Bredy Network Management Corporation Blogs

BNMC has been serving the Andover area since 1988, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Adware Lawsuit Between Lenovo And FTC Settled

Adware Lawsuit Between Lenovo And FTC Settled

About two and a half years ago, Lenovo was brought under fire for manufacturing products that had adware preinstalled on them. This malware, a variant called Superfish, was installed on up to 750,000 Lenovo devices, and the company--eager to put this incident behind them--still refuses to admit fault, despite paying reparations and other fees as a result. Superfish allowed access to sensitive information and a root certificate, which could be used to access encrypted data on the same network. All in all, it was a rather embarrassing and dangerous scenario for Lenovo, and it comes with its fair share of consequences.

The Federal Trade Commission has finally declared a sentence for Lenovo, following this debacle. Lenovo must now notify all of their customers about the software that is preinstalled on any purchased devices, and retrieve the user’s consent. Furthermore, the company must allow security audits for the next 20 years, as well as pay $3.5 million in penalties and reparations. However, Lenovo continues to deny any fault in the matter, claiming that there are no instances of a third party actually exploiting this vulnerability to gain access to sensitive information or root access. These consequences feel like a slap in the face for those who felt wronged by Lenovo, but it’s better than nothing.

In the meantime, you need to make sure that your devices aren’t preloaded with Superfish--especially if you bought a device before 2014 and haven’t gone through the Superfish removal process. Furthermore, you should always be careful when buying new devices or technology, particularly if the devices are used. However, this incident shows that even brand new devices can potentially contain flaws, so it’s best to reach out to your IT provider, should you have any questions regarding the integrity of any technology purchases.

BNMC can provide your business with a network audit to determine just what kinds of security vulnerabilities you’re dealing with. We can then implement solutions to keep your business secure. Furthermore, we can remote into your devices and remove any issues that we encounter without an on-site visit.

Do you need a hand with network security? BNMC has got you covered. To learn more about how we can help your business, reach out to us at 978-482-2020.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 19 October 2017
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Cloud Technology Privacy Email Malware Hackers Hosted Solutions Business Computing Internet Microsoft Software Ransomware Computer Network Security Google Windows Windows 10 IT Services Backup Business Smartphone Business Continuity Data Innovation App Hardware User Tips Cloud Computing Internet of Things Android Saving Money Mobile Devices IT Support Productivity Small Business Tip of the week Phishing Data Management Managed IT Services Gmail Office Tips Data storage Browser Word Big Data Smartphones Cybersecurity Facebook Efficiency Data Recovery Artificial Intelligence Settings Robot Google Drive Upgrade Remote Monitoring communications Social Media Telephone Systems IT Management Alert Virtual Private Network Microsoft Office Disaster Recovery Money Passwords Outlook Productivity Monitors LiFi Save Money Managed Service Provider Administration Antivirus Content Filtering Miscellaneous IT Support Apple Analytics SaaS Risk Management Unified Threat Management Managed IT Services Network Outsourced IT Encryption Windows 10 Chrome Hosted Solution Server Mobile Device Workplace Tips End of Support Vulnerability Office 365 YouTube Education Servers Network Congestion Hacks Google Wallet Data loss VPN Scary Stories Business Growth Data Security Website Server Management Computers Password desktop Drones Digital Unified Communications Sports Politics Hacker Firewall Techology Collaboration Quick Tips Statistics The Internet of Things Samsung Display Spyware Mail Merge VoIP Alt Codes Unified Threat Management File Sharing VoIP WiFi Bluetooth Cybercrime Solid State Drive Budget Employer-Employee Relationship Address Websites Marketing Avoiding Downtime Humor Typing Automation Current Events Hard Disk Drive Mouse Data Backup Time Management Virtual Reality Cryptocurrency Cabling IT solutions Search Communication Going Green How To Emergency Network Management Storage Bitcoin Infrastructure Running Cable Writing Printing Legal Firefox Digital Payment Business Technology Buisness Touchscreen Dark Data Windows 8 Disaster Virtual Desktop Managed IT Laptop Retail Maintenance Deep Learning Lenovo Customer Service Uninterrupted Power Supply IBM Spam Computer Care Shortcut Office Computing Operating System Bring Your Own Device Wireless Superfish Downtime Vendor Management Social Corporate Profile Training Patch Management Gadgets Social Engineering Information Technology Best Practice Scam Automobile Customer Relationship Management Heating/Cooling Dell Bandwidth WannaCry Apps Halloween Users Safety Google Docs Google Maps Networking Web Server Processors Cortana what was your? GPS Holiday Wi-Fi Business Management Cameras Virtualization Tracking Computer Repair CCTV Mobile Device Management Document Management Tech Support How To Health Notifications Black Market Mobile Computing Identity Theft Electronic Medical Records User Error Travel G Suite Crowdsourcing Twitter CrashOverride Supercomputer Botnet Upgrades Motion Sickness Taxes Government Remote Computing IT Budget Machine Learning 3D Printing IT Consultant BYOD Relocation Unsupported Software Update Meetings Cleaning Work/Life Balance Private Cloud Mobile Data Recovery Webcam Law Enforcement Error Point of Sale Chromebook Ben McDonald shares Gadget Physical Security Paperless Office Emoji Staffing Personal Information Administrator

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      What Our Clients Say

      • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
      • 1
      • 2
      • 3