Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Adware Lawsuit Between Lenovo And FTC Settled

Adware Lawsuit Between Lenovo And FTC Settled

About two and a half years ago, Lenovo was brought under fire for manufacturing products that had adware preinstalled on them. This malware, a variant called Superfish, was installed on up to 750,000 Lenovo devices, and the company--eager to put this incident behind them--still refuses to admit fault, despite paying reparations and other fees as a result. Superfish allowed access to sensitive information and a root certificate, which could be used to access encrypted data on the same network. All in all, it was a rather embarrassing and dangerous scenario for Lenovo, and it comes with its fair share of consequences.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Google Computer Phishing Email Workplace Tips IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Backup Quick Tips Productivity Passwords Cybersecurity Saving Money Communication Data Backup Managed Service Smartphone Android Upgrade Smartphones AI Data Recovery VoIP Business Management Mobile Devices communications Disaster Recovery Windows Social Media Browser Microsoft Office Managed IT Services Current Events Tech Term Network Remote Internet of Things Automation Artificial Intelligence Information Facebook Miscellaneous Gadgets Cloud Computing Holiday Training Covid-19 Server Managed Service Provider Remote Work Compliance Outsourced IT Spam IT Support Employee/Employer Relationship Encryption Office Windows 10 Government Business Continuity Data Management Wi-Fi Blockchain Business Technology Bandwidth Windows 10 Virtualization Apps Two-factor Authentication Mobile Office Vendor Data Security Managed Services Voice over Internet Protocol Employer-Employee Relationship BYOD Tip of the week Chrome Mobile Device Management Budget Gmail Apple Networking App Conferencing Computing Information Technology Hacker Access Control Avoiding Downtime Office 365 Marketing HIPAA Applications How To WiFi BDR Operating System Healthcare Risk Management Virtual Private Network Computers Health Analytics Website Office Tips Augmented Reality Router Retail Storage Password Bring Your Own Device Managed IT Services 2FA Help Desk Big Data Remote Monitoring Remote Workers End of Support Vulnerability Vendor Management Cybercrime Telephone Physical Security Customer Service Display Printer Cooperation Free Resource Project Management Paperless Office Windows 7 Infrastructure Microsoft 365 Document Management Solutions Firewall Scam Data loss Windows 11 The Internet of Things Monitoring Excel Social Going Green Patch Management Save Money Settings Wireless Managed IT Service Printing Content Filtering Downloads IT Management Customer Relationship Management YouTube Meetings iPhone VPN Licensing Cryptocurrency Hacking Entertainment Vulnerabilities Presentation Computer Repair Data Privacy Virtual Desktop Images 101 Data storage LiFi Wireless Technology Multi-Factor Authentication Mobility Telephone System Cost Management Outlook Machine Learning Money Humor Word Employees Integration Maintenance User Tip Modem Antivirus Sports Processor Mobile Security Mouse Holidays Safety Administration Data Storage Smart Technology Supply Chain Video Conferencing Managed Services Provider Saving Time Robot Virtual Machines Professional Services Identity Evernote Paperless Alt Codes IBM Regulations Compliance Bookmark Smart Tech Memes Co-managed IT Downtime Unified Threat Management Unified Threat Management Hosted Solution Download Net Neutrality Alerts SQL Server Technology Care History Business Communications Typing Financial Data Browsers Smartwatch Network Congestion Connectivity IT Break Fix Scams Google Drive User Error Competition Knowledge Upload Procurement Azure Hybrid Work Cyber security Multi-Factor Security Tech Human Resources Social Network Telework Point of Sale CES 5G IoT Communitications Dark Web Cables Google Docs Unified Communications Experience Trends Supply Chain Management Regulations Google Calendar Term Google Apps Bitcoin Network Management Running Cable Tech Support User Customer Resource management FinTech Data Analysis Monitors Star Wars IT Assessment Microsoft Excel IT Maintenance Google Wallet Gamification Flexibility Staff Value Business Intelligence Social Networking Legislation Shortcuts Windows 8 IP Address Laptop Websites Organization Fileless Malware Digital Security Cameras Smart Devices Ransmoware Drones SharePoint Electronic Medical Records Content Remote Working Wearable Technology Memory Vendors Motherboard Data Breach Comparison Google Play Be Proactive Halloween Recovery Health IT Hard Drives Directions Videos Writing Assessment Electronic Health Records Permissions Workforce Lenovo Domains Virtual Reality Wasting Time Threats Trend Micro Specifications Security Cameras Workplace Strategies Hacks Server Management Scary Stories Private Cloud Identity Theft Refrigeration Microchip Fun Internet Exlporer Software as a Service Fraud Meta Superfish Managing Costs Amazon Deep Learning Public Speaking Twitter Username eCommerce Black Friday SSID Lithium-ion battery Error Education Social Engineering Entrepreneur Database Surveillance Virtual Assistant Outsource IT IT Technicians Virtual Machine Environment Media Remote Computing Proxy Server Reviews Cookies Cyber Monday Medical IT Mobile Computing Tablet Undo Search Tactics Development Hotspot Transportation Small Businesses Mirgation Hypervisor Displays Best Practice Alert Shopping Dark Data Nanotechnology Optimization PowerPoint Managed IT Buisness File Sharing IT solutions How To Addiction Language Employer/Employee Relationships Outsourcing Legal Chatbots Navigation Business Growth Notifications Management PCI DSS Application Gig Economy Screen Reader Distributed Denial of Service Workplace Travel Google Maps Cortana Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Techology

Blog Archive