Bredy Network Management Corporation Blogs

BNMC has been serving the Andover area since 1988, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Adware Lawsuit Between Lenovo And FTC Settled

Adware Lawsuit Between Lenovo And FTC Settled

About two and a half years ago, Lenovo was brought under fire for manufacturing products that had adware preinstalled on them. This malware, a variant called Superfish, was installed on up to 750,000 Lenovo devices, and the company--eager to put this incident behind them--still refuses to admit fault, despite paying reparations and other fees as a result. Superfish allowed access to sensitive information and a root certificate, which could be used to access encrypted data on the same network. All in all, it was a rather embarrassing and dangerous scenario for Lenovo, and it comes with its fair share of consequences.

The Federal Trade Commission has finally declared a sentence for Lenovo, following this debacle. Lenovo must now notify all of their customers about the software that is preinstalled on any purchased devices, and retrieve the user’s consent. Furthermore, the company must allow security audits for the next 20 years, as well as pay $3.5 million in penalties and reparations. However, Lenovo continues to deny any fault in the matter, claiming that there are no instances of a third party actually exploiting this vulnerability to gain access to sensitive information or root access. These consequences feel like a slap in the face for those who felt wronged by Lenovo, but it’s better than nothing.

In the meantime, you need to make sure that your devices aren’t preloaded with Superfish--especially if you bought a device before 2014 and haven’t gone through the Superfish removal process. Furthermore, you should always be careful when buying new devices or technology, particularly if the devices are used. However, this incident shows that even brand new devices can potentially contain flaws, so it’s best to reach out to your IT provider, should you have any questions regarding the integrity of any technology purchases.

BNMC can provide your business with a network audit to determine just what kinds of security vulnerabilities you’re dealing with. We can then implement solutions to keep your business secure. Furthermore, we can remote into your devices and remove any issues that we encounter without an on-site visit.

Do you need a hand with network security? BNMC has got you covered. To learn more about how we can help your business, reach out to us at 978-482-2020.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, 17 December 2017
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Privacy Email Hackers Malware Business Computing Internet Microsoft Hosted Solutions Ransomware Software IT Services Business Computer Windows Google Network Security Windows 10 Backup Smartphone Small Business Data Management Business Continuity Data Browser Innovation Android App Hardware Office 365 Phishing Data Recovery Managed IT Services Cloud Computing User Tips Smartphones Tip of the week Internet of Things Remote Monitoring Saving Money Outsourced IT Artificial Intelligence Mobile Devices Productivity IT Support Settings Robot Google Drive Upgrade Word Gmail Office Tips Productivity Data storage Cybersecurity Big Data Money IT Support Facebook Managed Service Provider Efficiency Risk Management Chrome Computing Hosted Solution Server Antivirus Workplace Tips Data Backup Telephone Systems YouTube End of Support Alert Social Media communications Firewall Disaster Recovery Employer-Employee Relationship Microsoft Office Passwords Windows 10 Outlook LiFi Monitors Government Administration Save Money Unified Threat Management Content Filtering Managed IT Services Vulnerability Mouse Miscellaneous Analytics Maintenance IT Management Apple SaaS Virtual Private Network Network Encryption Mobile Device WannaCry Office Address Gadgets Avoiding Downtime Vendor Management Google Maps User Error Operating System Specifications Social Data loss Bandwidth Social Engineering Information Technology Business Management Users Time Management Best Practice Apps Halloween Printer desktop Black Friday Search Digital Education Safety Emergency Politics Google Docs Collaboration Network Management Scary Stories Access Control Website Cyber Monday Network Congestion Hacks Samsung Spyware Business Technology Google Wallet SharePoint File Sharing Touchscreen Business Growth Unified Communications Sports Solid State Drive Smart Technology Computers Managed IT Password The Internet of Things Lenovo Drones Websites Downloads Hacker Hard Disk Drive Distributed Denial of Service Display VoIP Shortcut WiFi Cybercrime Superfish Two-factor Authentication Marketing Alt Codes Cabling Managed IT Service Patch Management Customer Relationship Management How To Scam Budget Multi-Factor Security Humor Heating/Cooling Typing Infrastructure Break Fix Automation Current Events BYOD Firefox IT solutions Digital Payment Networking Google Calendar Servers Cryptocurrency Virtual Reality Disaster Dark Web Communication VPN Going Green Running Cable Data Security Buisness Legislation Storage Server Management Bitcoin Uninterrupted Power Supply IBM Virtual Desktop Microsoft Excel Writing Computer Care Printing Quick Tips Wireless Laptop Techology Legal Tablet Dark Data Statistics Windows 8 Deep Learning Corporate Profile Retail Training Mail Merge Automobile VoIP Spam Unified Threat Management Dell Downtime Comparison Customer Service Bluetooth Bring Your Own Device Staffing Administrator what was your? Web Server Processors Chromebook GPS Holiday Physical Security Emoji Cameras Tracking Personal Information Cortana CCTV Document Management Tech Support Wi-Fi Virtualization Notifications Identity Theft Travel Computer Repair G Suite Mobile Device Management Crowdsourcing CrashOverride How To Supercomputer Botnet Motion Sickness Health Black Market Taxes Mobile Computing IT Budget Machine Learning Electronic Medical Records Twitter IT Consultant Upgrades Relocation Meetings Remote Computing Cleaning Work/Life Balance 3D Printing Private Cloud Webcam Law Enforcement Unsupported Software Error Ben McDonald shares Point of Sale Update Gadget Mobile Data Paperless Office Recovery

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      What Our Clients Say

      • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
      • 1
      • 2
      • 3