Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Adware Lawsuit Between Lenovo And FTC Settled

Adware Lawsuit Between Lenovo And FTC Settled

About two and a half years ago, Lenovo was brought under fire for manufacturing products that had adware preinstalled on them. This malware, a variant called Superfish, was installed on up to 750,000 Lenovo devices, and the company--eager to put this incident behind them--still refuses to admit fault, despite paying reparations and other fees as a result. Superfish allowed access to sensitive information and a root certificate, which could be used to access encrypted data on the same network. All in all, it was a rather embarrassing and dangerous scenario for Lenovo, and it comes with its fair share of consequences.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support Privacy IT Services Email Workplace Tips Computer Google Phishing Collaboration Hosted Solutions Workplace Strategy Users Small Business Ransomware Mobile Device Backup Productivity Microsoft Managed Service Quick Tips Communication Passwords Saving Money Cybersecurity Smartphone Data Backup Data Recovery AI Android Disaster Recovery Upgrade VoIP Business Management Smartphones communications Mobile Devices Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Facebook Information Miscellaneous Artificial Intelligence Holiday Automation Gadgets Cloud Computing Training Covid-19 Server Compliance Managed Service Provider Remote Work Outsourced IT IT Support Spam Encryption Employee/Employer Relationship Office Windows 10 Government Business Continuity Data Management Virtualization Wi-Fi Bandwidth Business Technology Windows 10 Blockchain Vendor Two-factor Authentication Data Security Apps Mobile Office WiFi Networking Managed Services Voice over Internet Protocol Employer-Employee Relationship Chrome BYOD Budget Apple Mobile Device Management Tip of the week App Gmail HIPAA Computing Applications Information Technology How To BDR Office 365 Hacker Conferencing Avoiding Downtime Marketing Access Control Retail Operating System Router Big Data Risk Management Managed IT Services Healthcare Help Desk Analytics Office Tips Computers Augmented Reality Storage Virtual Private Network Password Website Bring Your Own Device Health 2FA The Internet of Things Cybercrime Scam Data loss Social Remote Workers Monitoring Patch Management Save Money Customer Service Remote Monitoring Vulnerability End of Support Vendor Management Free Resource Project Management Windows 7 Physical Security Microsoft 365 Telephone Display Printer Solutions Windows 11 Paperless Office Infrastructure Cooperation Firewall Excel Going Green Document Management Safety Settings Holidays Printing Wireless Content Filtering Data Storage Maintenance Antivirus Video Conferencing YouTube Managed Services Provider Professional Services Cryptocurrency Virtual Machines User Tip Modem Mobile Security Data Privacy Processor Virtual Desktop Customer Relationship Management LiFi Data storage iPhone Robot Smart Technology Outlook Vulnerabilities Hacking Saving Time Money Presentation IT Management Humor VPN Meetings Images 101 Managed IT Service Wireless Technology Multi-Factor Authentication Mobility Sports Downloads Computer Repair Mouse Licensing Word Entertainment Administration Employees Integration Supply Chain Machine Learning Telephone System Cost Management Paperless Content Server Management Alt Codes Wearable Technology Private Cloud Reviews Medical IT Transportation Co-managed IT Health IT Superfish Motherboard Undo Identity Theft Downtime Comparison Development Permissions Twitter Hypervisor Technology Care Directions Assessment Hosted Solution Business Communications Typing Error Shopping Optimization PowerPoint Employer/Employee Relationships Scams Specifications Social Engineering Fraud Remote Computing Knowledge PCI DSS Hybrid Work Microchip Navigation Google Drive Internet Exlporer Human Resources Username Application Gig Economy 5G Internet Service Provider Teamwork Cables Tablet Black Friday Unified Communications Alert Experience Regulations Compliance Evernote Google Docs Database IBM Google Apps Managed IT Bitcoin IT Technicians File Sharing Running Cable Dark Data Memes Net Neutrality SQL Server IT Maintenance Proxy Server Google Wallet Cookies Cyber Monday How To Tactics Hotspot Notifications Financial Data History Business Intelligence Shortcuts Windows 8 Mirgation Travel Laptop Smartwatch IT Procurement Azure Ransmoware Techology Drones Nanotechnology Competition Google Maps Addiction Language Telework Cyber security Vendors Tech Be Proactive Management Chatbots Unified Threat Management Halloween CES Communitications Distributed Denial of Service Supply Chain Management Workforce Unified Threat Management Screen Reader Service Level Agreement Computing Infrastructure User FinTech Threats Term Workplace Strategies Hacks Identity Scary Stories Network Congestion IT Assessment Fun Flexibility Value Meta Bookmark User Error Smart Tech Download IP Address Deep Learning Alerts Organization Amazon Point of Sale Digital Security Cameras Smart Devices Break Fix Remote Working Memory Outsource IT Browsers Connectivity Education Media Upload Network Management Recovery Tech Support Data Breach Environment Google Play Social Network Mobile Computing Hard Drives Videos Multi-Factor Security Monitors Electronic Health Records Dark Web Search Wasting Time Small Businesses IoT Domains Trends Best Practice Websites Trend Micro Displays Security Cameras Customer Resource management Regulations Refrigeration Buisness Google Calendar Software as a Service Microsoft Excel Electronic Medical Records Managing Costs Outsourcing Data Analysis SharePoint Legal Star Wars Public Speaking IT solutions Gamification Lithium-ion battery Business Growth Staff eCommerce SSID Virtual Assistant Workplace Lenovo Social Networking Legislation Entrepreneur Writing Surveillance Virtual Reality Cortana Virtual Machine Hiring/Firing Fileless Malware

Blog Archive