Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Adware Lawsuit Between Lenovo And FTC Settled

Adware Lawsuit Between Lenovo And FTC Settled

About two and a half years ago, Lenovo was brought under fire for manufacturing products that had adware preinstalled on them. This malware, a variant called Superfish, was installed on up to 750,000 Lenovo devices, and the company--eager to put this incident behind them--still refuses to admit fault, despite paying reparations and other fees as a result. Superfish allowed access to sensitive information and a root certificate, which could be used to access encrypted data on the same network. All in all, it was a rather embarrassing and dangerous scenario for Lenovo, and it comes with its fair share of consequences.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy IT Services Google Email Workplace Tips Computer Phishing Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Backup Small Business Microsoft Productivity Quick Tips Managed Service Saving Money Passwords Communication Cybersecurity Data Backup Smartphone Android Upgrade Disaster Recovery Data Recovery AI Business Management VoIP Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Automation Artificial Intelligence Facebook Miscellaneous Information Holiday Gadgets Cloud Computing Covid-19 Training Compliance Server Remote Work Managed Service Provider IT Support Outsourced IT Encryption Spam Employee/Employer Relationship Windows 10 Office Data Management Business Continuity Government Windows 10 Business Technology Bandwidth Virtualization Blockchain Wi-Fi Apps Data Security Vendor Two-factor Authentication Mobile Office Mobile Device Management Chrome Gmail Tip of the week Budget Managed Services WiFi Voice over Internet Protocol Apple App Networking Employer-Employee Relationship BYOD Access Control Conferencing How To BDR Computing Hacker Information Technology HIPAA Avoiding Downtime Applications Marketing Office 365 Office Tips Analytics Health Augmented Reality Help Desk Storage Password Bring Your Own Device Retail Healthcare Big Data Managed IT Services Operating System Computers 2FA Risk Management Router Website Virtual Private Network Paperless Office Infrastructure Firewall Monitoring Document Management The Internet of Things Remote Workers Telephone Scam Social Data loss Going Green Cooperation Free Resource Project Management Windows 7 Customer Service Patch Management Save Money Cybercrime Microsoft 365 Remote Monitoring Windows 11 Vulnerability End of Support Vendor Management Solutions Physical Security Excel Display Printer Holidays Outlook Money Data Storage Smart Technology Humor Video Conferencing Machine Learning Managed Services Provider Safety Virtual Machines Professional Services Data Privacy Saving Time Sports Mouse Managed IT Service Maintenance Downloads Antivirus Administration iPhone Licensing Vulnerabilities Entertainment Customer Relationship Management Images 101 Settings Printing Wireless Multi-Factor Authentication Content Filtering Mobility Telephone System Robot Cost Management Hacking YouTube Presentation Cryptocurrency IT Management Supply Chain Wireless Technology VPN Meetings Employees Integration Virtual Desktop Data storage User Tip LiFi Modem Computer Repair Mobile Security Processor Word Cyber Monday Medical IT Technology Care Proxy Server Reviews Monitors Cookies Business Communications Tactics Development Halloween Hotspot Refrigeration Transportation Websites Scams Mirgation Public Speaking Hypervisor Nanotechnology Lithium-ion battery Optimization PowerPoint Hybrid Work Shopping Hacks Electronic Medical Records Human Resources Addiction Scary Stories Language Employer/Employee Relationships SharePoint Entrepreneur Navigation Cables Management PCI DSS Chatbots Fun Writing Screen Reader Distributed Denial of Service Lenovo Gig Economy Deep Learning Virtual Reality Google Apps Service Level Agreement Internet Service Provider Computing Infrastructure Undo Teamwork Evernote Server Management Private Cloud IT Maintenance Regulations Compliance Education Identity Smart Tech Memes Superfish Identity Theft Business Intelligence Bookmark Mobile Computing Twitter Shortcuts Download Net Neutrality Alerts SQL Server Search Error Ransmoware Financial Data History Best Practice Social Engineering Connectivity IT Break Fix Application Vendors Browsers Smartwatch Remote Computing Be Proactive Upload Procurement Buisness Azure Multi-Factor Security Tech Legal Workforce Social Network Telework IT solutions IBM Cyber security CES Business Growth IoT Communitications Dark Web Tablet Threats Alert Workplace Strategies Trends Supply Chain Management Cortana Google Calendar Term Managed IT File Sharing Meta Customer Resource management FinTech Dark Data Regulations Alt Codes How To Star Wars IT Assessment Microsoft Excel Amazon Data Analysis Notifications Gamification Flexibility Downtime Staff Competition Value Legislation Travel Outsource IT Organization Hosted Solution Social Networking Digital Security Cameras Typing Media Smart Devices Techology Google Maps Environment Fileless Malware Content Remote Working Wearable Technology Memory Data Breach Knowledge Comparison User Google Play Google Drive Unified Threat Management Small Businesses Health IT Motherboard Videos Assessment Electronic Health Records Permissions Unified Threat Management Displays Directions Wasting Time 5G IP Address Trend Micro Experience Specifications Security Cameras Google Docs Outsourcing Unified Communications Network Congestion Bitcoin Internet Exlporer Software as a Service Running Cable Fraud User Error Microchip Google Wallet Workplace Username Managing Costs eCommerce Black Friday Recovery SSID Point of Sale Hiring/Firing Windows 8 Paperless Database Surveillance Laptop Hard Drives Virtual Assistant Network Management Drones Tech Support Co-managed IT IT Technicians Domains Virtual Machine

Blog Archive