Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Adware Lawsuit Between Lenovo And FTC Settled

Adware Lawsuit Between Lenovo And FTC Settled

About two and a half years ago, Lenovo was brought under fire for manufacturing products that had adware preinstalled on them. This malware, a variant called Superfish, was installed on up to 750,000 Lenovo devices, and the company--eager to put this incident behind them--still refuses to admit fault, despite paying reparations and other fees as a result. Superfish allowed access to sensitive information and a root certificate, which could be used to access encrypted data on the same network. All in all, it was a rather embarrassing and dangerous scenario for Lenovo, and it comes with its fair share of consequences.

The Federal Trade Commission has finally declared a sentence for Lenovo, following this debacle. Lenovo must now notify all of their customers about the software that is preinstalled on any purchased devices, and retrieve the user’s consent. Furthermore, the company must allow security audits for the next 20 years, as well as pay $3.5 million in penalties and reparations. However, Lenovo continues to deny any fault in the matter, claiming that there are no instances of a third party actually exploiting this vulnerability to gain access to sensitive information or root access. These consequences feel like a slap in the face for those who felt wronged by Lenovo, but it’s better than nothing.

In the meantime, you need to make sure that your devices aren’t preloaded with Superfish--especially if you bought a device before 2014 and haven’t gone through the Superfish removal process. Furthermore, you should always be careful when buying new devices or technology, particularly if the devices are used. However, this incident shows that even brand new devices can potentially contain flaws, so it’s best to reach out to your IT provider, should you have any questions regarding the integrity of any technology purchases.

Voyage Technology can provide your business with a network audit to determine just what kinds of security vulnerabilities you’re dealing with. We can then implement solutions to keep your business secure. Furthermore, we can remote into your devices and remove any issues that we encounter without an on-site visit.

Do you need a hand with network security? Voyage Technology has got you covered. To learn more about how we can help your business, reach out to us at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 02 August 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Efficiency Hardware Internet Malware IT Support Privacy Google Email Computer Workplace Tips Phishing Hosted Solutions IT Services Users Collaboration Mobile Device Ransomware Workplace Strategy Small Business Quick Tips Backup Cybersecurity Microsoft Communication Passwords Saving Money Data Backup Smartphone Managed Service Android Business Management Smartphones VoIP Mobile Devices communications Upgrade Disaster Recovery Data Recovery Browser Social Media Productivity Windows Managed IT Services Microsoft Office AI Current Events Remote Network Tech Term Internet of Things Artificial Intelligence Facebook Automation Cloud Computing Covid-19 Holiday Gadgets Information Remote Work Miscellaneous Training Server Managed Service Provider Outsourced IT Employee/Employer Relationship Spam Encryption Compliance Windows 10 Office Data Management Government Business Continuity Windows 10 Blockchain IT Support Bandwidth Virtualization Business Technology Wi-Fi Data Security Vendor Apps Mobile Office Two-factor Authentication Gmail Chrome BYOD Budget Apple Employer-Employee Relationship App Managed Services Voice over Internet Protocol Networking Mobile Device Management BDR Office 365 HIPAA WiFi Applications Access Control Tip of the week Hacker Conferencing Avoiding Downtime Computing Information Technology Marketing How To Analytics Office Tips Augmented Reality Storage Router Big Data Password Bring Your Own Device Virtual Private Network Health Help Desk Computers Operating System Retail Healthcare Website Risk Management Managed IT Services Windows 7 Firewall Patch Management Windows 11 Save Money Microsoft 365 Remote Monitoring 2FA Vulnerability End of Support The Internet of Things Vendor Management Solutions Excel Physical Security Social Display Printer Paperless Office Infrastructure Monitoring Customer Service Going Green Document Management Cybercrime Remote Workers Telephone Scam Data loss Cooperation Free Resource Project Management Images 101 Telephone System Multi-Factor Authentication Robot Mobility Outlook Cost Management Safety Money Supply Chain Humor IT Management VPN Employees Meetings Integration Sports Mouse User Tip Modem Computer Repair Mobile Security Processor Administration Holidays Customer Relationship Management Data Storage Smart Technology Video Conferencing Data Privacy Machine Learning Managed Services Provider Hacking Presentation Professional Services Settings Saving Time Virtual Machines Wireless Printing Content Filtering Wireless Technology Managed IT Service Maintenance YouTube Antivirus Downloads iPhone Cryptocurrency Licensing Vulnerabilities Word Entertainment Virtual Desktop LiFi Data storage Public Speaking How To Microsoft Excel Outsource IT Windows 8 Laptop Data Analysis Star Wars IT Assessment Gamification Flexibility Lithium-ion battery Notifications Staff Value Environment Media Drones Entrepreneur Organization Travel Social Networking Legislation Small Businesses Halloween Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Content Remote Working Wearable Technology Memory Displays Health IT Unified Threat Management Motherboard Data Breach Undo Comparison Google Play Permissions Outsourcing Hacks Scary Stories Unified Threat Management Directions Videos Assessment Electronic Health Records Fun Wasting Time Deep Learning Trend Micro Network Congestion Specifications Security Cameras Workplace Fraud Hiring/Firing User Error Microchip Internet Exlporer Software as a Service Education Username Managing Costs Application Paperless Point of Sale eCommerce Black Friday SSID Co-managed IT Database Surveillance IBM Virtual Assistant Technology Care Mobile Computing Search Network Management Tech Support IT Technicians Virtual Machine Business Communications Monitors Cyber Monday Medical IT Scams Best Practice Proxy Server Reviews Cookies Tactics Development Hotspot Transportation Hybrid Work Buisness IT solutions Websites Mirgation Hypervisor Human Resources Legal Competition PowerPoint Cables Business Growth Shopping Nanotechnology Optimization Addiction Electronic Medical Records Language Employer/Employee Relationships SharePoint Cortana Management PCI DSS Chatbots Navigation Google Apps Writing Distributed Denial of Service IT Maintenance Alt Codes Lenovo Gig Economy Screen Reader Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Business Intelligence User Downtime Hosted Solution Server Management Regulations Compliance Private Cloud Identity Evernote Shortcuts Ransmoware Typing Superfish Bookmark Identity Theft Smart Tech Memes Download Net Neutrality IP Address Twitter Alerts SQL Server Vendors Knowledge Financial Data Error History Be Proactive Google Drive Social Engineering Break Fix Workforce Browsers Smartwatch Connectivity IT 5G Upload Procurement Remote Computing Azure Threats Recovery Unified Communications Experience Social Network Telework Cyber security Hard Drives Multi-Factor Security Tech Workplace Strategies Google Docs Domains Dark Web Meta Bitcoin Running Cable CES Tablet IoT Communitications Trends Supply Chain Management Alert Amazon Google Wallet Managed IT Customer Resource management FinTech File Sharing Regulations Refrigeration Dark Data Google Calendar Term

Blog Archive