Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Adware Lawsuit Between Lenovo And FTC Settled

Adware Lawsuit Between Lenovo And FTC Settled

About two and a half years ago, Lenovo was brought under fire for manufacturing products that had adware preinstalled on them. This malware, a variant called Superfish, was installed on up to 750,000 Lenovo devices, and the company--eager to put this incident behind them--still refuses to admit fault, despite paying reparations and other fees as a result. Superfish allowed access to sensitive information and a root certificate, which could be used to access encrypted data on the same network. All in all, it was a rather embarrassing and dangerous scenario for Lenovo, and it comes with its fair share of consequences.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Workplace Tips Computer Phishing Email IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Quick Tips Passwords Backup Productivity Cybersecurity Saving Money Communication Managed Service Data Backup Smartphone Android Upgrade Business Management Smartphones AI VoIP Data Recovery communications Mobile Devices Windows Disaster Recovery Social Media Browser Microsoft Office Managed IT Services Network Current Events Remote Tech Term Internet of Things Artificial Intelligence Automation Facebook Information Miscellaneous Gadgets Covid-19 Cloud Computing Holiday Training Remote Work Server Managed Service Provider Compliance Outsourced IT Encryption Spam Employee/Employer Relationship IT Support Office Windows 10 Government Business Continuity Data Management Virtualization Wi-Fi Bandwidth Business Technology Windows 10 Blockchain Vendor Data Security Apps Two-factor Authentication Mobile Office Networking Employer-Employee Relationship BYOD Chrome Budget Mobile Device Management Managed Services Voice over Internet Protocol Tip of the week Gmail Apple App How To Applications BDR Computing Information Technology Hacker Conferencing Office 365 Avoiding Downtime Marketing Access Control HIPAA WiFi Router Managed IT Services Big Data Operating System Risk Management Help Desk Computers Virtual Private Network Analytics Office Tips Website Augmented Reality Health 2FA Storage Password Bring Your Own Device Healthcare Retail Going Green Windows 7 Social Microsoft 365 Cybercrime Solutions Patch Management Save Money Remote Monitoring Monitoring End of Support Vulnerability Vendor Management Customer Service Physical Security Display Printer Telephone Windows 11 Paperless Office Infrastructure Cooperation Excel Remote Workers Firewall Document Management The Internet of Things Free Resource Scam Data loss Project Management Images 101 Settings Mobility Data Privacy Multi-Factor Authentication Printing Wireless User Tip Modem Mobile Security Content Filtering Processor YouTube Robot Customer Relationship Management Employees Cryptocurrency Smart Technology Integration Hacking IT Management Presentation Virtual Desktop VPN Saving Time Meetings Data storage LiFi Holidays Managed IT Service Wireless Technology Computer Repair Outlook Data Storage Downloads Money Video Conferencing Humor Licensing Managed Services Provider Professional Services Virtual Machines Supply Chain Word Entertainment Sports Machine Learning Mouse iPhone Telephone System Cost Management Administration Maintenance Safety Vulnerabilities Antivirus IT Assessment Specifications Human Resources Internet Exlporer Flexibility Fraud Cables Value Cortana Microchip Tablet Username Alert Organization Alt Codes Application Smart Devices Black Friday Google Apps Downtime Managed IT File Sharing Digital Security Cameras Dark Data Database How To Remote Working IT Maintenance IBM Hosted Solution Memory Google Play Notifications IT Technicians Business Intelligence Typing Data Breach Electronic Health Records Cyber Monday Shortcuts Proxy Server Travel Videos Cookies Google Maps Tactics Google Drive Hotspot Ransmoware Wasting Time Techology Knowledge Security Cameras Mirgation Vendors Trend Micro Software as a Service Be Proactive Competition 5G Unified Threat Management Nanotechnology Addiction Google Docs Language Workforce Unified Communications Managing Costs Unified Threat Management Experience Running Cable SSID Management Chatbots Threats Bitcoin eCommerce Network Congestion Google Wallet Surveillance Distributed Denial of Service Workplace Strategies Virtual Assistant Screen Reader Service Level Agreement Computing Infrastructure Meta Virtual Machine User Error User Laptop Medical IT Reviews Identity Amazon Windows 8 Drones Development Transportation Bookmark Point of Sale Smart Tech Download Alerts Outsource IT IP Address Hypervisor Media Halloween PowerPoint Network Management Tech Support Shopping Environment Optimization Connectivity Monitors Break Fix Employer/Employee Relationships Browsers Upload PCI DSS Small Businesses Recovery Navigation Multi-Factor Security Hard Drives Scary Stories Social Network Websites Gig Economy Displays Hacks IoT Internet Service Provider Dark Web Domains Teamwork Fun Trends Electronic Medical Records Regulations Compliance Outsourcing Deep Learning SharePoint Evernote Google Calendar Refrigeration Customer Resource management Regulations Memes Star Wars Writing Net Neutrality Microsoft Excel Workplace Public Speaking Education SQL Server Lenovo Data Analysis Gamification Virtual Reality Financial Data Staff Hiring/Firing Lithium-ion battery History Legislation Paperless Server Management Entrepreneur Private Cloud Smartwatch Social Networking Mobile Computing IT Procurement Co-managed IT Azure Superfish Search Fileless Malware Identity Theft Content Twitter Telework Wearable Technology Technology Care Best Practice Cyber security Tech Comparison Business Communications Undo Buisness Health IT Error CES Motherboard Communitications Assessment Social Engineering Legal Supply Chain Management Permissions Scams IT solutions Directions Remote Computing FinTech Hybrid Work Business Growth Term

Blog Archive