Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Adware Lawsuit Between Lenovo And FTC Settled

Adware Lawsuit Between Lenovo And FTC Settled

About two and a half years ago, Lenovo was brought under fire for manufacturing products that had adware preinstalled on them. This malware, a variant called Superfish, was installed on up to 750,000 Lenovo devices, and the company--eager to put this incident behind them--still refuses to admit fault, despite paying reparations and other fees as a result. Superfish allowed access to sensitive information and a root certificate, which could be used to access encrypted data on the same network. All in all, it was a rather embarrassing and dangerous scenario for Lenovo, and it comes with its fair share of consequences.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Workplace Tips Computer Phishing Email IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Passwords Quick Tips Backup Productivity Cybersecurity Saving Money Communication Managed Service Data Backup Smartphone Android Upgrade Smartphones AI VoIP Business Management communications Data Recovery Mobile Devices Windows Disaster Recovery Social Media Browser Microsoft Office Managed IT Services Current Events Network Internet of Things Tech Term Remote Information Artificial Intelligence Automation Facebook Miscellaneous Gadgets Cloud Computing Holiday Training Covid-19 Server Managed Service Provider Remote Work Outsourced IT Compliance Spam IT Support Encryption Employee/Employer Relationship Office Windows 10 Government Business Continuity Data Management Wi-Fi Blockchain Bandwidth Windows 10 Business Technology Virtualization Apps Vendor Two-factor Authentication Data Security Mobile Office Employer-Employee Relationship Managed Services Voice over Internet Protocol Networking Chrome Budget BYOD Mobile Device Management Apple Gmail App Tip of the week Computing Information Technology HIPAA How To Applications BDR Hacker Office 365 Avoiding Downtime Marketing Conferencing Access Control WiFi Operating System Retail 2FA Risk Management Managed IT Services Router Healthcare Computers Office Tips Analytics Augmented Reality Website Help Desk Storage Password Virtual Private Network Bring Your Own Device Health Big Data Windows 11 Social Cybercrime Scam Excel Data loss Remote Workers Customer Service Patch Management Save Money Free Resource Remote Monitoring End of Support Project Management Vulnerability Windows 7 Vendor Management Monitoring Microsoft 365 Physical Security Display Solutions Firewall Printer Paperless Office Infrastructure Telephone The Internet of Things Going Green Document Management Cooperation Content Filtering Data Storage Telephone System Video Conferencing Maintenance YouTube Supply Chain Cost Management Managed Services Provider Antivirus Cryptocurrency Professional Services Virtual Machines Customer Relationship Management Virtual Desktop Data storage Hacking LiFi iPhone Presentation User Tip Modem Robot Processor Outlook Mobile Security Vulnerabilities Wireless Technology Money Humor Images 101 Data Privacy IT Management Smart Technology Multi-Factor Authentication VPN Mobility Meetings Word Sports Saving Time Mouse Computer Repair Managed IT Service Administration Employees Integration Downloads Safety Licensing Entertainment Machine Learning Settings Holidays Printing Wireless Data Analysis Star Wars Hypervisor Server Management Application Microsoft Excel Hosted Solution Private Cloud Typing PowerPoint Identity Theft Shopping Small Businesses Gamification Optimization Superfish Staff IBM Social Networking Employer/Employee Relationships Legislation Twitter Displays Knowledge Fileless Malware PCI DSS Google Drive Navigation Error Wearable Technology Social Engineering Gig Economy Outsourcing Content Health IT Internet Service Provider Motherboard Teamwork Comparison Remote Computing 5G Experience Directions Regulations Compliance Workplace Assessment Google Docs Permissions Unified Communications Evernote Bitcoin Tablet Running Cable Hiring/Firing Memes Competition Net Neutrality Paperless Google Wallet SQL Server Specifications Alert Dark Data Microchip Financial Data Co-managed IT Internet Exlporer History Managed IT Fraud File Sharing Windows 8 Laptop How To Smartwatch Technology Care Username IT Procurement Business Communications Drones Azure User Black Friday Notifications Telework Scams Database Cyber security Tech Travel IT Technicians Google Maps Halloween CES Hybrid Work Communitications Techology Proxy Server Supply Chain Management IP Address Human Resources Cookies Cyber Monday FinTech Cables Tactics Hotspot Term Unified Threat Management Mirgation Hacks Scary Stories IT Assessment Unified Threat Management Flexibility Google Apps Nanotechnology Value Recovery Fun Network Congestion Organization IT Maintenance Addiction Hard Drives Language Deep Learning Chatbots Digital Security Cameras Business Intelligence Management Smart Devices User Error Domains Remote Working Shortcuts Screen Reader Memory Distributed Denial of Service Education Ransmoware Service Level Agreement Data Breach Refrigeration Computing Infrastructure Google Play Point of Sale Identity Mobile Computing Videos Vendors Electronic Health Records Public Speaking Bookmark Lithium-ion battery Be Proactive Smart Tech Wasting Time Network Management Tech Support Search Monitors Workforce Download Trend Micro Alerts Best Practice Security Cameras Entrepreneur Software as a Service Buisness Threats Browsers Workplace Strategies Connectivity Legal Managing Costs Break Fix IT solutions Websites SSID Meta Upload eCommerce Undo Business Growth Surveillance SharePoint Virtual Assistant Multi-Factor Security Electronic Medical Records Amazon Social Network IoT Virtual Machine Dark Web Cortana Alt Codes Medical IT Writing Reviews Outsource IT Trends Lenovo Development Media Regulations Transportation Google Calendar Downtime Virtual Reality Environment Customer Resource management

Blog Archive