Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Adware Lawsuit Between Lenovo And FTC Settled

Adware Lawsuit Between Lenovo And FTC Settled

About two and a half years ago, Lenovo was brought under fire for manufacturing products that had adware preinstalled on them. This malware, a variant called Superfish, was installed on up to 750,000 Lenovo devices, and the company--eager to put this incident behind them--still refuses to admit fault, despite paying reparations and other fees as a result. Superfish allowed access to sensitive information and a root certificate, which could be used to access encrypted data on the same network. All in all, it was a rather embarrassing and dangerous scenario for Lenovo, and it comes with its fair share of consequences.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Backup Productivity Passwords Quick Tips Communication Cybersecurity Saving Money Data Backup Smartphone Managed Service Android Upgrade AI Business Management Smartphones Data Recovery VoIP Mobile Devices Disaster Recovery communications Windows Browser Social Media Managed IT Services Microsoft Office Current Events Network Tech Term Remote Internet of Things Facebook Automation Information Miscellaneous Artificial Intelligence Covid-19 Gadgets Cloud Computing Holiday Training Remote Work Server Managed Service Provider Outsourced IT Compliance IT Support Spam Employee/Employer Relationship Encryption Windows 10 Office Business Continuity Government Data Management Blockchain Business Technology Virtualization Bandwidth Wi-Fi Windows 10 Two-factor Authentication Vendor Apps Data Security Mobile Office Tip of the week Chrome Budget Employer-Employee Relationship Apple Networking App Managed Services Voice over Internet Protocol BYOD Mobile Device Management Gmail Access Control WiFi Office 365 HIPAA Applications How To Hacker BDR Avoiding Downtime Conferencing Marketing Computing Information Technology Health Analytics Office Tips Big Data Augmented Reality Router Retail Storage Password Bring Your Own Device 2FA Managed IT Services Help Desk Computers Website Healthcare Operating System Virtual Private Network Risk Management Paperless Office Microsoft 365 Infrastructure The Internet of Things Solutions Document Management Social Windows 11 Scam Data loss Customer Service Monitoring Excel Going Green Patch Management Save Money Remote Workers Remote Monitoring Vulnerability Telephone End of Support Vendor Management Cybercrime Physical Security Firewall Cooperation Free Resource Project Management Display Windows 7 Printer Mobility Safety Telephone System Virtual Desktop Multi-Factor Authentication Cost Management Data storage LiFi Outlook Machine Learning Money Employees Integration Humor User Tip Modem Processor Maintenance Mobile Security Customer Relationship Management Antivirus Sports Holidays Mouse Data Storage Smart Technology Supply Chain Hacking Administration Video Conferencing Presentation Managed Services Provider Virtual Machines Professional Services Saving Time Wireless Technology Robot Managed IT Service Settings Downloads Printing Wireless Content Filtering iPhone IT Management Word Licensing VPN YouTube Meetings Vulnerabilities Entertainment Cryptocurrency Data Privacy Computer Repair Images 101 Legislation Shortcuts Google Wallet Organization Social Networking Monitors Smart Devices Ransmoware Undo Fileless Malware Digital Security Cameras Windows 8 Content Remote Working Laptop Websites Wearable Technology Memory Vendors Comparison Google Play Be Proactive Drones Health IT Motherboard Data Breach Assessment Electronic Health Records Electronic Medical Records Permissions Workforce SharePoint Directions Videos Halloween Wasting Time Threats Writing Specifications Security Cameras Workplace Strategies Lenovo Application Trend Micro Internet Exlporer Software as a Service Virtual Reality Fraud Meta Microchip IBM Hacks Server Management Username Scary Stories Private Cloud Managing Costs Amazon Fun Black Friday SSID Superfish Identity Theft eCommerce Deep Learning Database Surveillance Twitter Virtual Assistant Outsource IT Error IT Technicians Virtual Machine Environment Media Cookies Social Engineering Cyber Monday Medical IT Proxy Server Reviews Education Tactics Development Remote Computing Hotspot Transportation Small Businesses Competition Mobile Computing Mirgation Hypervisor Displays Nanotechnology Optimization Search PowerPoint Shopping Tablet Best Practice Addiction Alert Language Employer/Employee Relationships Outsourcing Navigation Managed IT User Management PCI DSS Buisness File Sharing Chatbots Dark Data Screen Reader How To Distributed Denial of Service Workplace Legal Gig Economy IT solutions Business Growth Service Level Agreement Internet Service Provider Notifications Computing Infrastructure Teamwork Hiring/Firing Evernote Paperless IP Address Regulations Compliance Travel Identity Smart Tech Memes Cortana Co-managed IT Techology Bookmark Google Maps Alt Codes Download Net Neutrality Alerts SQL Server Technology Care Business Communications Recovery Financial Data Downtime Unified Threat Management History Connectivity IT Break Fix Scams Unified Threat Management Hard Drives Browsers Smartwatch Hosted Solution Domains Typing Upload Procurement Azure Hybrid Work Multi-Factor Security Tech Human Resources Social Network Telework Cyber security Network Congestion IoT Communitications Knowledge Dark Web Cables Google Drive User Error Refrigeration CES Public Speaking Trends Supply Chain Management Google Calendar Term Google Apps Lithium-ion battery Customer Resource management FinTech Point of Sale Regulations 5G Entrepreneur Star Wars IT Assessment Experience Microsoft Excel IT Maintenance Google Docs Data Analysis Unified Communications Bitcoin Network Management Gamification Flexibility Running Cable Tech Support Staff Value Business Intelligence

Blog Archive