Bredy Network Management Corporation Blogs

BNMC has been serving the Andover area since 1988, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Adware Lawsuit Between Lenovo And FTC Settled

Adware Lawsuit Between Lenovo And FTC Settled

About two and a half years ago, Lenovo was brought under fire for manufacturing products that had adware preinstalled on them. This malware, a variant called Superfish, was installed on up to 750,000 Lenovo devices, and the company--eager to put this incident behind them--still refuses to admit fault, despite paying reparations and other fees as a result. Superfish allowed access to sensitive information and a root certificate, which could be used to access encrypted data on the same network. All in all, it was a rather embarrassing and dangerous scenario for Lenovo, and it comes with its fair share of consequences.

The Federal Trade Commission has finally declared a sentence for Lenovo, following this debacle. Lenovo must now notify all of their customers about the software that is preinstalled on any purchased devices, and retrieve the user’s consent. Furthermore, the company must allow security audits for the next 20 years, as well as pay $3.5 million in penalties and reparations. However, Lenovo continues to deny any fault in the matter, claiming that there are no instances of a third party actually exploiting this vulnerability to gain access to sensitive information or root access. These consequences feel like a slap in the face for those who felt wronged by Lenovo, but it’s better than nothing.

In the meantime, you need to make sure that your devices aren’t preloaded with Superfish--especially if you bought a device before 2014 and haven’t gone through the Superfish removal process. Furthermore, you should always be careful when buying new devices or technology, particularly if the devices are used. However, this incident shows that even brand new devices can potentially contain flaws, so it’s best to reach out to your IT provider, should you have any questions regarding the integrity of any technology purchases.

BNMC can provide your business with a network audit to determine just what kinds of security vulnerabilities you’re dealing with. We can then implement solutions to keep your business secure. Furthermore, we can remote into your devices and remove any issues that we encounter without an on-site visit.

Do you need a hand with network security? BNMC has got you covered. To learn more about how we can help your business, reach out to us at 978-482-2020.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, 19 March 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Email Privacy Malware Hackers Software Business Computing Internet Ransomware Microsoft Hosted Solutions Network Security Android IT Services Business Google Mobile Devices Computer Backup Smartphone Windows Windows 10 Innovation Data Management Small Business Server Cloud Computing Business Continuity Browser Internet of Things App Artificial Intelligence Hardware Encryption Data Business Management User Tips Phishing Gmail Smartphones IT Support Managed Service Provider Data Recovery Outsourced IT Efficiency Saving Money Tip of the week Managed IT Services Office 365 Productivity Remote Monitoring Settings Chrome Money IT Management Word Productivity Office Tips Communication Cybersecurity Antivirus Big Data IT Support Infrastructure Facebook Robot Google Drive Windows 10 Risk Management Upgrade Vulnerability Data storage Telephone Systems Hosted Solution Alert VPN Data Security Outlook Workplace Tips Monitors Firewall Server Management Bandwidth Save Money Virtual Private Network YouTube Automation communications Social Media Mouse Employer-Employee Relationship Virtual Reality Miscellaneous Apple SaaS Disaster Recovery Storage Government Passwords Data Backup HIPAA Unified Threat Management LiFi BYOD Mobile Security Managed IT Services Computing Administration Business Technology Content Filtering Maintenance Analytics End of Support Two-factor Authentication Mobile Device Network Scam Microsoft Office Holiday Data loss Display Tech Term Google Calendar Servers Gadgets Dark Web desktop Alt Codes Politics Cooperation Digital Compliance Legislation Collaboration Apps Samsung Halloween Users Budget Microsoft Excel Typing Techology Document Management Quick Tips Tech Support Humor Staff Spyware Regulations Current Events Tablet Statistics File Sharing Education Scary Stories Blockchain Solid State Drive Mail Merge Cryptocurrency Unified Threat Management Identity Theft VoIP Websites Website Augmented Reality Going Green Comparison Bluetooth Remote Computing Unified Communications Sports Permissions Hard Disk Drive Address Bitcoin User Error Avoiding Downtime Wearable Technology The Internet of Things Writing Printing Specifications Cabling Legal Fraud How To Windows 8 Printer Time Management VoIP Dark Data Cybercrime Retail Black Friday Search WiFi Marketing Emergency Applications Firefox Access Control Digital Payment Network Management Customer Service Office Cyber Monday Disaster Vendor Management Operating System Hotspot IT Technicians Social SharePoint Touchscreen Social Engineering Information Technology Smart Technology Uninterrupted Power Supply Managed IT IT solutions Lenovo Computer Care Language IBM Best Practice Mirgation Downloads Wireless Running Cable Safety Distributed Denial of Service Shortcut Superfish Training Buisness Google Docs Computing Infrastructure Corporate Profile Network Congestion Chatbots Hacks Automobile Virtual Desktop Laptop Google Wallet Managed IT Service Dell Patch Management Paperless Office Business Growth Deep Learning Customer Relationship Management Wi-Fi Alerts WannaCry Computers Identity Password Multi-Factor Security Google Maps Heating/Cooling Spam Drones Break Fix Hacker Networking Bring Your Own Device Downtime Licensing Mobile Device Management How To Cameras Tracking Health Mobile Computing Black Market CCTV Electronic Medical Records Twitter Notifications Upgrades Travel G Suite Crowdsourcing 3D Printing CrashOverride Supercomputer Botnet Motion Sickness Taxes Unsupported Software IT Budget Machine Learning Update IT Consultant Mobile Data Relocation Recovery Meetings Cleaning Work/Life Balance Private Cloud Chromebook Webcam Law Enforcement Physical Security Error Emoji Ben McDonald shares Point of Sale Gadget Personal Information Cortana Staffing Administrator Virtualization Processors what was your? Web Server GPS Computer Repair

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      What Our Clients Say

      • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
      • 1
      • 2
      • 3