Adware Lawsuit Between Lenovo And FTC Settled

Adware Lawsuit Between Lenovo And FTC Settled

About two and a half years ago, Lenovo was brought under fire for manufacturing products that had adware preinstalled on them. This malware, a variant called Superfish, was installed on up to 750,000 Lenovo devices, and the company--eager to put this incident behind them--still refuses to admit fault, despite paying reparations and other fees as a result. Superfish allowed access to sensitive information and a root certificate, which could be used to access encrypted data on the same network. All in all, it was a rather embarrassing and dangerous scenario for Lenovo, and it comes with its fair share of consequences.

The Federal Trade Commission has finally declared a sentence for Lenovo, following this debacle. Lenovo must now notify all of their customers about the software that is preinstalled on any purchased devices, and retrieve the user’s consent. Furthermore, the company must allow security audits for the next 20 years, as well as pay $3.5 million in penalties and reparations. However, Lenovo continues to deny any fault in the matter, claiming that there are no instances of a third party actually exploiting this vulnerability to gain access to sensitive information or root access. These consequences feel like a slap in the face for those who felt wronged by Lenovo, but it’s better than nothing.

In the meantime, you need to make sure that your devices aren’t preloaded with Superfish--especially if you bought a device before 2014 and haven’t gone through the Superfish removal process. Furthermore, you should always be careful when buying new devices or technology, particularly if the devices are used. However, this incident shows that even brand new devices can potentially contain flaws, so it’s best to reach out to your IT provider, should you have any questions regarding the integrity of any technology purchases.

Haber Group can provide your business with a network audit to determine just what kinds of security vulnerabilities you’re dealing with. We can then implement solutions to keep your business secure. Furthermore, we can remote into your devices and remove any issues that we encounter without an on-site visit.

Do you need a hand with network security? Haber Group has got you covered. To learn more about how we can help your business, reach out to us at 866.625.3560.

Charity Scams Are Very Real. Here’s How To Dodge T...
Tip of the Week: Ransomware Is Exploding… Is Your ...
 

Comments

Already Registered? Login Here
No comments made yet. Be the first to submit a comment

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Cloud Technology Email Hackers Privacy Malware Business Internet Business Computing Microsoft Hosted Solutions Computer Software Ransomware Google Network Security Backup Windows 10 Smartphone User Tips Android Mobile Devices IT Services Data Management Small Business Hardware Windows Gmail Productivity Browser Managed IT Services Tech Term App Data Cloud Computing Facebook Business Continuity Server Internet of Things Saving Money Encryption Office 365 Cybersecurity Artificial Intelligence Smartphones Business Management Disaster Recovery Data Recovery Upgrade IT Support Managed Service Provider Phishing Remote Monitoring Word Efficiency Productivity Office Tips Windows 10 Chrome Data Backup Tip of the week IT Support Big Data Microsoft Office Spam Government Workplace Tips Infrastructure Social Media Outsourced IT Innovation IT Management Employer-Employee Relationship Customer Service Firewall Passwords Apple Settings Two-factor Authentication WiFi Content Filtering Analytics Avoiding Downtime Data storage Vulnerability Bandwidth The Internet of Things YouTube Antivirus Miscellaneous communications Risk Management Money Robot Applications VoIP Managed IT Services Communication Hacking Augmented Reality Mouse Vendor Management Save Money Telephone Systems Maintenance Network Mobile Device LiFi Safety Virtual Reality Hacker Scam Presentation Storage Hosted Solution Tablet Paperless Office Office SaaS Wireless Technology Recovery Outlook VPN Monitors Holiday Search Unified Threat Management Data Security Website HIPAA IBM Wireless Data loss Business Technology Printing Virtual Private Network Automation Administration BYOD Customer Relationship Management End of Support Wi-Fi Computing Apps Server Management Password Mobile Security Google Drive Bitcoin Network Congestion Online IoT Computer Care Unified Threat Management Public Speaking Downloads IT Technicians File Sharing Wires Disaster Shortcut Break Fix Cookies Samsung 5G Spyware Superfish Information Technology Competition Cooperation Solar Statistics Best Practice telephony Halloween Address Writing Hotspot Professional Services Websites Identity Theft Cortana Work Google Docs Black Friday Regulations Windows 8 Computers Microsoft Excel Star Wars Training Fun Quick Tips User Error Multi-Factor Security Mirgation Voice over Internet Protocol Uninterrupted Power Supply Patch Management Dark Web Nanotechnology Downtime Google Wallet Staff Automobile Business Intelligence Bluetooth Business Growth Scary Stories Corporate Profile Current Events Undo Retail Language USB Optimization Cyber Monday Social Networking Solid State Drive Marketing Display Blockchain Cost Management VoIP Legal Google Calendar Chatbots IP Address Cybercrime Net Neutrality Screen Reader How To Networking Drones Printer Wearable Technology Gadgets Alt Codes Application Dark Data Sports WannaCry Going Green Virtualization Social Engineering Computing Infrastructure Dongle Knowledge Recycling IT service Heating/Cooling Smart Technology Motherboard Remote Computing Hard Disk Drive Social Permissions Assessment Education Time Management Legislation Identity Mobile Office FCC Smart Tech Firefox Access Control Cabling Users Typing Alerts Service Level Agreement Digital Payment Experience Unified Communications eWaste BDR Servers Deep Learning Humor Distributed Denial of Service Router Hacks Hard Drives Fraud Internet Exlporer Politics Network Management Operating System Comparison Chromebook Mobile Device Management Running Cable Title II Connectivity Virtual Desktop Techology Budget SharePoint Collaboration Cables Managed IT Cryptocurrency Buisness Digital Lenovo How To Licensing Continuity Google Maps Bring Your Own Device sip Managed IT Service Modem Mail Merge Refrigeration Value Tech Support Document Management IT solutions Smart Office Touchscreen User Specifications Compliance Lithium-ion battery Laptop Work/Life Balance Electronic Medical Records Error Mobile Computing Black Market Point of Sale Law Enforcement Physical Security Travel Notifications G Suite CrashOverride Upgrades Botnet Supercomputer Twitter Gadget Staffing Motion Sickness FinTech Crowdsourcing Taxes 3D Printing Personal Information Administrator Company Culture Emergency Machine Learning IT Budget Web Server GPS Update IT Consultant Unsupported Software Computer Repair Managing Stress Processors Cameras Relocation Tracking Meetings Cleaning Domains Mobile Data Health Alert CCTV Private Cloud Emoji Webcam