Bredy Network Management Corporation Blogs

2 minutes reading time (370 words)

Adware Lawsuit Between Lenovo And FTC Settled

Adware Lawsuit Between Lenovo And FTC Settled

About two and a half years ago, Lenovo was brought under fire for manufacturing products that had adware preinstalled on them. This malware, a variant called Superfish, was installed on up to 750,000 Lenovo devices, and the company--eager to put this incident behind them--still refuses to admit fault, despite paying reparations and other fees as a result. Superfish allowed access to sensitive information and a root certificate, which could be used to access encrypted data on the same network. All in all, it was a rather embarrassing and dangerous scenario for Lenovo, and it comes with its fair share of consequences.

The Federal Trade Commission has finally declared a sentence for Lenovo, following this debacle. Lenovo must now notify all of their customers about the software that is preinstalled on any purchased devices, and retrieve the user’s consent. Furthermore, the company must allow security audits for the next 20 years, as well as pay $3.5 million in penalties and reparations. However, Lenovo continues to deny any fault in the matter, claiming that there are no instances of a third party actually exploiting this vulnerability to gain access to sensitive information or root access. These consequences feel like a slap in the face for those who felt wronged by Lenovo, but it’s better than nothing.

In the meantime, you need to make sure that your devices aren’t preloaded with Superfish--especially if you bought a device before 2014 and haven’t gone through the Superfish removal process. Furthermore, you should always be careful when buying new devices or technology, particularly if the devices are used. However, this incident shows that even brand new devices can potentially contain flaws, so it’s best to reach out to your IT provider, should you have any questions regarding the integrity of any technology purchases.

BNMC can provide your business with a network audit to determine just what kinds of security vulnerabilities you’re dealing with. We can then implement solutions to keep your business secure. Furthermore, we can remote into your devices and remove any issues that we encounter without an on-site visit.

Do you need a hand with network security? BNMC has got you covered. To learn more about how we can help your business, reach out to us at 978-482-2020.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, July 23 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Email Malware Privacy Business Computing Hackers Internet Software Microsoft Google Business Computer Hosted Solutions Mobile Devices Ransomware Network Security Managed IT Services Smartphone Android IT Services Tech Term Hardware Windows Data Management Small Business IT Support Backup Business Continuity Cloud Computing Windows 10 Cybersecurity User Tips Internet of Things Data Browser Innovation App Remote Monitoring Encryption Data Recovery Facebook Server Business Management Artificial Intelligence Gmail Saving Money Data Backup Vulnerability Productivity Disaster Recovery Smartphones Productivity Chrome Managed Service Provider Phishing Windows 10 Infrastructure Managed IT Services Tip of the week Efficiency Communication Outsourced IT Money Office 365 Word IT Support Government Website Office Tips Employer-Employee Relationship Microsoft Office Google Drive IT Management Content Filtering Bandwidth Passwords Big Data Upgrade Analytics Settings communications Robot YouTube Applications Data storage Network Risk Management Antivirus Social Media Spam Computing SaaS Outlook WiFi Wireless LiFi Holiday Company Culture Hosted Solution BYOD The Internet of Things VPN Administration Alert Mobile Device Data Security Mouse Managing Stress Business Technology VoIP Paperless Office Server Management Miscellaneous Virtual Private Network Vendor Management Apple Monitors Save Money Storage HIPAA Unified Threat Management Data loss Telephone Systems Workplace Tips Automation End of Support Mobile Security Two-factor Authentication Virtual Reality Avoiding Downtime Firewall Maintenance Scam Spyware IT Technicians Optimization Heating/Cooling Uninterrupted Power Supply Multi-Factor Security Alt Codes Running Cable Connectivity Document Management Buisness Staff Leominster File Sharing Time Management Printer Bring Your Own Device Wi-Fi Operating System Modem FinTech Computer Care IBM Break Fix Writing Networking Budget Virtual Desktop Regulations Search Solid State Drive Black Friday Computers Social Sports Language Value Identity Theft Emergency Information Technology Mirgation Recycling Servers Google Calendar Dark Data Typing Humor Laptop IoT Augmented Reality K-12 Schools Network Management Access Control Best Practice Cookies MSP Training Corporate Profile Dark Web Retail Current Events Automobile Politics Social Networking Hard Disk Drive Cyber Monday Display Computing Infrastructure Professional Services Apps Chatbots eWaste Dell Legislation Customer Service Cryptocurrency Star Wars Downtime Wearable Technology Network upgrade Touchscreen Cabling SharePoint Google Docs Cybercrime Nanotechnology Development WannaCry IT solutions Microsoft Excel Office Going Green Samsung Quick Tips Google Maps Techology Tech Support Motherboard Cables Managed IT Education Smart Technology Hacks Marketing Alerts USB How To Lenovo Google Wallet Identity Continuity Statistics Tablet Bitcoin Chromebook Gadgets Fraud Cost Management Smart Office Downloads Business Growth Screen Reader Charging Mail Merge Blockchain Social Engineering Printing VoIP Unified Threat Management Legal Websites Wires Shortcut Distributed Denial of Service Password Licensing Dongle Firefox Digital Payment Superfish Unified Communications Drones Solar Bluetooth desktop Comparison Windows 8 Users Halloween Assessment Safety Work Disaster Hacker Smart Tech Address Digital Permissions Service Level Agreement Collaboration User Error Deep Learning Router Voice over Internet Protocol Patch Management Managed IT Service Remote Computing Cooperation Customer Relationship Management Compliance Business Intelligence Specifications Network Congestion Scary Stories Hotspot Internet Exlporer Webcam Machine Learning Mobile Computing Processors Error Unsupported Software Virtualization Point of Sale Ben McDonald shares Update Travel Computer Repair Relocation Mobile Data G Suite Supercomputer CrashOverride How To Work/Life Balance Recovery Motion Sickness Health Private Cloud Staffing Administrator Taxes Black Market IT Budget Law Enforcement Web Server what was your? Electronic Medical Records GPS Notifications Physical Security BDR IT Consultant Twitter Upgrades Gadget Cameras Emoji Crowdsourcing Meetings Tracking Personal Information Botnet Cleaning Mobile Device Management 3D Printing CCTV Cortana

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      What Our Clients Say

      • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
      • 1
      • 2
      • 3