Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Adware Lawsuit Between Lenovo And FTC Settled

Adware Lawsuit Between Lenovo And FTC Settled

About two and a half years ago, Lenovo was brought under fire for manufacturing products that had adware preinstalled on them. This malware, a variant called Superfish, was installed on up to 750,000 Lenovo devices, and the company--eager to put this incident behind them--still refuses to admit fault, despite paying reparations and other fees as a result. Superfish allowed access to sensitive information and a root certificate, which could be used to access encrypted data on the same network. All in all, it was a rather embarrassing and dangerous scenario for Lenovo, and it comes with its fair share of consequences.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Privacy Workplace Tips Google Email Computer Phishing Workplace Strategy Collaboration Small Business Hosted Solutions Backup Users Ransomware Managed Service Mobile Device Microsoft Productivity Passwords Saving Money AI Quick Tips Communication Cybersecurity Smartphone Data Backup Data Recovery Disaster Recovery Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Current Events Network Tech Term Internet of Things Remote Information Artificial Intelligence Facebook Miscellaneous Holiday Automation Compliance Covid-19 Cloud Computing Gadgets Training Server Managed Service Provider Outsourced IT Remote Work IT Support Employee/Employer Relationship Encryption Spam Office Windows 10 Business Continuity Data Management Government Bandwidth Blockchain Windows 10 Virtualization Wi-Fi Business Technology Two-factor Authentication Mobile Office Vendor Data Security Apps Managed Services Tip of the week Chrome Mobile Device Management Budget Networking Gmail Apple WiFi App BYOD Employer-Employee Relationship Voice over Internet Protocol Avoiding Downtime Office 365 Marketing Password Managed IT Services How To HIPAA BDR Applications Physical Security Computing Conferencing Access Control Information Technology Hacker Analytics Website Office Tips Retail Augmented Reality Storage 2FA Bring Your Own Device Router Big Data Help Desk Operating System Virtual Private Network Health Risk Management Computers Healthcare Document Management Cooperation Free Resource Project Management Windows 7 Scam Microsoft 365 Data loss Firewall Windows 11 Solutions Excel Patch Management The Internet of Things Save Money Remote Monitoring Vulnerability End of Support Social Going Green Vendor Management Monitoring Display Cybercrime Printer Paperless Office Customer Service Remote Workers Managed IT Service Infrastructure Telephone iPhone Virtual Desktop Data storage Machine Learning LiFi Wireless Technology Licensing Vulnerabilities Entertainment Outlook Money Images 101 Maintenance Word Antivirus Humor Telephone System Multi-Factor Authentication Mobility Cost Management Sports Mouse Supply Chain Safety Employees Integration Administration Robot User Tip Modem Processor Mobile Security Holidays IT Management VPN Data Storage Meetings Settings Wireless Smart Technology Printing Video Conferencing Content Filtering Managed Services Provider Customer Relationship Management Computer Repair Professional Services Data Privacy Saving Time YouTube Virtual Machines Cryptocurrency Hacking Presentation Downloads Google Wallet Electronic Medical Records Vendors Browsers Connectivity SharePoint Smartwatch Break Fix IT Procurement Azure Be Proactive Upload Social Network Laptop Lenovo Telework Multi-Factor Security Cyber security Windows 8 Writing Tech Workforce IP Address Drones Virtual Reality Threats IoT CES Dark Web Communitications Server Management Supply Chain Management Private Cloud Workplace Strategies Trends Customer Resource management Halloween Recovery Regulations Superfish FinTech Google Calendar Identity Theft Term Meta Twitter Amazon Data Analysis Hard Drives Star Wars Microsoft Excel IT Assessment Staff Flexibility Error Value Domains Gamification Outsource IT Scary Stories Social Networking Organization Legislation Hacks Social Engineering Smart Devices Remote Computing Environment Fileless Malware Media Refrigeration Fun Digital Security Cameras Wearable Technology Remote Working Memory Deep Learning Public Speaking Content Google Play Small Businesses Lithium-ion battery Health IT Motherboard Comparison Tablet Data Breach Electronic Health Records Alert Displays Directions Education Assessment Entrepreneur Videos Permissions Managed IT File Sharing Wasting Time Dark Data Security Cameras Outsourcing Specifications Trend Micro Mobile Computing How To Software as a Service Notifications Microchip Undo Internet Exlporer Search Fraud Travel Managing Costs Best Practice Workplace Username SSID Hiring/Firing Buisness Techology Black Friday Google Maps eCommerce Surveillance Legal Virtual Assistant IT solutions Paperless Database IT Technicians Unified Threat Management Virtual Machine Business Growth Co-managed IT Medical IT Technology Care Proxy Server Application Cookies Unified Threat Management Reviews Cyber Monday Development Transportation Business Communications Tactics Cortana Hotspot Mirgation Hypervisor Alt Codes Network Congestion Scams IBM PowerPoint Hybrid Work Downtime Nanotechnology User Error Shopping Optimization Employer/Employee Relationships Hosted Solution Human Resources Addiction Language Chatbots PCI DSS Point of Sale Typing Navigation Cables Management Screen Reader Gig Economy Distributed Denial of Service Network Management Internet Service Provider Google Drive Tech Support Teamwork Google Apps Competition Service Level Agreement Knowledge Computing Infrastructure Identity Regulations Compliance Monitors Evernote IT Maintenance Business Intelligence Bookmark Smart Tech 5G Memes Net Neutrality Google Docs Websites SQL Server Unified Communications Shortcuts Download Experience Alerts User Financial Data History Bitcoin Ransmoware Running Cable

Blog Archive