Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Adware Lawsuit Between Lenovo And FTC Settled

Adware Lawsuit Between Lenovo And FTC Settled

About two and a half years ago, Lenovo was brought under fire for manufacturing products that had adware preinstalled on them. This malware, a variant called Superfish, was installed on up to 750,000 Lenovo devices, and the company--eager to put this incident behind them--still refuses to admit fault, despite paying reparations and other fees as a result. Superfish allowed access to sensitive information and a root certificate, which could be used to access encrypted data on the same network. All in all, it was a rather embarrassing and dangerous scenario for Lenovo, and it comes with its fair share of consequences.

The Federal Trade Commission has finally declared a sentence for Lenovo, following this debacle. Lenovo must now notify all of their customers about the software that is preinstalled on any purchased devices, and retrieve the user’s consent. Furthermore, the company must allow security audits for the next 20 years, as well as pay $3.5 million in penalties and reparations. However, Lenovo continues to deny any fault in the matter, claiming that there are no instances of a third party actually exploiting this vulnerability to gain access to sensitive information or root access. These consequences feel like a slap in the face for those who felt wronged by Lenovo, but it’s better than nothing.

In the meantime, you need to make sure that your devices aren’t preloaded with Superfish--especially if you bought a device before 2014 and haven’t gone through the Superfish removal process. Furthermore, you should always be careful when buying new devices or technology, particularly if the devices are used. However, this incident shows that even brand new devices can potentially contain flaws, so it’s best to reach out to your IT provider, should you have any questions regarding the integrity of any technology purchases.

Haber Group can provide your business with a network audit to determine just what kinds of security vulnerabilities you’re dealing with. We can then implement solutions to keep your business secure. Furthermore, we can remote into your devices and remove any issues that we encounter without an on-site visit.

Do you need a hand with network security? Haber Group has got you covered. To learn more about how we can help your business, reach out to us at 866.625.3560.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 18 February 2018

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Cloud Technology Hackers Privacy Email Malware Business Internet Hosted Solutions Business Computing Microsoft Windows 10 Computer Software Backup Android Ransomware IT Services Network Security Smartphone Small Business Google Hardware Mobile Devices Windows User Tips Productivity Gmail Data Browser Data Management Office 365 Upgrade Saving Money Smartphones Efficiency Business Continuity Phishing Internet of Things App Encryption Facebook Tip of the week Workplace Tips Managed IT Services Remote Monitoring Innovation Office Tips Microsoft Office Cloud Computing IT Support Big Data Artificial Intelligence Word Data Recovery Managed Service Provider Outsourced IT Server Content Filtering Robot Business Management Risk Management Employer-Employee Relationship IT Support WiFi Productivity Chrome Data storage Spam Miscellaneous Cybersecurity Antivirus Social Media Money Disaster Recovery Government Firewall Customer Service Apple Two-factor Authentication Settings Windows 10 Recovery Scam Hosted Solution Tablet YouTube Vulnerability communications Holiday Printing Data Security Computing Virtual Private Network Google Drive Augmented Reality End of Support Managed IT Services Safety IT Management LiFi Save Money The Internet of Things Telephone Systems Maintenance Virtual Reality Analytics Data Backup SaaS Bandwidth Outlook IBM Search Unified Threat Management Wireless Monitors Apps Customer Relationship Management Hacking Business Technology HIPAA Wi-Fi Administration Automation VoIP Infrastructure Password Passwords Mouse Communication Presentation Hacker Avoiding Downtime Mobile Device Mobile Security Office Network Wireless Technology Automobile Uninterrupted Power Supply Current Events IP Address Downtime Dark Web Patch Management Hotspot Paperless Office Legal Alt Codes Retail Website Cybercrime Google Calendar Dark Data Solid State Drive Going Green Mobile Office Net Neutrality Language Hard Drives Knowledge Networking How To Typing Social Engineering Legislation Heating/Cooling IT service Hard Disk Drive Mobile Device Management FCC VPN Computing Infrastructure Refrigeration Experience Firefox Operating System Unified Communications Cryptocurrency Public Speaking Running Cable Comparison Servers Politics BDR Collaboration Lithium-ion battery Virtual Desktop Title II Alerts Techology Bitcoin How To Laptop Specifications Document Management Server Management Tech Support Google Maps Licensing File Sharing Information Technology Online Mail Merge Undo Unified Threat Management Google Docs Samsung Fun Network Congestion Windows 8 Halloween Black Friday Statistics Websites Address Cooperation Gadgets Google Wallet Microsoft Excel Application Virtualization User Error Quick Tips Computers Scary Stories Cyber Monday Bluetooth Staff Users Corporate Profile Drones Blockchain Display Printer VoIP Social Sports Smart Technology Wearable Technology WannaCry Education Permissions Deep Learning Access Control Time Management Humor Cabling Hacks Distributed Denial of Service User Digital Payment Data loss Budget Bring Your Own Device Competition SharePoint Network Management sip BYOD Buisness Managed IT Service Managed IT Fraud Lenovo Applications Digital 5G IT solutions Best Practice Downloads Computer Care Touchscreen telephony Disaster Vendor Management Break Fix Shortcut Cortana Superfish IT Technicians Marketing Spyware Business Growth Writing Multi-Factor Security Training Storage Physical Security Mirgation CrashOverride Twitter Staffing Gadget Administrator Personal Information Web Server Remote Computing Domains GPS Computer Repair Cameras Processors Tracking Health CCTV Alert Electronic Medical Records Identity Theft Travel G Suite Notifications Botnet Upgrades Supercomputer Motion Sickness Taxes Crowdsourcing Machine Learning 3D Printing IT Budget Emergency Update IT Consultant Relocation Unsupported Software Meetings Chromebook Cleaning Private Cloud Mobile Data Webcam Emoji Work/Life Balance Error Mobile Computing Point of Sale Black Market Law Enforcement