Domains Fraud Co-managed IT Network Management FinTech Tech Support Microchip Term IT Assessment Windows 8 Monitors Username Laptop Technology Care Black Friday Business Communications Flexibility Drones Value Refrigeration Database Public Speaking Scams Organization Websites Smart Devices Lithium-ion battery Halloween IT Technicians Hybrid Work Digital Security Cameras SharePoint Cyber Monday Entrepreneur Human Resources Remote Working Electronic Medical Records Memory Proxy Server Cookies Google Play Tactics Hotspot Cables Data Breach Electronic Health Records Hacks Writing Scary Stories Mirgation Lenovo Videos Google Apps Virtual Reality Wasting Time Nanotechnology Undo Fun Security Cameras Addiction Language IT Maintenance Server Management Private Cloud Trend Micro Deep Learning Identity Theft Software as a Service Management Chatbots Business Intelligence Superfish Distributed Denial of Service Shortcuts Twitter Managing Costs Education Screen Reader SSID Service Level Agreement Computing Infrastructure Ransmoware Error eCommerce Surveillance Mobile Computing Social Engineering Virtual Assistant Identity Application Vendors Search Be Proactive Remote Computing Virtual Machine Bookmark Smart Tech Best Practice Medical IT Download IBM Alerts Workforce Reviews Tablet Development Transportation Buisness Threats Break Fix Workplace Strategies Legal Alert Hypervisor Browsers IT solutions Connectivity Business Growth Dark Data PowerPoint Upload Meta Managed IT Shopping File Sharing Optimization How To Employer/Employee Relationships Social Network Amazon Multi-Factor Security Cortana Dark Web PCI DSS Notifications Navigation IoT Competition Alt Codes Trends Outsource IT Gig Economy Travel Google Maps Internet Service Provider Teamwork Customer Resource management Downtime Regulations Environment Techology Google Calendar Media Microsoft Excel Regulations Compliance Data Analysis Hosted Solution Evernote Star Wars Typing Gamification Staff User Small Businesses Unified Threat Management Memes Net Neutrality SQL Server Social Networking Displays Unified Threat Management Legislation Knowledge Financial Data Google Drive History Fileless Malware Network Congestion Content IP Address Wearable Technology Outsourcing Smartwatch IT Comparison Procurement Azure Health IT Motherboard 5G User Error

Blog Archive