Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Adware Lawsuit Between Lenovo And FTC Settled

Adware Lawsuit Between Lenovo And FTC Settled

About two and a half years ago, Lenovo was brought under fire for manufacturing products that had adware preinstalled on them. This malware, a variant called Superfish, was installed on up to 750,000 Lenovo devices, and the company--eager to put this incident behind them--still refuses to admit fault, despite paying reparations and other fees as a result. Superfish allowed access to sensitive information and a root certificate, which could be used to access encrypted data on the same network. All in all, it was a rather embarrassing and dangerous scenario for Lenovo, and it comes with its fair share of consequences.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Hardware Internet Efficiency IT Support Malware Privacy Google Email Phishing Workplace Tips Computer Collaboration IT Services Hosted Solutions Users Mobile Device Ransomware Workplace Strategy Quick Tips Small Business Cybersecurity Microsoft Passwords Communication Data Backup Smartphone Backup Saving Money VoIP Business Management Smartphones Android Upgrade Mobile Devices communications Disaster Recovery Managed Service Data Recovery Browser Managed IT Services Social Media Microsoft Office Windows Tech Term Network Remote Internet of Things Automation Artificial Intelligence Facebook Current Events Productivity Gadgets Cloud Computing Covid-19 Server Managed Service Provider Miscellaneous Remote Work Outsourced IT AI Information Holiday Encryption Spam Employee/Employer Relationship Windows 10 Compliance Office Business Continuity Data Management Government Training Business Technology Bandwidth Windows 10 Virtualization Blockchain Wi-Fi Mobile Office Data Security Apps Two-factor Authentication Chrome Managed Services Mobile Device Management Budget Voice over Internet Protocol Gmail Apple Networking App Employer-Employee Relationship BYOD Vendor Avoiding Downtime Office 365 Marketing IT Support Tip of the week Conferencing How To WiFi BDR Computing Applications Information Technology Hacker Access Control Help Desk Analytics Website Office Tips Augmented Reality Retail Storage Healthcare Password Bring Your Own Device Managed IT Services Big Data Operating System HIPAA Router Virtual Private Network Risk Management Computers Health Monitoring Document Management Remote Workers Firewall Telephone Scam Data loss Windows 11 The Internet of Things 2FA Cooperation Free Resource Project Management Windows 7 Excel Social Going Green Patch Management Save Money Microsoft 365 Remote Monitoring End of Support Vulnerability Vendor Management Solutions Cybercrime Physical Security Customer Service Display Printer Paperless Office Infrastructure Data Storage Smart Technology Outlook Video Conferencing Machine Learning Managed Services Provider Money Saving Time Virtual Machines Professional Services Humor Word Managed IT Service Maintenance Sports Downloads Antivirus Mouse iPhone Licensing Safety Entertainment Administration Vulnerabilities Supply Chain Images 101 Multi-Factor Authentication Robot Mobility Telephone System Cost Management Settings Wireless Printing Content Filtering IT Management Customer Relationship Management VPN Employees YouTube Meetings Integration Cryptocurrency User Tip Modem Hacking Processor Data Privacy Presentation Computer Repair Mobile Security Virtual Desktop Holidays Data storage LiFi Wireless Technology Laptop Websites Mirgation Hypervisor Windows 8 IP Address Shortcuts Drones Shopping Ransmoware Nanotechnology Optimization PowerPoint SharePoint Vendors Addiction Electronic Medical Records Language Employer/Employee Relationships Be Proactive Halloween Chatbots Recovery Navigation Management PCI DSS Lenovo Gig Economy Workforce Screen Reader Hard Drives Writing Distributed Denial of Service Threats Service Level Agreement Internet Service Provider Domains Virtual Reality Computing Infrastructure Teamwork Workplace Strategies Scary Stories Private Cloud Identity Evernote Hacks Server Management Regulations Compliance Superfish Bookmark Meta Identity Theft Smart Tech Memes Refrigeration Fun Amazon Deep Learning Download Net Neutrality Public Speaking Twitter Alerts SQL Server Error History Financial Data Lithium-ion battery Browsers Smartwatch Outsource IT Education Connectivity IT Social Engineering Break Fix Entrepreneur Environment Upload Procurement Media Remote Computing Azure Cyber security Multi-Factor Security Tech Mobile Computing Social Network Telework CES Small Businesses Tablet IoT Communitications Undo Search Dark Web Displays Best Practice Trends Supply Chain Management Alert Buisness File Sharing Regulations Dark Data Google Calendar Term Managed IT Customer Resource management FinTech Legal Data Analysis Outsourcing IT solutions Star Wars IT Assessment How To Microsoft Excel Business Growth Gamification Flexibility Notifications Staff Value Workplace Travel Social Networking Application Legislation Organization Techology Fileless Malware Digital Security Cameras Hiring/Firing Google Maps Smart Devices Cortana Alt Codes Content Remote Working IBM Paperless Wearable Technology Memory Co-managed IT Downtime Unified Threat Management Motherboard Data Breach Comparison Google Play Health IT Unified Threat Management Directions Videos Technology Care Hosted Solution Assessment Electronic Health Records Permissions Typing Business Communications Wasting Time Scams Trend Micro Network Congestion Specifications Security Cameras Google Drive User Error Microchip Hybrid Work Internet Exlporer Software as a Service Competition Knowledge Fraud Managing Costs Username Human Resources Cables Point of Sale eCommerce 5G Black Friday SSID Google Docs Unified Communications Database Surveillance Experience Virtual Assistant Running Cable Tech Support IT Technicians Virtual Machine User Bitcoin Network Management Google Apps Google Wallet Proxy Server Reviews IT Maintenance Cookies Monitors Cyber Monday Medical IT Business Intelligence Tactics Development Hotspot Transportation

Blog Archive