Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Adware Lawsuit Between Lenovo And FTC Settled

Adware Lawsuit Between Lenovo And FTC Settled

About two and a half years ago, Lenovo was brought under fire for manufacturing products that had adware preinstalled on them. This malware, a variant called Superfish, was installed on up to 750,000 Lenovo devices, and the company--eager to put this incident behind them--still refuses to admit fault, despite paying reparations and other fees as a result. Superfish allowed access to sensitive information and a root certificate, which could be used to access encrypted data on the same network. All in all, it was a rather embarrassing and dangerous scenario for Lenovo, and it comes with its fair share of consequences.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Backup Quick Tips Passwords Cybersecurity Saving Money Communication Productivity Smartphone Data Backup Managed Service Android Upgrade AI Business Management Smartphones VoIP communications Mobile Devices Data Recovery Windows Disaster Recovery Browser Social Media Microsoft Office Managed IT Services Current Events Network Remote Tech Term Internet of Things Information Facebook Automation Artificial Intelligence Cloud Computing Holiday Covid-19 Training Miscellaneous Gadgets Managed Service Provider Remote Work Server Outsourced IT Compliance IT Support Employee/Employer Relationship Spam Encryption Windows 10 Office Government Data Management Business Continuity Blockchain Wi-Fi Windows 10 Virtualization Business Technology Bandwidth Mobile Office Vendor Two-factor Authentication Apps Data Security Mobile Device Management BYOD Gmail Chrome Tip of the week Budget Employer-Employee Relationship Managed Services Voice over Internet Protocol Apple Networking App Marketing Computing HIPAA Information Technology Applications Office 365 Access Control WiFi Conferencing Hacker How To BDR Avoiding Downtime Website Operating System 2FA Risk Management Router Virtual Private Network Health Analytics Office Tips Big Data Augmented Reality Help Desk Storage Retail Password Bring Your Own Device Computers Managed IT Services Healthcare Free Resource Patch Management Save Money Project Management Windows 7 Remote Monitoring End of Support Cybercrime Vulnerability Vendor Management Windows 11 Microsoft 365 Firewall Physical Security Solutions Display Excel Printer The Internet of Things Paperless Office Infrastructure Monitoring Social Document Management Customer Service Scam Telephone Data loss Remote Workers Cooperation Going Green Robot Settings Printing Wireless Content Filtering Telephone System Images 101 Word Cost Management Mobility YouTube Multi-Factor Authentication IT Management Cryptocurrency VPN Meetings Supply Chain Computer Repair Employees Safety Virtual Desktop LiFi Integration User Tip Modem Data storage Mobile Security Processor Outlook Money Holidays Machine Learning Humor Smart Technology Data Storage Video Conferencing Saving Time Data Privacy Customer Relationship Management Sports Managed Services Provider Professional Services Maintenance Mouse Virtual Machines Antivirus Managed IT Service Hacking Downloads Administration Presentation Licensing iPhone Wireless Technology Entertainment Vulnerabilities Amazon Alt Codes Supply Chain Management Data Analysis Star Wars Travel Microsoft Excel Term Gamification Google Maps Staff FinTech Downtime Techology Recovery IT Assessment Hard Drives Social Networking Legislation Outsource IT Hosted Solution Environment Typing Flexibility Media Domains Value Fileless Malware Unified Threat Management Content Wearable Technology Organization Unified Threat Management Smart Devices Refrigeration Knowledge Health IT Motherboard Google Drive Comparison Digital Security Cameras Small Businesses Permissions Network Congestion Displays Remote Working Public Speaking Memory Directions Assessment Google Play Lithium-ion battery Data Breach User Error 5G Unified Communications Electronic Health Records Experience Entrepreneur Google Docs Specifications Videos Outsourcing Fraud Bitcoin Running Cable Wasting Time Microchip Internet Exlporer Point of Sale Security Cameras Username Google Wallet Workplace Trend Micro Software as a Service Undo Network Management Tech Support Black Friday Hiring/Firing Monitors Windows 8 Paperless Laptop Managing Costs Database SSID IT Technicians Drones Co-managed IT eCommerce Surveillance Virtual Assistant Proxy Server Cookies Websites Cyber Monday Technology Care Hotspot Business Communications Halloween Virtual Machine Tactics Application Medical IT Mirgation Electronic Medical Records Reviews Scams SharePoint Development Transportation Nanotechnology Hybrid Work Language Writing Hacks Human Resources IBM Scary Stories Hypervisor Lenovo Addiction Fun PowerPoint Management Chatbots Virtual Reality Shopping Cables Optimization Deep Learning Employer/Employee Relationships Server Management Screen Reader Private Cloud Distributed Denial of Service Computing Infrastructure PCI DSS Google Apps Superfish Navigation Service Level Agreement Identity Theft Identity Twitter Gig Economy IT Maintenance Education Internet Service Provider Competition Teamwork Bookmark Smart Tech Error Business Intelligence Alerts Social Engineering Mobile Computing Regulations Compliance Shortcuts Evernote Download Search Remote Computing Ransmoware Memes Vendors Best Practice Net Neutrality SQL Server Browsers Connectivity Break Fix Financial Data Be Proactive Buisness History User Upload Tablet Social Network Alert Legal Multi-Factor Security Smartwatch Workforce IT solutions IT Threats Business Growth Procurement Azure Managed IT IoT File Sharing Dark Web Dark Data How To Telework Workplace Strategies IP Address Cyber security Tech Trends Communitications Cortana Customer Resource management Regulations Notifications Google Calendar CES Meta

Blog Archive